nswd

technology

A dark unfathom’d tide of interminable pride

The ’sex selfie stick’ lets you FaceTime the inside of a vagina

The device offers the unprecedented opportunity to be on the phone with someone’s genitals.

{ Independent | Continue reading }

‘To him who looks upon the world rationally, the world in its turn presents a rational aspect.’ –Hegel

4.jpg

Google started testing their cars on public roads back in 2009, long before any regulations were even dreamed of. An examination of the California Vehicle Code indicated there was nothing in there prohibiting testing.

For testing purposes, Google has a trained safety driver sitting behind the wheel, ready to take it at any moment. Any attempt to take the wheel or use the pedals disables the automatic systems and the safety driver is in control. The safety drivers took special driving safety courses and were instructed to take control if they have any doubt about safe operation. For example, if a vehicle is not braking as expected when approaching a cross walk, take the controls immediately, do not wait to see if it will detect the pedestrians and stop.

The safety drivers are accompanied by a second person in the passenger seat. Known as the software operator, this person monitors diagnostic screens showing what the system is perceiving and planning, and tells the safety driver if something appeared to be going wrong. The software operator is also an extra set of eyes on the road from time to time.

Many other developers have taken this approach, and some of the regulations written have coded something similar to it into law.

This style of testing makes sense if you consider how we train teen-agers to drive. We allow them to get behind the wheel with almost no skill at all, and a driving instructor sits in the passenger seat. While not required, professional driving instructors tend to have their own brake pedal, and know how and when to grab the wheel if need be. They let the student learn and make minor mistakes, and correct the major ones.

The law doesn’t require that, of course. After taking a simple written test, a teen is allowed to drive with a learner’s permit as long as almost any licenced adult is in the car with them. While it varies from country to country, we let these young drivers get full solo licences after only a fairly simple written test and a short road test which covers only a tiny fraction of situations we will encounter on the road. They then get their paperwork and become the most dangerous drivers on the road.

In contrast, robocar testing procedures have been much more strict, with more oversight by highly trained supervisors. With regulations, there have been requirements for high insurance bonds and special permits to go even further. Both software systems and teens will make mistakes, but the reality is the teens are more dangerous.

{ Brad Templeton | Continue reading }

related { Will You Need a New License to Operate a Self-Driving Car? }

‘La bêtise insiste toujours.’ —Albert Camus

22.jpg

Facebook will soon be able to ID you in any photo

The intention is not to invade the privacy of Facebook’s more than 1.3 billion active users, insists Yann LeCun, a computer scientist at New York University in New York City who directs Facebook’s artificial intelligence research, but rather to protect it. Once DeepFace identifies your face in one of the 400 million new photos that users upload every day, “you will get an alert from Facebook telling you that you appear in the picture,” he explains. “You can then choose to blur out your face from the picture to protect your privacy.” Many people, however, are troubled by the prospect of being identified at all—especially in strangers’ photographs. Facebook is already using the system, although its face-tagging system only reveals to you the identities of your “friends.”

{ Science | Continue reading }

related { Bust detection algorithm }

photo { Rachel Roze }

Men like Max. The warrior Max. In the roar of an engine, he lost everything. And became a shell of a man, a burnt out, desolate man, a man haunted by the demons of his past, a man who wandered out into the wasteland.

31.jpg

Who prefers anonymous self-expression online? […] Favoring anonymity was positively correlated with both grandiosity, a component of narcissism, and low self-esteem. In addition, users with stronger anonymity preference tended to be younger, highly trusting, having strong ties to online communities while having few offline friends.

{ Taylor & Francis Online | Continue reading }

‘the disappearance of self in celebrity as a tactic being democratized by social media / the desire to “go viral” as a desire for self-annihilation’ —Rob Horning

toilet.gif

‘Whoever does not have two-thirds of his day for himself, is a slave, whatever he may be: a statesman, a businessman, an official, or a scholar.’ —Nietzsche

4.jpg

[TheJosh]
If I go every other day I will be at the gym 4-5 times a week, is that over training?
I typically work out for 60-90 minutes, I push my self and raise the weight each week.

[…]

steviekm3
That makes no sense. There are only 7 days in a week. If you go every other day that is 3.5 times a week.

TheJosh
Monday, Wednesday, Friday, Sunday. That is 4 days.
How do you go 3.5 times? Do a half workout or something? lol

Justin-27
7x in 2 weeks = 3.5 times a week, genius.
And yeah, 3x a week, full body workouts are good.

TheJosh
I never said anything about going exactly 7 times, like I said, if I go every other day, that is 4 DAYS A WEEK. How hard is that to comprehend?
Week 1 - Sunday, Tuesday, Thursday, Saturday
Week 2 - Monday, Wednesday, Friday, Sunday.
8 DAYS IN 2 WEEKS
In your terms,
8x in 2 weeks = 4 times a week, genius.
All Muscle and No Brains? lol

steviekm3
You double counted Sunday - that is 2 weeks plus 1 day.
Did you fail grade 2 math ?
PLUS your old post said 4 or 5 times a week. Now you just neglect to mention the 5.
Grow up and admit when you are wrong. Believe me you will get a a lot further in life this way.

TheJosh
Are you retarded?
Maybe you should look at a calander, I didn’t double count sunday, my two weeks started and ended on sunday, exactly 14 days.
What don’t you understand?
EDIT - Here is a Calender, I made little dots for each day so you could comprehend.

Justin-27
Dude THAT IS 15 DAYS!!!!!! You can’t have a week go Sun-Sat, then Sun-Sun. Look at the damn pic you posted, count the days what do they equal?!?!?! FIFTEEN!
I was right, 3.5 x a week, and so was the first guy to post it, and you my bright friend are el wrongo.

[…]

TheJosh
There is 7 days in a week, if you workout every other day, you work out 4 days a week, how hard is that to ****ing comprehend?!
Ill do it out in 4 weeks for you, maybe it will make more sense?
Week 1 - Sunday, Tuesday, Thursday, Saturday
Week 2 - Monday, Wednesday, Friday, Sunday
Week 3 - Tuesday, Thursday, Saturday, Monday
Week 4 - Wednesday, Friday, Sunday, Tuesday
Week 5 - Thursday, Saturday, Monday, Wednesday
Week 6 - Friday, Sunday, Tuesday, Thursday
No matter how you look at it, if you workout every other day, you work out 4 times a week.
[…]
A week is sunday-sunday.
I think you just don’t know how to count, it’s alright, I won’t tell anyone. lol
Sunday-Saturday is only 6 days, do you have 6 days weeks where you live?

Justin-27
Yes, you workout 4x the first week, then 3 the next.
I’m right, you’re a effing moron.
[…]
Sun-Sat is only 6 days?!
Sunday ONE
Monday TWO
Tuesday THREE
Wednesday FOUR
Thursday FIVE
Friday SIX
Saturday SEVEN
Arizona public schools=FAIL

{ Bodybuilding.com | Continue reading }

‘I feel like I totally understand gothic architecture in all of its brilliance’ —deanna havas

The Random Darknet Shopper is an automated online shopping bot which we provide with a budget of $100 in Bitcoins per week. Once a week the bot goes on shopping spree in the deep web where it randomly choses and purchases one item and has it mailed to us.

34.jpg

65.jpg

Which losses do we impose on some to benefit others?

310.jpg

The NSA’s inspector general last year detailed 12 cases of “intentional misuse” of intelligence authorities from 2003 to 2013 […] Those cases included a member of a U.S. military intelligence unit who violated policy by obtaining the communications of his wife, who was stationed in another country. After a military proceeding, the violator was punished by a reduction in rank, 45 days of extra duty and forfeiture of half of his pay for two months, according to the letter. In a 2003 case, a civilian employee ordered intelligence collection “of the telephone number of his foreign-national girlfriend without an authorized purpose for approximately one month” to determine whether she was being faithful to him, according to the letter. The employee retired before an investigation could be completed.

{ Bloomberg | Continue reading }

photo { Olivia Locher, Lucifer Rising, 2014 }

Superboy-Prime: [battling Superman] I’m the only one who can rescue this messed-up universe.

39.jpg

This report describes the details and type of operations carried out by an organized criminal group that focuses on financial industry, such as banks and payment providers, retail industry and news, media and PR companies. […] The organized criminal group backbone are citizens of both Russian and Ukrainian origin. […]

The average sum of theft in the Russian territory and in the post-Soviet space is $2 million per incident. […] To date the total amount of theft is over 1 billion rubles (about 25 million dollars), most of it has been stolen in the second half of 2014. […]

The key is that fraud occurs within the corporate network using internal payment gateways and internal banking systems. Thus money is stolen from the banks and payment systems, and not from their customers. While this is their main and most lucra- tive activity, the gang has also ventured into other areas including the compromise of media groups and other organizations for industrial espionage and likely a trading advantage on the stock market. […]

The average time from the moment of penetration into the financial institutions internal network till successful theft is 42 days.

As a result of access to internal bank networks the attackers also managed to gain access to ATM management infrastructure and infect those systems with their own malicious software that further allows theft from the banks ATM systems on the attackers command. […]

The main steps of the attack progression are the following ones:

1. Primary infection of an ordinary employee computer.
2. Getting a password of a user with administra- tive rights on some computers. For example, a password of a technical support engineer.
3. Gaining legitimate access to one server.
4. Compromising the domain administrator password from the server.
5. Gaining access to the domain controller and compromising of all active domain accounts.
6. Gaining access to e-mail and workflow servers.
7. Gaining access to server and banking system administrator workstations. 

8. Installing the software to monitor activity of interesting system operators. Usually photo and video recording was used.
9. Configuring remote access to servers of inter- est including firewall configuration changes.

{ Group-IB and Fox-IT | PDF }

‘The subject of a good tragedy must not be realistic.’ –Corneille

341.jpg

[Yahoo C.E.O. Marissa] Mayer also had a habit of operating on her own time. Every Monday at 3 p.m. Pacific, she asked her direct reports to gather for a three-hour meeting. Mayer demanded all of her staff across the world join the call, so executives from New York, where it was 6 p.m., and Europe, where it was 11 p.m. or later, would dial in, too. Invariably, Mayer herself would be at least 45 minutes late; some calls were so delayed that Yahoo executives in Europe couldn’t hang up till after 3 a.m. […]

Within weeks of becoming C.E.O., she received an email from Henrique de Castro, the fashionable Portuguese president of Google’s media, mobile and platforms businesses. […] Over dinner, de Castro impressed Mayer with his knowledge of Yahoo’s business and his specific proposals for building it. For several mornings in a row, the two exchanged emails to negotiate de Castro’s salary. Every night, Mayer would make an offer, only to wake up to a reply with a list of more conditions. Eventually de Castro negotiated himself a contract worth around $60 million, depending on the value of Yahoo stock. […] Despite the board’s urging, Mayer opted against vetting Henrique de Castro. As a result, she was unaware that de Castro had a poor reputation among his colleagues in Google’s advertising business. Many had derisively called him the Most Interesting Man in the World, in reference to the satirically fatuous spokesman for Dos Equis beer. […] Advertising revenue declined in every quarter since he was hired. Within a year, Mayer had personally taken control of Yahoo’s ad team. De Castro would leave the company in January 2014. For about 15 months of work, he would be paid $109 million.

{ NY Times | Continue reading }

‘In the secret parts of fortune? O, most true; she is a strumpet. What’s the news?’ —Shakespeare

34521.jpg

Yesterday, Instagram began the process of getting rid of all the spam accounts in its system, which has proved to be really embarrassing for all the people who bought a load of spambots to make themselves look more popular than they are. […]

37-year old rapper Ma$e got caught with an awful lot of imaginary friends. He saw an alarming drop in followers, from 1.6 million to 100,000. Unable to confront the idea that everyone knew he’d bought them from a site like Buzzoid at a rate of $3 for 100 followers, Ma$e subsequently deleted his account. […]

Other big names hit by the cull include Justin Bieber, Ariana Grande, Barack Obama and Kim Kardashian.

{ Dazed | Continue reading }

‘I like a woman with a head on her shoulders. I hate necks.’ —Steve Martin

4.jpg

It’s called “beauty work.” It’s a digital procedure of sorts, in which a handful of skilled artists use highly specialized software in the final stages of post-production to slim, de-age and enhance actors’ faces and bodies. […]

Under strict non-disclosure agreements, Hollywood A-listers have been quietly slipping in and out of a few bland office buildings around town, many to sit in on days-long retouching sessions, directing the artists to make every frame suitable. […]

Hips are narrowed, calves slimmed, turkey-necks tucked. Pores are tightened. Eye-bags reduced (often, entire hangovers are erased). Hair is thickened, teeth whitened. Underarm-skin is de-jiggled. Belly fat obliterated, abs raised.

{ Mashable | Continue reading }

The urb it orbs

31.jpg

According to a study released this week by Brown University’s Department of Modern Culture and Media, it now takes only four minutes for a new cultural touchstone to transform from an amusing novelty into an intensely annoying thing people never want to see or hear again. […]

“We project that by 2018, the gap between liking something new and wishing yourself dead rather than hearing it again will be down to 60 seconds,” Levinson said. “And by 2023, enjoyment and abhorrence will occur simultaneously, the two emotions effectively canceling each other out and leaving one feeling nothing whatsoever.”

{ The Onion | Continue reading | via Nathan Jurgenson }

‘Knock, knock! Who’s there?’ —Shakespeare

38.jpg

The malware, called “Regin”, is probably run by a western intelligence agency and in some respects is more advanced in engineering terms than Stuxnet. […]

Symantec said it was not yet clear how Regin infected systems but it had been deployed against internet service providers and telecoms companies mainly in Russia and Saudi Arabia as well as Mexico, Ireland and Iran. […]

“Nothing else comes close to this . . . nothing else we look at compares,” said Orla Cox, director of security response at Symantec, who described Regin as one of the most “extraordinary” pieces of hacking software developed, and probably “months or years in the making”. […] “Sometimes there is virtually nothing left behind – no clues. Sometimes an infection can disappear completely almost as soon as you start looking at it, it’s gone. That shows you what you are dealing with.”

{ FT | Continue reading }

Spineless swines, cemented minds

21.jpg

Researchers at the MIT are testing out their version of a system that lets them see and analyze what autonomous robots, including flying drones, are “thinking.” […]

The system is a “spin on conventional virtual reality that’s designed to visualize a robot’s ‘perceptions and understanding of the world,’” Ali-akbar Agha-mohammadi, a post-doctoral associate at MIT’s Aerospace Controls Laboratory, said in a statement.

{ LiveScience | Continue reading | via gettingsome }

image { Lygia Clark }

‘Society is not a disease, it is a disaster.’ –Cioran

56.jpg

On Facebook, people frequently express emotions, which are later seen by their friends via Facebook’s “News Feed” product. Because people’s friends frequently produce much more content than one person can view, the News Feed filters posts, stories, and activities undertaken by friends. News Feed is the primary manner by which people see content that friends share. Which content is shown or omitted in the News Feed is determined via a ranking algorithm that Facebook continually develops and tests in the interest of showing viewers the content they will find most relevant and engaging. One such test is reported in this study: A test of whether posts with emotional content are more engaging. […]

For people who had positive content reduced in their News Feed, a larger percentage of words in people’s status updates were negative and a smaller percentage were positive. When negativity was reduced, the opposite pattern occurred. These results suggest that the emotions expressed by friends, via online social networks, influence our own moods, constituting, to our knowledge, the first experimental evidence for massive-scale emotional contagion via social networks, and providing support for previously contested claims that emotions spread via contagion through a network.

{ PNAS | Continue reading }

polaroid prints { Barbara Allen photographed by Andy Warhol, 1977 }

‘You forget that the kingdom of heaven suffers violence: and the kingdom of heaven is like a woman.’ —James Joyce

621.jpg

Fifty-eight adolescent girls and 60 young adult women viewed a Facebook profile with either a sexualized profile photo or a nonsexualized profile photo and then evaluated the profile owner.

Results indicated that the sexualized profile owner was considered less physically attractive, less socially attractive, and less competent to complete tasks.

{ APA/PsycNET | Continue reading }

photo { Dirk Braeckman }

‘Divide each difficulty into as many parts as is feasible and necessary to resolve it.’ –Descartes

36.jpg

Everybody knows that real blurry photos can’t be made sharp after the fact. But that’s exactly the premise of the new Illum camera from a startup called Lytro.

Instead of snapping a solitary image, the Illum captures a whole moment—known as the light field—so you can change focus and shift perspective after you’ve taken the shot.

Just by clicking around a screen, the viewer can focus on a birthday cake candle, the person blowing it out, or partygoers in the background.

{ WSJ | Continue reading }

art { Gerhard Richter, Frau Niepenberg, 1965 }

‘All stable processes we shall predict. All unstable processes we shall control.’ —Von Neumann

27.jpg

Few human possessions are so universally owned as mobile phones. There are almost as many mobile phones as there are humans on the planet. More people worldwide own mobile phones than have access to working toilets. These devices not only help individuals share information with each other, they are increasingly being used to help individuals gather information about themselves. Smartphones — mobile phones with built in applications and internet access — have rapidly become one of the world’s most sophisticated self-tracking tools. Self-trackers and those engaged in the “quantified self” movement are using smartphones to collect large volumes of data about their health, their environment, and the interaction between the two. Continuous tracking is now obtainable for personal health indicators including physical activity, brain activity, mood dynamics, numerous physiologic metrics and demographic data. Similarly, smartphones are empowering individuals to measure and map, at a relatively low cost, environmental data on air quality, water quality, temperature, humidity, noise levels, and more.

Mobile phones can provide another source of information to their owners: sample data on their personal microbiome. The personal microbiome, here defined as the collection of microbes associated with an individual’s personal effects (i.e., possessions regularly worn or carried on one’s person), likely varies uniquely from person to person. Research has shown there can be significant interpersonal variation in human microbiota, including for those microbes found on the skin. We hypothesize that this variation can be detected not just in the human microbiome, but also on the phone microbiome.

{ Meadow/Altrichter/Green | Continue reading }

Million ways to cry

1.jpg

{ CYNK, a ”social networking” startup that has no assets, no revenue, no members, and one employee, is worth $4.75 billion }

art { Paul Klee }



kerrrocket.svg