nswd

Sea, sea! Here, weir, reach, island, bridge.

4.jpg

Floating bridges do not work in all cases because they are susceptible to harsh weather conditions such as strong waves and currents. This is where the floating tunnels come in. […]

The term “floating” is perhaps misleading. The tunnels are fixed in position with cables — either anchored to the seabed or tethered to pontoons which are spaced far enough apart to allow boats to pass through. Made of concrete, they would function like conventional tunnels. […]

The biggest risks in the project are explosions, fire and overloading. […] Results so far indicate that the constant water pressure that surrounds the floating tunnels reduces the damage caused by explosions. […]

the NPRA team is also investigating how the tunnels would fare if submarines crashed into them.

{ CNN | Continue reading }

still { Akira Kurosawa, Rashomon, 1950 }

Who’ll search for Find Me Colours now on the hillydroops of Vikloefells?

26.jpg

The problems of darknet markets have triggered an evolution in online black markets. […]

Instead of using websites on the darknet, merchants are now operating invite-only channels on widely available mobile messaging systems like Telegram. This allows the merchant to control the reach of their communication better and be less vulnerable to system take-downs. To further stabilize the connection between merchant and customer, repeat customers are given unique messaging contacts that are independent of shared channels and thus even less likely to be found and taken down. Channels are often operated by automated bots that allow customers to inquire about offers and initiate the purchase, often even allowing a fully bot-driven experience without human intervention on the merchant’s side. […]

The other major change is the use of “dead drops” instead of the postal system which has proven vulnerable to tracking and interception. Now, goods are hidden in publicly accessible places like parks and the location is given to the customer on purchase. The customer then goes to the location and picks up the goods. This means that delivery becomes asynchronous for the merchant, he can hide a lot of product in different locations for future, not yet known, purchases. For the client the time to delivery is significantly shorter than waiting for a letter or parcel shipped by traditional means - he has the product in his hands in a matter of hours instead of days. Furthermore this method does not require for the customer to give any personally identifiable information to the merchant, which in turn doesn’t have to safeguard it anymore. Less data means less risk for everyone.

{ Opaque | Continue reading }

photo { Weegee }

Counterintuitive nature of quantum physics leads to a number of paradoxes. One of them is a “quantum vampire” effect consisting in the fact that photon annihilation in a part of a large beam doesn’t change the shape of the beam profile (i. e., doesn’t cast a shadow), but may change the total beam intensity.

43.jpg

First of all, I can remember very specific odors in extraordinary detail pretty much indefinitely. Moreover, I can conjure the memory of these odors exactly and at will. I have it on excellent authority from several researchers at the Monell Chemical Senses Center that this is a very rare capacity. […]

Secondly, I can mentally and very accurately forecast how the perceived odor of any given substance will change at various levels of concentration. […]

Thirdly and largely because of the two previously mentioned strange abilities, I can imagine discrete odors and know what will happen when I combine and arrange them while adjusting their concentrations – entirely in my head without even opening a bottle or picking up a pipette.

{ CB I Hate Perfume | Continue reading | Thanks Tim }

photo { Robert Mapplethorpe, Jack in the Pulpit, 1988 }

A hundred cares, a tithe of troubles and is there one who understands me?

1.jpg

25.jpg

35.jpg

44.jpg

51.jpg

{ Vince Rozmiarek | Indian Hills Community Sign | FB page }

‘Death, therefore, the most awful of evils, is nothing to us, seeing that, when we are, death is not come, and, when death is come, we are not.’ –Epicurus

24.jpg

{ Joel Meyerowitz, Fallen Man, Paris, 1967 }

Every day, the same, again

34.jpg China germinates first seed on moon and Russian startup wants to put billboards in space

A robot dog has learned to run faster with machine learning

Giving algorithms a sense of uncertainty could make them more ethical

Consumption of sushi is a good predictor of insect acceptance.

researchers discover the brain cells that make pain unpleasant

Wipe your nose with the sullied tissue, and you’ll “get sick on your own terms.” A Mysterious Company Claims to Sell Sneeze-Filled Tissues for $80

Creative Ideas of Physicists and Writers Routinely Occur During Mind Wandering

We use a unique data set to show that financial market experts — institutional investors with portfolios averaging $573 million — exhibit costly, systematic biases. A striking finding emerges: while investors display clear skill in buying, their selling decisions underperform substantially.

Striped bodypainting protects against horseflies

What Did Ancient Romans Do Without Toilet Paper? (instead of reaching for a roll of toilet paper, an ancient Roman would often grab a tersorium — or, in my technical terms, a “toilet brush for your butt.”

Easter Island statues: mystery behind their location revealed

Mars — if it still had a magnetic field, atmosphere and water

toki- Process & WALK_short ver [Thanks Tim]

4 Copy Editors Killed In Ongoing AP Style, Chicago Manual Gang Violence

‘Never talk when you can nod and never nod when you can wink and never write an e-mail, because it’s death.’ –Eliot Spitzer

23.jpg

“Connecting” online once referred to ways of communicating; now it is understood as a means of digital totalization, typically euphemized as objects becoming “smart.” Each data-collecting object requires a further smartening of more objects, so that the data collected can be made more useful and lucrative, can be properly contextualized within the operation of other objects. You can’t opt in or out of this kind of connectedness.

{ Rob Horning/Real Life | Continue reading }

‘There are some people who choose for whatever reason to handcuff themselves to the Titanic,’ said John Weaver, an adviser to Ohio Gov. John Kasich

32.jpg

Ghosting, or avoiding technologically-mediated contact with a partner instead of providing an explanation for a breakup, has emerged as a relatively new breakup strategy in modern romantic relationships. […]

Distinct differences between ghosting and direct strategies suggest developments in technology have influenced traditional processes of relationship dissolution.

{ PsyArXiv | Continue reading }

perhaps the same bird echoed through both of us

31.jpg

identical twins […] bought home kits from AncestryDNA, MyHeritage, 23andMe, FamilyTreeDNA and Living DNA, and mailed samples of their DNA to each company for analysis. Despite having virtually identical DNA, the twins did not receive matching results from any of the companies. […]

An entire DNA sample is made up of about three billion parts, but companies that provide ancestry tests look at about 700,000 of those to spot genetic differences.

{ CBC | Continue reading }

‘If snow be white, why then her breasts are dun.’ –Shakespeare

9.jpg

As an advanced research topic in forensics science, automatic shoe-print identification has been extensively studied in the last two decades, since shoe marks are the clues most frequently left in a crime scene. […] A large variety of handcrafted features have been used for automatic shoe-print identification. These features have shown good performance in limited and controlled scenarios. Unfortunately, they fail when they are dealing with large intra-class variations caused by the noise, oc- clusions, rotation and various scale distortions. A good alternative to these conventional features are the learned ones, e.g. deep learning, which have more generalization ability in more complicated scenarios. To be effective, these models need to be trained on a large amount of data.

{ arXiv | PDF }

Fuck your white horse and a carriage

22.jpg

Advertising is ubiquitous in modern life. Yet might it be harmful to the happiness of nations? This paper blends longitudinal data on advertising with large-scale surveys on citizens’ well-being. The analysis uses information on approximately 1 million randomly sampled European citizens across 27 nations over 3 decades. We show that increases in national advertising expenditure are followed by significant declines in levels of life satisfaction.

{ University of Warwick | PDF }

photo { Joel Meyerowitz, New York City, 1968 }

you see the Benz on dubs

21.jpg

if we asked our listeners […] what do you think you do on your face when you express anger? Everybody can give you something and it will be pretty much accurate. And the reason is because all of us have seen it. […] if you ask a blind person, “Hey, show me what you look like when you’re angry or when you’re sad,” you’ll get something that’s close but you don’t get the exact facial muscle movements that occur when those emotions occur spontaneously. However, when it occurs spontaneously, the exact facial muscle movements are exactly the same. So blind individuals produce them spontaneously but don’t produce exactly the same thing when you ask them to pose whereas sighted people do. 

{ David Matsumoto/APA | Continue reading }

photo { Audrey Hepburn photographed by Richard Avedon on the set of Funny Face, 1956 | Richard Avedon was hired as visual consultant for Funny Face, directed by Stanley Donen. Shot partly in France, the film is loosely based on Avedon’s career as a fashion photographer in Paris. }

attraction has an expiration date

88.jpg

{ The Holotypic Occlupanid Research Group occupies itself by doing “research in the classification of occlupanids. These small objects are everywhere, dotting supermarket aisles and sidewalks with an impressive array of form and color.” | Improbable Research }

ballin’ out of control

42.jpg

[T]hough air travel is safer than it has ever been, the intervening time has not provided an enormous upgrade of our ability to track aircraft far from land-based radar. […]

[O]ver international waters, air traffic controllers have no real-time knowledge of where planes are—they rely on flight plans, radio contact with pilots, and a system called ACARS that provides what is effectively text-message communication between planes and ground stations. […]

In 2010, the FAA mandated that all US aircraft would need to use a system called ADS-B, which means “Automatic Dependent Surveillance—Broadcast.” Essentially, by 2020, aircraft are required to broadcast their location, derived from GPS, each second. […]

However, ground receivers need to be within about 172 miles (277 km) of the aircraft to collect ADS-B signals. Out over the ocean, there’s still a knowledge gap between the planes and the air traffic controllers they can’t reach. […]

The solution: more satellites.

Specifically, Aireon has installed payloads on 75 Iridium satellites that have been launched over the past two years, with the final installment reaching orbit in a SpaceX rocket on Jan. 11. These payloads are designed to detect ADS-B signals wherever they are broadcast, whether over the open ocean or a mountain range, finally providing continuous tracking of aircraft anywhere on Earth. The satellites are already processing more than 13 billion ADS-B messages each month. […]

For airlines themselves, the benefits will include using that real-time traffic management to fly faster, in part because they will be able to fly more closely to other planes, which will cut fuel costs (and emissions).

{ Quartz | Continue reading }

etching { Damien Hirst, Cinchonidine, 2004 }

‘In its essence, technology is something that man does not control.’ –Heidegger

imp-kerr-truth.jpg

AI-generated videos that show a person’s face on another’s body are called “deepfakes.” […]

Airbrushing and Photoshop long ago opened photos to easy manipulation. Now, videos are becoming just as vulnerable to fakes that look deceptively real. Supercharged by powerful and widely available artificial-intelligence software developed by Google, these lifelike “deepfake” videos have quickly multiplied across the Internet, blurring the line between truth and lie. […] A growing number of deepfakes target women far from the public eye, with anonymous users on deepfakes discussion boards and private chats calling them co-workers, classmates and friends. Several users who make videos by request said there’s even a going rate: about $20 per fake. […]

Deepfake creators often compile vast bundles of facial images, called “facesets,” and sex-scene videos of women they call “donor bodies.” Some creators use software to automatically extract a woman’s face from her videos and social-media posts. Others have experimented with voice-cloning software to generate potentially convincing audio. […]

The requester of the video with the woman’s face atop the body with the pink off-the-shoulder top had included 491 photos of her face, many taken from her Facebook account. […] One creator on the discussion board 8chan made an explicit four-minute deepfake featuring the face of a young German blogger who posts videos about makeup; thousands of images of her face had been extracted from a hair tutorial she had recorded in 2014. […]

The victims of deepfakes have few tools to fight back. Legal experts say deepfakes are often too untraceable to investigate and exist in a legal gray area: Built on public photos, they are effectively new creations, meaning they could be protected as free speech. […]

Many of the deepfake tools, built on Google’s artificial-intelligence library, are publicly available and free to use. […] Google representatives said the company takes its ethical responsibility seriously, but that restrictions on its AI tools could end up limiting developers pushing the technology in a positive way. […]

“If a biologist said, ‘Here’s a really cool virus; let’s see what happens when the public gets their hands on it,’ that would not be acceptable. And yet it’s what Silicon Valley does all the time,” he said.

{ Washington Post | Continue reading }

Technical experts and online trackers say they are developing tools that could automatically spot these “deepfakes” by using the software’s skills against it, deploying image-recognition algorithms that could help detect the ways their imagery bends belief.

The Defense Advanced Research Projects Agency, the Pentagon’s high-tech research arm known as DARPA, is funding researchers with hopes of designing an automated system that could identify the kinds of fakes that could be used in propaganda campaigns or political blackmail. Military officials have advertised the contracts — code-named “MediFor,” for “media forensics” — by saying they want “to level the digital imagery playing field, which currently favors the manipulator.”

The photo-verification start-up Truepic checks for manipulations in videos and saves the originals into a digital vault so other viewers — insurance agencies, online shoppers, anti-fraud investigators — can confirm for themselves. […]

However, the rise of fake-spotting has spurred a technical blitz of detection, pursuit and escape, in which digital con artists work to refine and craft evermore deceptive fakes. In some recent pornographic deepfakes, the altered faces appear to blink naturally — a sign that creators have already conquered one of the telltale indicators of early fakes, in which the actors never closed their eyes. […] “The counterattacks have just gotten worse over time, and deepfakes are the accumulation of that,” McGregor said. “It will probably forever be a cat-and-mouse game.”

{ Washington Post | Continue reading }

Killin’ anything that moves 1-2, 1-2, 1-2

2.jpg

The vast majority of life on Earth depends, either directly or indirectly, on photosynthesis for its energy. And photosynthesis depends on an enzyme called RuBisCO, which uses carbon dioxide from the atmosphere to build sugars. So, by extension, RuBisCO may be the most important catalyst on the planet.

Unfortunately, RuBisCO is, well, terrible at its job. It might not be obvious based on the plant growth around us, but the enzyme is not especially efficient at catalyzing the carbon dioxide reaction. And, worse still, it often uses oxygen instead. This produces a useless byproduct that, if allowed to build up, will eventually shut down photosynthesis entirely. It’s estimated that crops such as wheat and rice lose anywhere from 20 to 50 percent of their growth potential due to this byproduct.

While plants have evolved ways of dealing with this byproduct, they’re not especially efficient. So a group of researchers at the University of Illinois, Urbana decided to step in and engineer a better way. The result? In field tests, the engineered plants grew up to 40 percent more mass than ones that relied on the normal pathways.

{ Ars Technica | Continue reading }

photo { Joel Meyerowitz, Florida, 1970 }

Making the right choice does not always lead to a good outcome—sometimes there are only bad outcomes to choose from

41.jpg

Albania is a country in the Balkans that has a long history of patriarchal traditions. Albania is traditionally a patricentric society, so having sons in the family is very important. When a family does not have sons, or loses their sons, then a sworn virgin can be a suitable replacement.

A sworn virgin is a woman who, either at birth, or by her own choice, decides to take on male gender roles. The sworn virgin makes a vow of chastity, does traditionally male labor, and usually wears male styled clothing. The vow of becoming a sworn virgin means that the woman no longer has marital obligations, the woman can become the head of her own household and would then have rights to inheritance. One of the main causes that make taking the vow necessary for Albanian families is the power of the Kanun. The Kanun is a medieval code of rules that are the foundation of Albanian culture. Many of the rules focus on honor and regulate the community life.

The Kanun regulates all aspects of Albanian life. The Kanun focuses on aspects of familial honor. A major part of this idea results in “blood feuds.” Blood feuds are deadly feuds between families. A blood feud can start from an insult or theft; they serve the purpose of righting a perceived wrong, honor being more important that a human life. When families become enemies “the enemy family’s honor can only be repaired with more blood. Any male member of the…family tall enough to lift a rifle is a legitimate target.” If a woman is murdered, according to the code, her death can be avenged by killing a woman in the enemy family of killing their dog.

The Kanun has specific rules for the role of women in Albania, perpetuating male dominance in a patriarchal society. Albania has roots as a peasant society where gender roles are very significant. The man is the head of the family, the owner and over seer of the land and the main decision maker. The importance of gender roles and the man’s position of power breed the desire for a passive and compliant woman. According to the article by Arsovska, the Kanun states, “a man has the right to beat and publicly humiliate his wife if she disobeys him. He is also allowed to cut her hair, strip her nude, expel her from the house and drive her with a whip through the village. The Kanun specifies that a man may kill his wife for two reasons: infidelity and betrayal of hospitality.” Further, a woman is considered half of a man, equivalent to a dog and always subservient to her husband or father before she is married.

[…]

In a situation where all the male family members are killed during a blood feud, the family would be destitute, or an unmarried daughter can take the vow to be a sworn virgin. The sworn virgin would then be the head of the household, have rights to the inheritance and be in charge of retaliation of the blood feud. Women are also forbidden from being an active participant in their engagements and marriages. If the woman does not want to marry the man she is arranged to be married to and runs away, her family would bring her back to the man with a single bullet. The meaning of the bullet is if the wife tries to leave again the husband can kill her with the bullet. Some women receive a locket with a bullet inside on their wedding day, the bullet being the bullet she would be killed with if she were to be unfaithful or try to leave her husband. The only honorable way for a woman to avoid an unwanted arranged marriage would be to take the vow. If a woman refuses an arranged marriage it could incite a blood feud between the two houses. Another reason some women take the vow to become a sworn virgin is if their parents do not produce a son. It is considered shameful if a family has no male offspring and some girls will be raised as boys from birth. All cases of a female becoming a sworn virgin have to do with familial honor.

The vow to become a sworn virgin is not to be taken lightly. The vow is considered sacred and is meant for life. The woman making the vow goes before twelve elders of the community and makes a vow of chastity. The traditional punishment for breaking the vow is death. If a sworn virgin is found to break her vow of celibacy she would traditionally be burned alive, although it is unrecorded how often this punishment gets carried out.

[…]

A sworn virgin is able to enjoy the status of being a man, they are able to interact freely with men, smoke cigarettes, carry guns and leave their houses without a male escort.

[…]

The role of the sworn virgin should not be considered lesbianism, as the traditional role of sexual intercourse in Albania is strictly for procreation. Homosexuality was illegal for men in Albania until 1995, and lesbians have never been mentioned in the Kanun or by the state, which would imply that it is a completely foreign or non existent concept to traditional Albanians.

[…]

Even as a sworn virgin, there are times when they are still discriminated against by men and still treated as less than a man. One sworn virgin was not able to become a member of a marksmen club, and another example is of a sworn virgin who, after their death, was buried as a man but did not receive the traditional mourning that men usually receive.

[…]

It is unknown how many sworn virgins are still in existence today, as the post communist Albanian government does not recognize tradition rules from the Kanun. A ‘cultural revolution’ took place in Albania in 1974, declaring all traditional customs as non-existent, so there is no new official records kept of women that take the vow.

{ Elizabeth Rush, The Cultural Role and Identity of Albanian Sworn Virgins | Continue reading }

oil on canvas { Picasso, Femme en bleu, 1944 }

quote { The lesser of two evils: Explaining a bad choice by revealing the choice set }

Newman and I are reversing the peepholes on our door so you can see in

33.jpg

An electronic synapse that fires millions of times faster than the ones in your brain could be used to build artificial neural networks.

[…]

A clinical trial of drugs called mTOR inhibitors found that they boosted elderly people’s immune systems, potentially extending their life spans. Another trial in progress is testing senolytics, drugs that eliminate the senescent cells that make aging bodies break down.
[…]

A team that built a brain-to-brain communication device in 2015 has now expanded it to three people, paving the way for larger groups to transmit thoughts directly to one another.

[…]

An ordinary smartphone can be used to track people on the other side of a solid wall by detecting how their movements distort the signals from any Wi-Fi transmitters in the area.

{ Technology Review | Continue reading }

image { Google hires camel for desert Street View, 2014 }

P.P., don’t carry that weight

4.jpg

Active, polymorphic material (“Utility Fog”) can be designed as a conglomeration of 100-micron robotic cells (‘foglets’). Such robots could be built with the techniques of molecular nanotechnology […] The Fog acts as a continuous bridge between actual physical reality and virtual reality.

{ NASA | Continue reading }

photo { Joel Meyerowitz, Times Square, New York City, 1963 }

Can I tell them that I never really had a gun?

25.jpg

From 1427 to 1435, Gilles de Rais (1405 – 1440) served as a commander in the Royal Army, and fought alongside Joan of Arc against the English and their Burgundian allies during the Hundred Years’ War.

In 1434/1435, he retired from military life, depleted his wealth by staging an extravagant theatrical spectacle of his own composition, and was accused of dabbling in the occult.

After 1432, he was accused of engaging in a series of child murders, with victims possibly numbering in the hundreds. The killings came to an end in 1440, when a violent dispute with a clergyman led to an ecclesiastical investigation which brought the crimes to light, and attributed them to Gilles. He was condemned to death and hanged at Nantes on 26 October 1440.

Gilles de Rais is believed to be the inspiration for the 1697 fairy tale “Bluebeard” (”Barbe bleue”) by Charles Perrault.

{ Wikipedia | Continue reading | Watch: Georges Méliès, Barbe Bleue, 1901 }



kerrrocket.svg