SoftBank Mobile and Aldebaran Unveil “Pepper” – the World's First Personal Robot That Reads Emotions | About Us | SoftBank
The SoftBank Corporate and IR page provides information about SoftBank Mobile and Aldebaran Unveil “Pepper” – the World’s First Personal Robot That Reads Emotions
Jesse Hirsh talks to Stephen Quinn about Gitchain, i.e. what you get when you give Git a blockchain a la Bitcoin.
According to the company, the accuracy is high enough that Facebook will sometimes make suggestions even before you’ve told it what kind of media you’re looking for. “What we ended up doing is providing this flow where it works from the top level,” says Facebook software engineer Ryan Case. “You could be just typing about what you’re watching and we give an indication we have a suggestion for you, and you can step into the suggestion.”
The system also grabs more detailed information about what you’re doing. When people were inputing TV shows manually, Facebook didn’t ask them which season and episode they were viewing. That would be too much of a burden. Now, that data is included automatically. Previously, music data was limited to a particular band. Now, Facebook shows the specific track and album and includes a 30-second clip.
Decentralized, peer-to-peer Git repositories aka “Git meets Bitcoin”
Federal criminal charges were brought against both of them in March 2013, with a three-day trial concluding in December 2013. Despite his lawyer’s best efforts, in March 2014, Rodriguez was sentenced to 14 years in prison. His punishment is believed to be the harshest such sentence for firing a laser at an aircraft anywhere in the United States, possibly even the world.
Think about how social networks might improve if—as on the gaming sites and in real life—users had more power to reject abusive behavior. Of course, different online spaces will require different solutions, but the outlines are roughly the same: Involve users in the moderation process, set defaults that create hurdles to abuse, give clearer feedback for people who misbehave, and—above all—create a norm in which harassment simply isn’t tolerated.
Ultimately, online abuse isn’t a technological problem; it’s a social problem that just happens to be powered by technology. The best solutions are going to be those that not only defuse the Internet’s power to amplify abuse but also encourage crucial shifts in social norms, placing bad behavior beyond the pale. When people speak up about online harassment, one of the most common responses is “Well, what did you expect from the Internet?” If we truly want to change our online spaces, the answer from all of us has got to be: more.
One of my radio columns this week talked about research by Deloitte that looks at the rapid rise of the use of digital resources and mobile devices while shopping. I mentioned the Amazon effect, where the online retailer’s massive digital presence gives it a place inside of other stores when it comes to consumer options. Imagine if the new Amazon Dash were used in stores by rogue shoppers using the bricks and mortar infrastructure to shop at Amazon.
Melissa Tobin and I discuss the prediction of crime using twitter data and the role this data could play in police planning, public policy, and public service delivery.
My discussion with @CBCEarlyEdition regarding Tinder, the evolution of spam, and finding love via video games
My discussion with @lorenmcginnis on the culture of video games, esports, Twitch.tv, athletics, trolling, and why Microsoft will be introducing a community powered reputation system for Xbox One.
Nitesh Dhanjani: Cursory Evaluation of the Tesla Model S: We Can't Protect Our Cars Like We Protect Our Workstations
A fantastic article exploring significant security concerns with the Tesla Model S automobile, while also touching upon the need to consider security and privacy with regard to the rise of the Internet of Things.
Given the fantastic future of IoT (Internet of Things) devices ahead of us, it is the responsibility of the security community and device manufacturers to do our best to enable these devices securely. The IoT devices in scope include remotely controllable thermostats, baby monitors, light bulbs, door locks, cars, and many more. The impact of security vulnerabilities targeting such devices can lead be physical in nature in addition to contributing to loss of privacy.
The purpose of this document is to outline the mechanisms by which the Tesla Model S communicates with car owners and the Tesla infrastructure using a variety of TCP/IP mechanisms. The goal of this document is to advise the owners on security issues they should be aware of as well as to kick off a dialogue between security researchers and Tesla Motors that will ultimately drive deeper analysis and assurance.
A steel cable from the iron collar around the condemned man’s neck runs up to a pulley and back down to a spool connected to the back of an old bubblegum machine.
His cell, open to the city’s elements and bustling streets, sits next to the coin-operated spool.
A quarter [dollar] turns [the spool] a quarter [of a] turn. But istead of dispensing bubblegum, it dispenses justice by winding up the wire like a winch.
A half dollar for a half turn. A dollar a turn.
One good turn deserves another, so people line up at the machine to take turns buying turns.
This is the old model. Gallows 2.0, out next quarter, accepts Visa, Mastercard, and Bitcoin, and you can buy forward OR BACKWARD turns (to loosen the noose) while viewing through the cell’s webcam over the Internet.
Welcome to Justice 2.0
April 1, 2014