Wednesday, August 22, 2012

MIracles and wonders: lab in a shoebox


Checking to see if she has a brain.
A scientific instrument featured on CSI and CSI: Miami for instant fingerprint analysis is forging another life in real-world medicine, helping during brain surgery and ensuring that cancer patients get effective doses of chemotherapy.
The instrument, called a "desorption electrospray ionization" mass spectrometer, or DESI, is about the size of a shoebox. Students have  carried it into a grocery store and held it close to fruits and vegetables to detect pesticides and microorganisms. 
It has also been used to identify biomarkers for prostate cancer and to detect melamine, a potentially toxic substance that showed up in infant formulas in China in 2008. In addition, DESI can detect explosives on luggage.
Now scientists want to  test the instrument in the operating room during brain cancer surgery, comparing it with traditional analysis of tissue samples by pathologists.
DESI can analyze tissue samples and help determine the type of brain cancer, the stage and the concentration of tumor cells. It also can help surgeons identify the margins of the tumor to assure that they remove as much of the tumor as possible.
 Innovations in medicine like this are happening all the time, and we are hardly aware of them.

Friday, August 17, 2012

I wonder if this will get noticed

Looking in my window right now.

Do you ever wonder if the things you write online or say on the phone are being picked up by the supercomputers of some super-secret agency, which then sends serious looking dudes in black outfits and night vision goggles out to your house to peer in your windows?

I do.

Reviewing a book about privacy, Ronald Bailey writes in The Wall Street Journal:
It's worth recalling the Pentagon's attempt to deploy Total Information Awareness, in which a gigantic data-mining enterprise would troll through commercial and government databases to generate data profiles of any American based on his credit-card purchases, travel itineraries, telephone records, email, medical histories and financial information.
Public outrage supposedly stopped the program, yet it turns out that the National Security Agency is building a huge data center in Utah that may well realize the earlier program's surveillance goals. Even now, according to a 2010 article in the Washington Post, "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." 
News reports in July revealed that, in the past year alone, cellphone carriers responded to 1.3 million demands from law enforcement for subscriber records, including text messages and caller locations. Mr. Keizer asserts, rightly, that "the ultimate check on government as a whole is its inability to know everything about those it governs." State ignorance is its citizenry's bliss.
I'd just like to say to the smarty pants NSA that if you can find my keys I'd appreciate it.

Friday, August 10, 2012

It's getting real spooky out there


Boo! I see you!
Too many people want to know what I'm doing.

The Army is testing its $517 million spy blimp in the skies over the New Jersey military base where the German airship Hindenburg crashed in 1937.

Bosses who want help gauging employees' morale can now turn to Microsoft's workplace social network, Yammer. A new feature offers managers a kind of emotional surveillance system, showing which feelings workers are expressing in messages posted to a company's Yammer network, which has similarities to both Facebook and Twitter.

A new app released by President Obama’s campaign team has raised privacy fears. The free Obama for America app – which can be downloaded for the iPhone and Android – gives users the first name, last initial, gender and addresses of registered Democrats. “Sign up to canvass—then get started right away with a list of voters in your neighborhood. Access scripts and enter feedback and responses in real time as you go,” the campaign states on its website.

When Google imagines the future of Web search, it sees a search engine that understands human meaning and not just words, that can have a spoken conversation with computer users and that gives users results not just from the Web but also from their personal lives.

I see you, too.
A dramatic new way to track criminals and potential terrorists was unveiled Wednesday by Mayor Michael Bloomberg and NYPD Commissioner Ray Kelly. It melds cameras, computers and data bases capable of nabbing bad guys before they even know they’re under suspicion. The system uses 3,000 cameras positioned in Lower Manhattan south of Canal Street, river to river, and between 30th and 60th streets, river to river. It links up to license plate readers, 911 calls and other NYPD data records.

Researchers at University College of London have applied principles of radar used in defense and designed a detector using home based Wi-Fi routers to spy on people across walls. Using the principles behind the Doppler effect they have built a prototype unit that uses Wi-Fi signals and recognizes frequency changes to detect moving objects.

Wednesday, August 8, 2012

MIracles and wonders: swallow this, touch that

Take two and call me in the morning.
I don't think we fully appreciate that we're in the midst of a revolution in medicine.

The US Food and Drug Administration has approved a grain-sized ingestible digital sensor that can be swallowed in a pill to track health data from inside the body. The idea is that the data can be used not only by patients themselves, but also by caregivers and doctors to individualize their care. The signal that it sends from the stomach travels through the patient's body to a patch worn on the skin. The patch contains technology that senses the signal and records the exact time the ingestible sensor was swallowed.

It is clear that all kinds of products and services  would be available online if we had the bandwidth. Programs that involve massive transfers of data or frequent two-way video communications would be two obvious examples. What’s interesting is how many of these new products and services involve healthcare: Jeff Pfaff of Overland Park, Kan., says he hopes to use the service to “push the limits” of a health-monitoring system he’s building. It would enable at-home patients to teleconference with doctors and family members via a camera hooked up to a TV set and a remote control.

European researchers say they have developed the world's first real-sized, five-fingered robotic hand able to grasp and manipulate objects with human-like dexterity. The team  built a hand using strings that are twisted by small, high-speed motors in five fingers, each with three segments. The device was able to handle a delicate Easter egg and lift a five kilogram load. Light sensors were attached to the hand, making it possible to calculate the force required for the fingers to grasp an object without squashing it or losing its grip.

Tuesday, August 7, 2012

The story of your health in a black box


Yikes! That hurts!
For years I thought that one answer to our broken healthcare system was electronic health records. I still think so, but with a lot of caveats.

The federal government is pushing hard for their adoption. Physicians, driven by the promise of better care, cost savings and nearly $23 billion in new federal incentive payments, are racing to turn their scribbled medical records into digital files, Smart Money reports.
Thirty-five percent of hospitals now use such systems, more than double the share two years ago, according to U.S. government figures. But for all the hype about electronic records, little attention has been paid to what some say is a serious weak spot: When those sensitive bits and bytes fall into the wrong hands, it's often patients who feel the pain.
Here's the trouble.
Since 2009, there have been more than 420 security breaches involving the records of some 19 million patients, according to the U.S. Department of Health and Human Services' Office for Civil Rights. And such breaches are on the rise. A December 2011 report by the Ponemon Institute, a security-research firm, found that the frequency of data losses and thefts among health care organizations increased 32 percent over the previous year.
This is one reason I'm a skeptic about a national healthcare system. Already too many computer systems are familiar with my body.

Monday, August 6, 2012

A doctor in your hand

Is there a doctor in the House?


Health-related apps for smart phones are coming of age. Here are some of the latest.
  • One of the latest device-and-app creations to pass muster with the federal Food and Drug Administration is iBGStar, a blood glucose meter that attaches to iPhones or iPads for diabetes monitoring. It's a product of Bridgewater, N.J.-based Sanofi, and sells at Apple retail stores and Walgreens drugstores for about $100 and $75, respectively.
  • Heart-EKG uses the iPhone's microphone or camera flash to calculate users' average number of heartbeats per minute or to take their pulse, after placing the phone over an artery, and activating the app. Dallas-based Surich Technologies says the app is handy for aerobic workouts, but isn't intended as a lifesaving monitoring device. It's downloadable from iTunes, for $2.99.
  • The iHealth Wireless Blood Pressure Wrist Monitor, expected on the market in September, measures users' blood pressure directly from their iPhone, iPad or iPod Touch. Its app records systolic/diastolic numbers, heart rate and pulse wave, and can chart blood pressure readings, says Karyn Anderson, spokeswoman for Mountain View, Calif.-based iHealth Lab.
  • AliveCor Heart Monitor has developed an electrode-studded cellphone case that turns the iPhone 4 into an electrocardiogram device that users hold in their hands or place on their chests to detect irregular heart rhythms. Combined with the app, the monitor can analyze, transmit and store an ECG reading for diagnosis. The heart monitor has been through several clinical trials, said physician David Albert, the device's inventor and co-founder of San Francisco-based AliveCor. He hopes to introduce it for veterinarians' use for dogs, cats and horses later this summer. The device doesn't yet have FDA approval.
  • A cellphone-based E. coli sensor for water and other fluids is under development by a University of California-Los Angeles research team. Commercial manufacture of the system, which uses a lightweight attachment to the phone's camera, could be only two years away, said team leader Aydogan Ozcan, a UCLA associate professor for electrical engineering.
  • San Francisco-based CellScope's otoscope attaches to the phone's camera lens and will enable parents to photograph their child's eardrum, and e-mail the images to medical professionals checking for an ear infection. CEO Erik Douglas says he hopes to get this to market in about a year.

Wednesday, August 1, 2012

Everyone's doing it

Social technologies have been adopted at a faster rate than any other media technology, according to the McKinsey Global Institute.
While it took commercial television 13 years to reach 50 million households and Internet service providers three years to sign their 50 millionth subscriber, it took Facebook just a year to hit 50 million users. It took Twitter nine months.

In May 2012, Facebook logged its 900 millionth user. It is estimated that 80 percent of the world’s online population use social networks on a regular basis. In the United States, the share of total online time spent on social networking platforms more than doubled from January 2008 to January 2011, from 7 percent to 15 percent. Moreover, social technologies are replacing other Web applications and uses; use of e‑mail and instant messaging are off sharply in the past few years.
Today, more than 1.5 billion people around the globe have an account on a social networking site, and almost one in five online hours is spent on social networks— increasingly via mobile devices.
 Most of those folks are reading this blog. No wait, that's not true. I just made it up.

Tuesday, July 24, 2012

Are you a two-screener?


Early adopters.
My first hint of this was watching my son watch TV. He is arrayed on the couch in a position that might be described as a half-hearted attempt at a headstand. He's watching TV, doing something with his iPad, and texting friends on his phone.

If he had more hands he'd no doubt be working some other device.

This is what the information technology giant Tata Consultancy Services calls "the second screen" -- some other device in use while you're in front of the TV. Increasingly TV producers are trying to take advantage of this.
Tweeting while watching TV began this convergence once companies realized that people continued to use smartphones even while doing other things. This also involved going to other internet channels like YouTube to continue the experience they had on the first screen – the TV.
Networks such as The Discovery Channel are engaging in conversations with viewers and building a growing network of fans. With its vast assortment of networks, including the Animal Channel, the company manages 70 Facebook fan pages with 40-million fans and 20 Twitter accounts with 2.4 million followers. 
Wow. I thought they just showed films of cute deer eating leaves. Every now and then when I turn on an NCIS rerun to take my nap I see some sort of invitation inviting me to go online for something or other. Why would I do that?

The apps are out there, of course.
Some of the most popular apps include Miso and GetGlue. These sites provide an app that allows you to select the show of your choice and join the conversation with others in your network even if the show is not being aired currently. Both apps can be linked to your Facebook or Twitter community, allowing you the opportunity to interact with others who share a similar interest.
If I knew how to work my smart phone I might try it. Get this:
ABC was one of the first to try out the Second Screen with this experiment on its property My Generation, in 2010. This iPad app creates a seamless, two-screen, interactive television experience by bridging a cable / satellite connection and an iPad, by measuring analog sound waves using the iPad’s microphone. It looks for certain contours in the audio signal so that it knows when to display a particular poll or other item linking up with a precise moment in the show. This can also trigger ads or links on the Second Screen app, where an ad will be displayed on the primary screen first and then reveal more in depth content through the app.
But will it get up and fetch me some ice cream?

Monday, July 23, 2012

Our tinker toy electrical system

Doesn't take much.
James Woolsey, former director of the CIA, reminds us how rickety our electrical grid is.
Some two weeks after Secretary of Defense Leon E. Panetta warned of a potential “cyber-Pearl Harbor” involving a possible attack on the electric grid, Mother Nature took the cue and hit the East Coast with a storm that left millions of us for days without electricity from the grid. 
Some said silent thanks for that old generator they’d thought to stick in the garage. Though it wasn’t a cyberattack, but Mother Nature gave parts of the grid a good lashing anyway. 
On my country road south of Annapolis, two transformers were blown down from their perches on telephone poles, and the leaking oil and surging electricity produced 20-foot flames. In the meantime, our driveway was filled for days with 15 Baltimore Gas and Electric Co. trucks and about 25 electrical workers from Arkansas erecting new poles and replacement transformers. 
And that was just to deal with five days of outage, caused by falling tree branches, for a very small community on one short country road. What would it have taken to deal with damage that was far more extensive across a number of states because it had been planned by a group or nation that wanted, above all, to destroy our society? 
The electric grid is the heart of our ability to function as a society. We have 18 major infrastructures that keep our civilization operating — water, sewage, telecommunications, transportation, etc. All 17 of the others depend in one way or another on electricity. Imagine what it would be like for an electrical outage to last for months or years as a result of a cyber- or terrorist attack instead of merely for days. 
Without electricity, we are not just back in the pre-Web 1970s, we are back in the pre-grid 1870s. Very few of us have enough plow horses or manual water pumps.
As I write some guys are downstairs sanding the family room floor. In preparation I unplugged the computer and peripherals. Then I came upstairs to work. Ah! No wireless! I had to rig everything up in the basement, where for some reason the previous resident installed a phone plug. A minor thing, but a reminder of how much we depend on electrical and other connections.

Saturday, July 14, 2012

A phone on your wrist

"Hello. My hand is busy right now."
Several months ago two things happened simultaneously. One, all of the batteries in my watches died. Two, the jeweler where I'd gone for years to have the batteries replaced went out of business.

So for a while I didn't wear a watch, and I realized that I didn't miss it. Everyone carries a cell phone now, and the network-supplied time is presumably more accurate than a watch we set ourselves.

Then I began to image that the watch of the future would be our phones. I just now came across one somewhat bizarre rendering of this idea.

The photo to the right shows Italian designer Federico Ciccarese's concept. He is well known throughout the blogosphere for his Apple product concepts. Now Ciccarese has released a futuristic iPhone concept that takes a very different approach to wearable technology.

I don't know why he thought interlacing it with your fingers was a good idea. Otherwise, why not?

Thursday, July 12, 2012

If you can't stand the heat

It's about 137 degrees outside, but who's counting? Wait, I just made that up. It's actually 127. Thank goodness the AC is working. Here's a bit of the history of why that's so.
  • In the 2nd century, a Chinese inventor, Ding Huan, devised the rotary fan. As big as six feet across and manually powered, it could cool a whole room. In British India, wealthy homes had a cloth sail called a punkah attached to the ceiling. A servant in another room, the "punkah wallah," would move the fan back and forth by means of a rope and pulleys. These methods, of course, required the poor to get hotter so that the rich might be cooler.
  • In 1758, Benjamin Franklin experimented with the rapid evaporation of volatile liquids, such as alcohol and ether, to cool water to a point below freezing. He was able lower the temperature to 7 degrees Fahrenheit from 64. In a letter to a friend, Franklin wrote that the experiment showed that, scaled up, "one may see the possibility of freezing a man to death on a warm summer's day."
  • Sixty years later, the great British physicist Michael Faraday demonstrated that one could use mechanical power to compress a volatile substance such as ammonia into a liquid—and then, by allowing it to rapidly evaporate, cool water.
  • Soon after, John Gorrie—a young doctor living in Apalachicola, Fla.—had a problem to solve. He knew that patients were more likely to survive an illness in cool weather than in hot. So he rigged up pans full of ice near the ceiling in a hospital room. The ice would cool the air around it and, because cold air is heavier than hot air, would flow downward, over the patient and then out through holes in the room's floor. It was the first effective system of air conditioning.
  • But ice was expensive in Apalachicola because it had to be imported by ship from the North, so Gorrie began to experiment with making ice by mechanical means. In 1851, he was granted a patent on a machine that worked on Faraday's principle. He quit medicine to work on perfecting his invention, but when his financial backer died he was unable to carry on and died in poverty in 1855.
Bummer.
  • In 1902, Willis Carrier, a young engineer at the Buffalo Forge Company in Buffalo, N.Y., invented the first modern air conditioning, to cool a printing plant. He used a compressor to liquefy ammonia and then evaporated it to cool water. Running the water through coils, he blew air across them, cooling the air and causing it to lose moisture through condensation on the coils. The air was then ducted into the workspace.
  • While useful for industrial purposes, Carrier's air-conditioning system was both large and dangerous, as ammonia is very toxic. But by the early 1920s he developed a much more efficient compressor and started using a much safer refrigerant called dielene as the volatile. (DuPont would invent Freon in 1928.)
As with all major inventions, air conditioning has had profound consequences. Washington, D.C., used to be nearly deserted in the summer because of the city's notorious heat and humidity. Today, the government runs year-round. That's not necessarily progress.

Tuesday, July 10, 2012

Stuff you really need to worry about

Sun suffers globalistical warmening.
The sun is a tempestuous mistress - and her outbursts are becoming more and more violent as the weeks go on.
NASA's Solar Dynamics Observatory spotted the summer's first 'X' solar flare on Friday -- a huge outburst from the sun right at the top of the scale. 
This came on the back of 12 'M' flares in just six days, with a M6.1 flare knocking out radio signals across the planet on Thursday -- hinting at the destruction the sun could reign on our technology if Earth takes a full blast across its blow.
(The biggest flares are known as 'X-class flares' based on a classification system that divides solar flares according to their strength. The smallest ones are A-class, which are similar to normal background levels, followed by B, C, M and X.)
The sun is now heading into the peak of its 11-year solar flare cycle, with 2013 expected to the tumultuous year. With the increased spread in communications in the last 11 years, a sever solar storm could cause huge issues for the planet.
Radio blackouts occur when the X-rays or extreme UV light from a flare disturb the layer of Earth's atmosphere known as the ionosphere, through which radio waves travel. The constant changes in the ionosphere change the paths of the radio waves as they move, thus degrading the information they carry. This affects both high and low frequency radio waves alike.
Solar activity runs in 11-year cycles, with the current one peaking in 2013, so more violent space weather is on the horizon.

Dr. Matthew Penn, of the National Solar Observatory in Arizona, said recently: "Because the sun is becoming more active, it will have an impact on millions of people. Sunspots can cause the biggest and most damaging space storms that occur. 
"During the next two years, we are expecting the number of sunspots visible on the sun to reach a maximum. We know that sunspots are the source of a lot of space weather and solar storms, so we expect a larger number of solar storms here at the Earth."
The biggest impact will be the difficulty in spreading hysteria about globalistical warmening.

Friday, June 29, 2012

This is creepy, but you're creepier


Creepy.
One day, people won’t have to type queries into a box to search for information. It’ll be delivered to them, via their various screens, based on where they are, who is nearby and what they might like and need to know.
Google gave a glimpse of that future this week at its developer conference in a feature called Google Now, which will act as a kind of automated personal assistant on Android smartphones. The service, which will roll out as part of the next update to Google’s mobile operating system, will do things like remind an Android owner of a lunch date — but also who it is with, how to get there and when to leave, based on current traffic congestion. And based on your past Google searches, it will keep you up to date on flight information and sports scores. 
It’s easy to see how this kind of service could be helpful. It’s also really easy to see how it could be creepy. What’s harder, however, is to see the line between the two, and to know where (and when) Google might cross it.
The features that Google Now offers are mostly already available in some form or another, through third-party mobile apps and services.
But it gets weird when Google starts to extend its reach into that territory, because Google already knows so much about us — things like who we e-mail and talk to the most, along with what we search for. When those smaller bits of data begin to get linked together in a more meaningful way, that knowledge can take on a larger, different context. 
A standalone app that pings you to let you know when friends are nearby might feel like a friendly little helper. Google doing it might feel like a menacing stalker. In addition, a service like Google Now may also cause people to realize exactly how much data and information Google actually has about their routines and daily lives. And that might cause some people to be very, very uncomfortable, regardless of how useful the service is.
I'll tell you what's creepy: this guy who follows me around telling me when my next appointment is. I think it's my dentist.

(Thanks, Bruce)

Wednesday, June 27, 2012

I got a charge out of this


Charging iPads.
The annual cost of charging your iPad tablet -- based on fully charging it every other day -- is $1.36, according to a study by the Electric Power Research Institute,
"The analysis shows that each model of the iPad consumes less than 12 kWh of electricity over the course of a year, based on a full charge every other day," EPRI said. "By comparison, a plasma 42" television consumes 358 kWh of electricity a year.
Apple said 67 million of the devices have been purchased worldwide, the power institute said. EPRI calculations found that the average energy used by all iPads in the market is approximately 590 gigawatt hours.
"In a scenario where the number of iPads tripled over the next two years, the energy required would be nearly equivalent to two 250-megawatt (MW) power plants operating at a 50 percent utilization rate. A quadrupling of sales in two years would require energy generated by three 250-MW power plants," the power institute said.
"These results raise important questions about how the shifting reliance from desktop to laptop to mobile devices will change energy use and electricity requirements for the information age," EPRI Vice President Mark McGranaghan said. "At less than a penny per charge these findings bring new meaning to the adage, 'A penny for your thoughts.' "

I'm guessing that some intern in the public relations office came up with that and is real proud of himself.

Wednesday, June 20, 2012

Something new to worry about online


Be careful what you click on when searching the Web; the international cybercrime community is coming for you.

That's the message from Internet security firm Blue Coat, which earlier this year found that poisoned search engine results remain the number one malware threat on the Web, accounting for a full 40 percent of all cyberattacks in 2011.
The popular bait-and-switch tactic is nearly four times more likely to snag unsuspecting users than the once common email-based approach, which now only accounts for 11 percent of attacks. Social networking rounds out the top three threats with 6.5 percent. The Blue Coat report was based on an analysis of the Web traffic of more than 75 million users. 
"Searching is at least as dangerous as going into your email in-box and clicking on things," Chris Larsen, Blue Coat's chief malware expert, recently told USA Today.
The scam works like this:
The bad guys set up themed "bait sites" using terms that are likely to show up in search engine results, as a way to trick users into visiting their sites. When the unsuspecting user clicks on a poisoned result in their search engine, thinking they are going to a legitimate site related to their search, they are served a site designed by the phishers to gather their financial information or get them to download a piece of malware or otherwise fall victim to whatever scam they are running. In many cases, users don't even know they have been victimized until it's too late.
What you can do.
  • Scan the site description — Google and Bing display two lines of "flavor text" alongside their text search results, which can provide clues to the site's provenance. "Look for disjointed, random text, like it was mashed up by a computer (because it was)."
  • Check out the domain name — "Is it one you've heard of? Does it seem to have something to do with the topic you were searching for?"
  • Preview before clicking — "Google now has a 'preview' feature, where text-search results have a little button to the right. If you hover your mouse on it, it will display an image of the page. This lets you see if the page 'looks legit.'"
  • Know your top level domains (TLDs) — "There are a lot of two-letter TLDs assigned to specific countries: .RU = Russia, .IN = India, etc. If you're searching for a U.S. culture topic, like Halloween costume ideas, or Thanksgiving recipes, or Christmas decorations and your search returns results on .RU or .IN, etc, ask yourself if it's likely that a site hosted there would really have good content about your search topic."
  • Use protection — It's always important to protect your computer with antivirus and antimalware software, which will block many of the malicious infrastructures that run search engine poisoning attacks.
Learn more.

Friday, June 8, 2012

Let's talk. Not.

People just aren't talking anymore. I let Google pick up my voice mail, and it tries to transcribe it, with about a 50 percent success rate. That's enough to let me know what's up. So I have fewer buttons to push -- and fewer people to talk to.

People are switching from voicing to texting in such numbers that wireless carriers are considering switching to unlimited plans to keep revenue up. 
They have reason to worry: the average length of a local call has fallen more than 50% over the last decade to around 1.8 minutes, according CTIA, The Wireless Association. The only time certain people bring the phone to their ear may be to avoid talking to those around them, studies show. Some 13% of people in a Pew Research Center survey said they actually pretend to be on their phones in order to avoid “unwanted personal interactions.” 
Instead, adults have joined the ranks of teenagers and now let their thumbs do the talking. 
One-in-three Americans said they’d rather text than call, according to a 2011 study by Pew Research Center. In fact, the survey found that Americans send an average of 41 texts a day – with those aged 19-25 sending an average of 110 texts a day. Wolfgang Luckmann, a Yulee, Fla.-based acupuncturist, treats patients with “thenar tendinitis,” an inflammation of tissues in the thumb mainly due to incessant texting: “In the old days, people had neck spasms from talking on the phone. Now, they’re getting this.”
People used to deliver good news by phone. These days, they’re just as likely to brag about their kids in a Facebook status update. Why? It reaches more people and it’s less time-consuming. 

Mostly, however, why should you want to listen to them pretend to care?

Wednesday, May 23, 2012

Say cheese


You look marvelous, darling!

Here's what Facebook and similar sites want from you: pictures.

In the online arms race between Apple, Facebook, Google, and others, control of the world’s snapshots is seen as vital – and lucrative, Quentin Fottrell writes
Pinterest, an online scrapbook that lets users share and comment on their favorite images, had over 20 million users in April, up from one million in July 2011. The startup just raised $100 million. Facebook, meanwhile, added to its image arsenal Monday, snapping up the London-based photo-sharing service Lightbox for an undisclosed fee. Apple too is upgrading its iCloud online service to include new photo-sharing features.
“Photos are the real currency for social networks,” says social psychologist Matt Wallaert. “We want to know, ‘What does she look like now? Who did she marry? How great is her life?’ They are much more revealing than reading a status update.” 
People share over 200 million photos on Facebook every day, or six billion per month. Larry Rosen, author of iDisorder: Understanding Our Obsession with Technology and Overcoming Its Hold on Us, says it makes people feel like trendsetters, photo-journalists and celebrities. “We’re presenting ourselves as stars,” he says. “That’s why fan magazines and reality shows are so compelling. This is the online equivalent.”
But there are other reasons.
  • Like bank accounts, photos are “sticky.” Whether they’re Facebook pictures of your Aunt Ida eating an ice-cream in Yellowstone Park or a random picture on Pinterest of patriotic candy, it’s difficult to move months or years of digital memories to a rival site. “The time and effort required to move those photos to some other type of digital storage is significant,” says Michelle Barnhart, assistant professor of marketing at Oregon State University College of Business. 
  • Aside from the images themselves, the location data and other personal information embedded in the files may also be lucrative to advertisers.
  • Endless photo posting by friends also keeps people trawling through albums and clicking, enabling sites to charge more to advertisers and generate revenue. 
And you thought it was just one big friendly place.

Friday, May 18, 2012

Neat hair and confident voices

Paul Graham is an essayist, programmer, and investor on who should run a startup:

"Sometimes the VCs want to install a new CEO of their own choosing. Usually the claim is that you need someone mature and experienced, with a business background. Maybe in some cases this is true. And yet Bill Gates was young and inexperienced and had no business background, and he seems to have done ok. Steve Jobs got booted out of his own company by someone mature and experienced, with a business background, who then proceeded to ruin the company. So I think people who are mature and experienced, with a business background, may be overrated. We used to call these guys "newscasters," because they had neat hair and spoke in deep, confident voices, and generally didn't know much more than they read on the teleprompter.

"If you work your way down the Forbes 400 making an x next to the name of each person with an MBA, you'll learn something important about business school. After Warren Buffett, you don't hit another MBA till number 22, Phil Knight, the CEO of Nike. There are only 5 MBAs in the top 50. What you notice in the Forbes 400 are a lot of people with technical backgrounds. Bill Gates, Steve Jobs, Larry Ellison, Michael Dell, Jeff Bezos, Gordon Moore. The rulers of the technology business tend to come from technology, not business. So if you want to invest two years in something that will help you succeed in business, the evidence suggests you'd do better to learn how to hack than get an MBA."

Friday, April 27, 2012

Your computer will keep getting smaller


Itsy bitsy teeny weeny.

Moore's Law, named for Gordon Moore, who ran Intel for a time, states that the number of transistors that can be jammed on a microchip will double every two years.

We've been waiting since his pronouncement in 1965 for this to come to an end. We'll have to wait a bit longer. Intel has launched a new line of processors, named Ivy Bridge, the first  available from any company with features as small as 22 nanometers (the finest details on today's chips are 32 nanometers).

This allows transistors to be smaller and packed more densely. Ivy Bridge chips offer 37 percent more processing speed than the previous generation of chips, and can match their performance while using just half the energy.
Transistors on an Ivy Bridge processor are packed roughly twice as densely as in the most recent line of Intel chips, with 1.4 billion on a 160 square millimeter die instead of 1.16 billion on a 212 square millimeter die. Upholding Moore's Law like that required a significant redesign of the transistor, the tiny electronic switches that make up digital computer chips. Existing transistor designs—little changed in decades—could not simply be made smaller, with 22-nanometer features. That would cause them to become leaky, so that a transistor would allow some current to flow even when set to off. Intel got around that by adding an extra dimension to transistors, which for decades have been made as a stack of flat layers of material on top of one another.
Versions of the new technology for laptops are due in the summer, but more important to Intel may be the potential for Ivy Bridge chips to help it break into the market for energy-efficient processors needed for tablets and smart phones.

Tuesday, April 24, 2012

New ways of making things

The factory of the past was based on cranking out zillions of identical products, The Economist reports. But the cost of producing much smaller batches of a wider variety, with each product tailored precisely to each customer’s whims, is falling. 

A number of remarkable technologies are converging to let this happen: clever software, novel materials, more dexterous robots, new processes (notably three-dimensional printing) and a whole range of web-based services. 
The old way of making things involved taking lots of parts and screwing or welding them together. Now a product can be designed on a computer and “printed” on a 3D printer, which creates a solid object by building up successive layers of material. The digital design can be tweaked with a few mouseclicks. The 3D printer can run unattended, and can make many things which are too complex for a traditional factory to handle. In time, these amazing machines may be able to make almost anything, anywhere—from your garage to an African village.
The applications of 3D printing are especially mind-boggling. Already, hearing aids and high-tech parts of military jets are being printed in customised shapes. The geography of supply chains will change. An engineer working in the middle of a desert who finds he lacks a certain tool no longer has to have it delivered from the nearest city. He can simply download the design and print it. The days when projects ground to a halt for want of a piece of kit, or when customers complained that they could no longer find spare parts for things they had bought, will one day seem quaint.
Like all revolutions, this one will be disruptive.
Digital technology has already rocked the media and retailing industries, just as cotton mills crushed hand looms and the Model T put farriers out of work. Many people will look at the factories of the future and shudder. They will not be full of grimy machines manned by men in oily overalls. Many will be squeaky clean—and almost deserted. Some carmakers already produce twice as many vehicles per employee as they did only a decade or so ago. Most jobs will not be on the factory floor but in the offices nearby, which will be full of designers, engineers, IT specialists, logistics experts, marketing staff and other professionals. The manufacturing jobs of the future will require more skills. Many dull, repetitive tasks will become obsolete: you no longer need riveters when a product has no rivets.
Read the whole thing. Propping up a failed General Motors looks kinda stupid.

Wednesday, April 18, 2012

Come fly with me


The Flight Deck of Space Shuttle Endeavour.


From NASA: What would it be like to fly a space shuttle? Although the last of NASA's space shuttles has now been retired, it is still fun to contemplate sitting at the controls of one of the humanity's most sophisticated machines. Pictured above is the flight deck of Space Shuttle Endeavour, the youngest shuttle and the second to last ever launched. The numerous panels and displays allowed the computer-controlled orbiter to enter the top of Earth's atmosphere at greater than the speed of sound and -- just thirty minutes later -- land on a runway like an airplane.

The retired space shuttles are now being sent to museums, with Endeavour being sent to California Space Center in Los Angeles, California, Atlantis to the Kennedy Space Center Visitor Complex on Merritt Island, Florida, and Discovery to the Udvar-Hazy Annex of the National Air and Space Museum in Chantilly, Virginia. Therefore sitting in a shuttle pilot's chair and personally contemplating the thrill of human space flight may actually be in your future.

(Thanks, Rudy)

Friday, April 13, 2012

Your phone wants to hear from you

Signing on to Facebook.
I interview a lot of people on the phone. I record the interview on a digital recorder placed next to my phone, which is on speaker. I then have to listen to the recording and transcribe it.

I could probably find a more difficult way to do this if I put my mind to it.

So I perked up when I saw a piece by Walt Mossberg, the ever-astute technology columnist for The Wall Street Journal. Both Apple and Android phones allow you to dictate things to them. Whenever you see the microphone icon, just click it and start talking.

I tried it out on my Motorola Droid X. It wouldn't let me dictate email, but it did let me dictate a Word document in Quick Office. Pretty cool. Then I found and downloaded Google Voice Search, which allows me to dictate emails.

Now maybe I could do that before. I don't know. I'm fairly certain I'm the last person on the planet to catch on to this stuff.

Back to Mossberg.
On both leading smartphone platforms, I found that relatively short dictation—such as emails, texts, tweets, Facebook posts and notes—was at least as accurate, and often more, as typing on a glass screen. It was better in quiet environments, but did OK even in most noisy places like grocery stores, coffee shops and carwashes. It was also faster, since, as long as you don't have to correct numerous errors, speaking is usually faster than typing on glass.

While the microphone keys work a bit differently on the two platforms, they are basically similar. When the keyboard appears, ready for you to type, you can instead hit the microphone key and simply dictate what you want to say. The phones then send your spoken words to a remote server, which rapidly translates them into text and sends them back to the phone's screen. If corrections are needed, you make them by typing, though both platforms make this easier by indicating the likeliest errors, and suggesting alternatives.
I found that both platforms' dictation systems worked well enough for me to recommend them Mossberg concludes. In case after case, both phones got it right, or close enough to require little correcting.

Thursday, April 12, 2012

Your next back seat driver

Just as it has changed so many other aspects of life, wireless technology is about to revolutionize the way we drive.
Fender benders, rear-enders and those three-car pileups that back up traffic may be going the way of the buggy whip. 
Within a few years, cars whizzing down the highway will begin chatting among themselves. Once they all are equipped to join the conversation, every car will know the speed, distance and direction of every other car close enough to pose a risk.
Are cars slowing abruptly just beyond that tractor-trailer you can’t see around? You may get an alert, but if there’s no time for discussion, you may just feel your brakes squeeze on. A speeding pickup truck seems likely to run the red light as you approach the intersection? Your car may decide to stop rather than put you in danger.
I wish I had that kind of protection out of the car.

Monday, April 9, 2012

What Facebook knows about you

Peekaboo.
"Apps" are stylish, discrete chunks of software that live online or in your smartphone. To "buy" an app, all you have to do is click a button. Sometimes they cost a few dollars, but many apps are free, at least in monetary terms, Julia Angwin and Jeremy Singer-Vine write in The Wall Street Journal
You often pay in another way. Apps are gateways, and when you buy an app, there is a strong chance that you are supplying its developers with one of the most coveted commodities in today's economy: personal data.
Some of the most widely used apps on Facebook—the games, quizzes and sharing services that define the social-networking site and give it such appeal—are gathering volumes of personal information.
A Wall Street Journal examination of 100 of the most popular Facebook apps found that some seek the email addresses, current location and sexual preference, among other details, not only of app users but also of their Facebook friends. 
One Yahoo service powered by Facebook requests access to a person's religious and political leanings as a condition for using it. The popular Skype service for making online phone calls seeks the Facebook photos and birthdays of its users and their friends.
This appetite for personal data reflects a fundamental truth about Facebook and, by extension, the Internet economy as a whole: Facebook provides a free service that users pay for, in effect, by providing details about their lives, friendships, interests and activities. Facebook, in turn, uses that trove of information to attract advertisers, app makers and other business opportunities.
Capitalizing on personal data is a lucrative enterprise. Facebook is in the midst of planning for an initial public offering of its stock in May that could value the young company at more than $100 billion on the Nasdaq Stock Market.

Thursday, April 5, 2012

Look here

Pixels in contact lens.
Google is beginning public tests of augmented reality glasses with the codename Project Glass. A video of what the device might eventually be capable of shows someone using voice commands to send messages, take photos, share to Google+, see the locations of friends, view maps, get directions, set calendar reminders, and more.
Cramming all the functionality into a sleek set of glasses is going to take time and effort, but the Google(x) skunklabs is on it. There’s a dozen ways the product could flop, most obviously if the glasses are awkward and unstylish, but also if they’re too heavy, expensive, fragile, or the world is just not quite ready. Let’s forget those for a second. Say Google figures it out and the retail version of Project Glass (which may end up being called Google Eye) becomes wildly popular. How will this disrupt Apple and Facebook, and what should they do to defend themselves?
Have a look.

This official Google photo shows how every woman will look in the future.


Tuesday, April 3, 2012

Do you understand 4G? I don't.

Weird photo.
Luckily for us, Walter Mossberg, the Wall Street Journal's astute technology columnist, does. Here's his take.

AT&T claims "The nation's largest 4G network," and T-Mobile says it has "America's largest 4G network." Verizon Wireless boasts "America's fastest 4G network," and Sprint says it had the first 4G network, Mossberg notes.
Yet the technology used by T-Mobile, and mostly comprising AT&T's 4G network, isn't considered "real" 4G at all by some critics, and the one used by Sprint has proven to be a dead end and is being abandoned. The flavor being used by Verizon is now being adopted by its rivals, but won't be interoperable among them.
Got that? Let's continue.
4G is the fourth and latest generation technology for data access over cellular networks. It's faster and can give networks more capacity than the 3G networks still on most phones. There's a technical definition, set by a United Nations agency in Europe, and a marketing definition, which is looser, but more relevant to most consumers. It's mostly for people with smartphones, tablets and laptops who often need fast data speeds for Web browsing, app use and email when they're out of the range of Wi-Fi networks.
Okay, we're going to get technical here, so you might want to cover your eyes as you read.
LTE, which stands for "Long Term Evolution," is the fastest, most consistent variety of 4G, and the one most technical experts feel hews most closely to the technical standard set by the U.N. In the U.S., it has primarily been deployed by Verizon, which offers it in over 200 markets. AT&T has begun deploying it, offering LTE in 28 markets so far. Sprint and T-Mobile are pivoting to LTE, though they have no cities covered by it yet. 
Sprint uses a technology called WiMax. T-Mobile and AT&T deployed a technology called HSPA+, a faster version of 3G that they relabeled as 4G, and which many technical critics regard as a "faux 4G." Sprint will begin switching to LTE later this year, and T-Mobile in 2013.
Got that? So, you ask, what?
Although it is wireless, LTE is often faster than most Americans' wired home Internet service. According to Akamai, a large Internet company, the average broadband speed in the U.S. in the third quarter of 2011 was a mere 6.1 mbps.

Wi-Fi is usually a wireless broadcast of a wired Internet service, so, if the average U.S. broadband speed is 6.1 mbps, that's around what the average Wi-Fi speed is. But, in public places, the shared Wi-Fi is often much, much slower than LTE.
So who has the biggest 4G network in the U.S.?
Even if you accept all the carriers' definitions of 4G, it's hard to tell. Carriers measure the size of their networks differently—sometimes by the number of people to whom it is theoretically available, and sometimes by the number of cities and markets, which can be defined differently. Verizon has the largest LTE network. Both AT&T and T-Mobile claim the biggest 4G network, but the first has only a limited LTE deployment and the second has none.
There you go, boys and girls. I have solved this problem by sticking with 3G, which I don't understand, and which provides all the juice I need, since I don't understand how to use my smartphone anyway.

Saturday, March 31, 2012

Defending the Internet

Today is anything but a normal Saturday for the people who run the Domain Name System, which converts human-friendly domain names like google.com into numeric addresses that are more useful for computers, The New York Times reports.
They plan to be glued to their monitors, looking out for signs of unusual network traffic, communicating with one other through encrypted, digitally signed e-mails or through a private telephone hot line maintained just for this purpose.
That's because on a quiet Sunday in mid-February, something curious attracted the attention of the behind-the-scenes engineers who scour the Internet for signs of trouble.
There, among the ubiquitous boasts posted by the hacking collective Anonymous, was a call to attack some of the network’s most crucial parts. The message called it Operation Global Blackout, and rallied Anonymous supporters worldwide.
It declared when the attack would be carried out: March 31. And it detailed exactly how: by bombarding the Domain Name System with junk traffic in an effort to overwhelm it altogether.

Engineers created a fast-track, multimillion-dollar global effort to beef up the Domain Name System, adding enough computing power to handle a denial of service attack.

Personally, I think they wanted to shut down this blog.

Tuesday, March 20, 2012

Don't lose your phone


Perp.
According to a new study, if you lose your smart phone, you have a 50/50 chance of getting it back. But chances are much higher – nearly 100 percent – that whoever retrieves it will try to access your private information and apps.
According to a study by Symantec, 96 percent of people who picked up the lost phones tried to access personal or business data on the device. In 45 percent of cases, people tried to access the corporate email client on the device.
Symantec called the study the “Honey Stick Project.” In this case the honey on a stick consisted of 50 smartphones that were intentionally left in New York, Los Angeles, Washington, D.C., San Francisco and Ottowa, Canada. The phones were deposited in spots that were easy to see, and where it would be plausible for someone to forget them, including food courts and public restrooms.
Each phone also was loaded with programs to track what finders did with the devices, and to send that information to the researchers. Among people who found the phones, 72 percent tried to access photos, 57 percent tried to open a file called “Saved Passwords,” and 43 percent tried to open an app called “Online Banking.” 
Most of the apps on the phones were protected by passwords, but the username and password fields were already filled out, so that users could simply press a button to access them. Well over half of the people who discovered the phones, 66 percent, clicked those buttons to try and start the programs. The fact that the finders had to click a button to access the apps indicates that their attempts were likely intentional.
You should know that if you pick up and try to use my phone it will explode, spewing biotoxins and chemicals that will eat your flesh and make your eyeballs burst.

Wednesday, March 14, 2012

A sign of the times


After 244 years, the Encyclopaedia Britannica is going out of print.
Those coolly authoritative, gold-lettered reference books that were once sold door-to-door by a fleet of traveling salesmen and displayed as proud fixtures in American homes will be discontinued, company executives said. 
In an acknowledgment of the realities of the digital age — and of competition from the Web site Wikipedia — Encyclopaedia Britannica will focus primarily on its online encyclopedias and educational curriculum for schools. The last print version is the 32-volume 2010 edition, which weighs 129 pounds and includes new entries on global warming and the Human Genome Project. 
“It’s a rite of passage in this new era,” Jorge Cauz, the president of Encyclopaedia Britannica Inc., a company based in Chicago, said in an interview. “Some people will feel sad about it and nostalgic about it. But we have a better tool now. The Web site is continuously updated, it’s much more expansive and it has multimedia.”
Gutenberg first used moveable type 573 years ago. The World Wide Web opened for business 21 years ago. I got all of this post from the Web. You will read it on the Web.