Archive for the 'tech' Category

Blockchains: How They Work and Why They’ll Change the World – IEEE Spectrum

December 10, 2017

#Blockchains: How They Work & Why They’ll Change the World + Overview of the technology, with a focus piece on whether it applies to a particular domain. Not sure we need this in genomics…

Do You Need a Blockchain? – IEEE Spectrum

The Serial-Killer Detector | The New Yorker

December 9, 2017

The Serial-Killer Detector Journalist finds subtle yet predictive crime patterns with the computer. Wonder if #DeepLearning would be helpful here? Probably not // #CrimeMap

A former journalist, equipped with an algorithm and the largest collection of murder records in the country, finds patterns in crime. “}}

Batch Cloud Data Transfer Services – Amazon Snowball Appliance

December 9, 2017

Batch Cloud Data Transfer for @AWScloud & Snail mail trumps email for really large data. Interesting to calculate effective transfer rates as compared “Ethernet.” Surprised that I couldn’t find even crude estimates.

What Does Tesla’s Automated Truck Mean for Truckers? | WIRED

December 3, 2017

What Does @Tesla’s Automated #Truck Mean for Truckers? What does it mean for drivers?! I guess: much safer highways & fewer tailgated & terrorized motorists!

The Man Who Knows Whether Any Startup Will Live or Die

December 3, 2017

The Man Who Knows Whether Any Startup Will Live or Die Quote: “You can’t trust the model until you get all the intuition out of it.” Not sure I agree!

“Swapping out your drafty old windows for new energy efficient ones could save you a bundle in the long-term, but not everyone wants to spend the time and money to retrofit their entire home or office building. Indow Windows offers inserts that can improve efficiency without the cost or hassle of replacing the windows entirely. “Some other startups have tried this, and some of the big guys are trying to respond, but there’s a lot more innovation required to pull this off than most people suspect,” Thurston says. “In a very short timeframe Indow has zoomed up to become the market leader.”

His approach is based on turning various pieces of qualitative information—such as whether a company is a “first mover” or “fast follower” in a market—into quantitative data that he can plug into a spreadsheet. That requires a degree of human judgement, but this also requires a certain amount of rigor or consistency.

“You can’t trust the model until you get all the intuition out of it,” Thurston says. “The hard part of that is translating the qualification into yes or no questions,” he says. “How do you define the market? How do you define first mover?””


Five Best File Encryption Tools

November 26, 2017

GNU Privacy Guard v VeraCrypt – use w/ dropbox ? ease of install ?

“VeraCrypt (Windows/OS X/Linux)

VeraCrypt is a fork of and a successor to TrueCrypt, which ceased development last year (more on them later.) The development team claims they’ve addressed some of the issues that were raised during TrueCrypt’s initial security audit, and like the original, it’s free, with versions available for Windows, OS X, and Linux. If you’re looking for a file encryption tool that works like and reminds you of TrueCrypt but isn’t exactly TrueCrypt, this is it. VeraCrypt supports AES (the most commonly used), TwoFish, and Serpent encryption ciphers, supports the creation of hidden, encrypted volumes within other volumes. Its code is available to review, although it’s not strictly open source (because so much of its codebase came from TrueCrypt.) The tool is also under constant development, with regular security updates and an independent audit in the planning stages (according to the developers.)”


The future of DNA sequencing

November 14, 2017

The Future of DNA Seq. Apps v Tech. QT: “Platforms for…#sequencing have changed dramatically…Yet the trajectories of other technologies…Internet, digital
photography…suggest…real disrupters will be the resulting applications, not the new tech”

Killer applications –
Over the years, the platforms for DNA sequencing have changed dramatically (see ”). Yet the trajectories of other technologies for which there is a seemingly insatiable demand — smartphones, the Internet, digital photography — suggest that the real disrupters will be the resulting applications, not the new technologies.


A “right to repair” movement tools up – If it’s broken, you can’t fix it

November 9, 2017

A “right to repair” movement tools up – If it’s broken, you can’t fix
it Is ownership actually another form of leasing?

Google’s New Super-Secure Email Is Designed For High-Profile Targets. Would It Have Protected Hillary’s Campaign?

October 28, 2017


“The Advanced Protection Program incorporates a physical security key (a small USB or wireless device that costs around $25) to protect against phishing. The key, which participants need to buy themselves, uses public-key cryptography and digital signatures. Without the key, even someone with your password would be unable to access your account. Advanced Protection limits your Google data access to only Google apps and adds additional safeguards in the account recovery process to prevent someone from social engineering their way into your account. It also performs additional scans on files and attachments to ensure no malware is piggybacking on the download.”

#Google’s New Super-Secure Email Is Designed For High-Profile Targets Appears to be open to all. Anyone tried this?

Chips Off the Old Block: Computers Are Taking Design Cues From Human Brains – The New York Times

September 22, 2017

Computers Are Taking Design Cues From…Brains Bio-inspired computing, or the connection machine redux HT @EricTopol