Archive for the 'tech' Category

Spam: A Shadow History of the Internet Excerpt, Part 1: Scientific American

June 28, 2018

https://www.amazon.com/Spam-Shadow-History-Internet-Infrastructures-ebook/dp/B00C4UU2E8

Spam: A Shadow History of the Internet [excerpt, Part 1]: Scientific
American http://www.scientificamerican.com/article.cfm?id=spam-shadow-history-of-internet-excerpt-part-one

discusses naive bayes

A day with Sony’s versatile RX100 VI point-and-shoot

June 6, 2018

https://www.engadget.com/amp/2018/06/06/sony-rx100-vi-sample-images

Imitating people’s speech patterns precisely could bring trouble

June 3, 2018

Imitating people’s #speech patterns precisely could bring trouble
https://www.Economist.com/science-and-technology/2017/04/20/imitating-peoples-speech-patterns-precisely-could-bring-trouble Now possible to #clone your voice & your DNA…. What’s next?
QT:{{”
“Hasbro is aware, Mr Silbert notes, that without safeguards a prankster might, for example, type curses on his mother’s smartphone in order to see a younger sibling burst into tears on hearing them spoken by a toy using mum’s voice.”
“}}

Microsoft has reportedly acquired GitHub

June 3, 2018

Oh no…
https://www.theverge.com/2018/6/3/17422752/microsoft-github-acquisition-rumors

Digital Photocopiers Loaded With Secrets

May 18, 2018

Digital Photocopiers Loaded With Secrets
https://www.CBSnews.com/news/digital-photocopiers-loaded-with-secrets Suspect people will increasingly think of the “data residue” that unwittingly leave on things – & want to be clean! #Privacy HT @ProfLHunter

QT:{{”
“Nearly every digital copier built since 2002 contains a hard drive – like the one on your personal computer – storing an image of every document copied, scanned, or emailed by the machine.

In the process, it’s turned an office staple into a digital time-bomb packed with highly-personal or sensitive data.

If you’re in the identity theft business it seems this would be a pot of gold.

“The type of information we see on these machines with the social security numbers, birth certificates, bank records, income tax forms,” John Juntunen said, “that information would be very valuable.”” “}}

The Teens Who Hacked Microsoft’s Xbox Empire—And Went Too Far | WIRED

May 14, 2018

https://www.wired.com/story/xbox-underground-videogame-hackers/

The Digital Vigilantes Who Hack Back | The New Yorker

May 11, 2018

https://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-back

GP-write Cover Feature in April WIRED Magazine; Registration GP-write Scientific Meeting now open

April 21, 2018

The next best version of me: How to live forever
https://www.Wired.com/story/live-forever-synthetic-human-genome/ The @GP_write meeting & synthetic biology in the pop. press


Genome Project-write (GP-write) is featured as the cover story in the upcoming April 2018 WIRED cover story.

Reddit and the Struggle to Detoxify the Internet

April 21, 2018

QT:{{”
Toward the end, the square was a dense, colorful tapestry, chaotic and strangely captivating. It was a collage of hundreds of incongruous images: logos of colleges, sports teams, bands, and video-game companies; a transcribed monologue from “Star Wars”; likenesses of He-Man, David Bowie, the “Mona Lisa,” and a former Prime Minister of Finland. In the final hours, shortly before the experiment ended and the image was frozen for posterity, BlackVoid launched a surprise attack on the American flag. A dark fissure tore at the bottom of the flag, then overtook the whole thing. For a few minutes, the center was engulfed in darkness. Then a broad coalition rallied to beat back the Void; the stars and stripes regained their form, and, in the end, the flag was still there.
“}}

Reddit & the Struggle to Detoxify the Internet
https://www.NewYorker.com/magazine/2018/03/19/reddit-and-the-struggle-to-detoxify-the-internet Describes an interesting expt: users compete & collaborate to determine the content of white square. “Toward the end, the square was…a collage…logos of colleges…teams… [&] likenesses of the Mona Lisa”

Put your email inbox on a low-spam diet : Naturejobs Blog

April 15, 2018

Put your email inbox on a low-spam diet by @j_perkel
http://blogs.Nature.com/naturejobs/2018/04/11/clean-your-email-inbox-with-a-low-spam-diet/ #Email hygiene for the researcher – ie how to escape fake conference & journal invites + #spam calendar invites
QT:{{”

The practice of publishing their email addresses on journal articles and university web sites makes research academics ready targets for email spammers. Spam, Clemons insists, is not merely a nuisance but a time-sink. Mark Gerstein, a professor of biomedical informatics at Yale University in New Haven, Connecticut, estimates that maybe a quarter of the 200-or-so messages he receives in a day are important. “I spend many, many, many hours a week, days a week probably, going through my correspondence,” he says.

Gerstein, for instance, uses a multi-tiered approach to triage his correspondence, relying on Gmail filters, labels, and artificial intelligence. Gerstein has a whitelist — a list of ‘approved’ email addresses. Messages from those addresses are automatically routed to his inbox, where they receive the highest priority. New senders can get on that list by placing a special keyword (available on his web site) in the subject line of their message — which is how I was able to contact him.

Below that top tier are departmental messages, messages from mailing lists, and the like. At the very bottom is the obvious spam, the stuff that gets picked up by Google’s spam-detection algorithms. And in the middle is what Gerstein calls ‘almost-spam’ — messages from predatory journals and conferences, spam invitations to join editorial boards, and even spam calendar invites, which automatically add themselves to his calendar and clog up his schedule.

Gerstein advises researchers to use multiple email addresses in dealing with journals, vendors, and the like. Then, by funneling those messages to a single inbox, one can sort the messages by account and prioritize them accordingly.

Gmail is particularly useful for this purpose, Gerstein notes. Suppose you have the address ‘janesci@gmail.com’. Google allows users to modify their addresses by placing a plus sign and additional text between the username and the at-symbol — for instance,
‘janesci+amazon@gmail.com’ and ‘janesci+ebay@gmail.com’. These messages all go to the original address, but users can sort their messages based on the specific address used.

“You can use that quite powerfully to create unique addresses for all sorts of things, and to filter your email on the basis of that,” Gerstein says.

Still, Gerstein admits, spam inevitably falls through the cracks. How to spot it?
“}}