Archive for the 'tech' Category

In-browser Mac OS 7.0.1 emulation, compatible software suite arrives at the Internet Archive

April 23, 2017

In-browser [classic] Mac OS7 emulation…arrives at the Internet
Archive http://AppleInsider.com/articles/17/04/16/in-browser-mac-os-701-emulation-compatible-software-suite-arrives-at-the-internet-archive Gr8 for old file formats if upload possible

Silicon Valley’s Quest to Live Forever

April 10, 2017

SV’s Quest to Live Forever
http://www.NewYorker.com/magazine/2017/04/03/silicon-valleys-quest-to-live-forever Cal. restriction to #Singularity: Immortalists v Healthspanners, Meat Puppets v RoboCops

QT:{{”

“Immortalists fall into two camps. Those who might be called the Meat Puppets, led by de Grey, believe that we can retool our biology and remain in our bodies. The RoboCops, led by Kurzweil, believe that we’ll eventually merge with mechanical bodies and/or with the cloud. Kurzweil is a lifelong fixer and optimizer: early in his career, he invented the flatbed scanner and a machine that reads books aloud to the blind. Those inventions have improved dramatically in subsequent iterations, and now he’s positive that what he calls “the law of accelerating returns” for human longevity is about to kick in.”


“The battle between healthspanners and immortalists is essentially a contest between the power of evolution as ordained by nature and the potential power of evolution as directed by man. The healthspanners see us as subject to linear progress: animal studies take the time that they take; life sciences move at the speed of life. Noting that median life expectancy has been increasing in developed nations by about two and a half years a decade, Verdin told me, “If we can keep that pace up for the next two hundred years, and increase our life spans by forty years, that would be incredible.”

The immortalists have a different view of both our history and our potential. They see centuries of wild theorizing (that aging could be reversed by heating the body, or by breathing the same air as young virgins) swiftly replaced by computer-designed drugs and gene therapies. Bill Maris said, “Health technology, which for five thousand years was symptomatic and episodic—‘Here are some
leeches!’—is becoming an information technology, where we can read and edit our own genomes.”

Many immortalists view aging not as a biological process but as a physical one: entropy demolishing a machine. And, if it’s a machine, couldn’t it be like a computer?

“And yet. Last year, the geneticist Nir Barzilai hosted a screening of a documentary about longevity, and afterward he posed a question to the three hundred people in the audience. He told me, “I said, ‘In nature, longevity and reproduction are exchangeable. So Choice One is, you are immortalized, but there is no more reproduction on Earth, no pregnancy, no first birthday, no first love’—and I go on and on and on.” He laughed, amused by his own determination to load the dice. “ ‘Choice Two,’ I said, ‘is you live to be eighty-five and not one day sick, everything healthy and fine, and then one morning you just don’t wake up.” The vote was decisive, he said. “Choice One got ten or fifteen people. Everyone else raised their hands for Choice Two.”

This wish to preserve life as we know it, even at the cost of dying, is profoundly human. We are encoded”
“}}

Learning and earning: Lifelong learning is becoming an economic imperative | The Economist

April 8, 2017

Lifelong Learning
http://www.Economist.com/news/special-report/21714169-technological-change-demands-stronger-and-more-continuous-connections-between-education Future for colleges? Microcredentails & Nanodegrees inspired by albums unbundled into iTunes songs

interesting view of where short “workshops” fit relative to the traditional course

QT:{{”
Scott DeRue, the dean of the Ross School of Business at the University of Michigan, says the unbundling of educational content into smaller components reminds him of another industry: music. Songs used to be bundled into albums before being disaggregated by iTunes and streaming services such as Spotify. In Mr DeRue’s analogy, the degree is the album, the course content that is freely available on MOOCs is the free streaming radio service, and a “microcredential” like the nanodegree or the specialisation is paid-for iTunes.

How should universities respond to that kind of disruption? For his answer, Mr DeRue again draws on the lessons of the music industry. Faced with the disruption caused by the internet, it turned to live concerts, which provided a premium experience that cannot be replicated online. The on-campus degree also needs to mark itself out as a premium experience, he says.
“}}

How To Host a Simple Website Using Dropbox

April 4, 2017

http://www.makeuseof.com/tag/how-to-host-a-dropbox-website/

Here, there and everywhere | The Economist

April 2, 2017

Here, there & everywhere
http://www.Economist.com/technology-quarterly/2017-03-09/quantum-devices Overview of #quantum computing mentions using it to #encrypt transmission of genomic data

QT:{{”
Thanks to the development of ever more secure links, quantum cryptography has recently been deployed more widely. ID Quantique has installed quantum links between data centres of KPN, a Dutch telecoms firm; of Battelle, an American non-profit research firm; and of Hyposwiss and Notenstein, two Swiss private banks. It offers links between financial institutions in Geneva and a disaster-recovery centre 50km away. In 2015 researchers at Toshiba in Japan began sending quantum-encrypted genomic data from a research facility in Sendai to Tohoku University, 7km away.
“}}

How the Bitcoin protocol actually works | DDI

April 2, 2017

How…#Bitcoin…works, by @michael_nielsen
http://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-works Overview focusing on why in addition to how; highlights #privacy issues

QT:{{”
How anonymous is Bitcoin? Many people claim that Bitcoin can be used anonymously. This claim has led to the formation of marketplaces such as Silk Road (and various successors), which specialize in illegal goods. However, the claim that Bitcoin is anonymous is a myth. The block chain is public, meaning that it’s possible for anyone to see every Bitcoin transaction ever. Although Bitcoin addresses aren’t immediately associated to real-world identities, computer scientists have done a great deal of work figuring out how to de-anonymize “anonymous” social networks. The block chain is a marvellous target for these techniques. I will be extremely surprised if the great majority of Bitcoin users are not identified with relatively high confidence and ease in the near future. The confidence won’t be high enough to achieve convictions, but will be high enough to identify likely targets. Furthermore, identification will be retrospective, meaning that someone who bought drugs on Silk Road in 2011 will still be identifiable on the basis of the block chain in, say, 2020. These de-anonymization techniques are well known to computer scientists, and, one presumes, therefore to the NSA. I would not be at all surprised if the NSA and other agencies have already de-anonymized many users. It is, in fact, ironic that Bitcoin is often touted as anonymous. It’s not. Bitcoin is, instead, perhaps the most open and transparent financial instrument the world has ever seen.
“}}

The Snowbot: how Edward Snowden gets around his exile

March 30, 2017

The Snowbot: how Edward @Snowden gets around his exile
http://www.theGuardian.com/us-news/shortcuts/2016/jun/27/snowbot-edward-snowden-telepresence-robot An iPad stuck to a lawnmower (w/o the blades)

QT:{{”
“Right. So it really is an iPad stuck to a lawnmower, then? A remote-controlled, battery-powered lawnmower without the blades, yes.” “}}

WikiLeaks Shows How the CIA Can Hack a Mac’s Hidden Code

March 25, 2017

WikiLeaks Shows How the CIA Can Hack a Mac
https://www.wired.com/2017/03/wikileaks-shows-cia-can-hack-macs-hidden-code/ Modifying the firmware of Thunderbolt adapters to make spyware implanters

QT:{{”
“The CIA’s documents describe a series of tools that agents can use to install “implants” on target machines, capable of silently monitoring everything that occurs within its operating system and transmitting it to a remote operator. One manual explains how to modify the firmware of a standard Apple Thunderbolt-to-ethernet adapter, turniing it into an spyware-planting tool the CIA calls “Sonic Screwdriver.” When plugged in, the altered adapter can trick a Mac into thinking it’s booting its operating from a spoofed network source that the adapter impersonates, allowing tweaks to its firmware even in the rare cases when the user has set a password for any changes to that deep-seated code.”
“}}

See how old Amazon’s AI thinks you are

March 23, 2017

See how old $AMZN’s AI thinks you are
http://www.theVerge.com/2017/2/10/14582192/amazon-ai-rekognition-age-guess-software Free via image Rekognition platform, in the dev toolkit part of @AWScloud

QT:{{”
“Amazon’s latest artificial intelligence tool is a piece of image recognition software that can learn to guess a human’s age. The feature is powered by Amazon’s Rekognition platform, which is a developer toolkit that exists as part of the company’s AWS cloud computing service. So long as you’re willing to go through the process of signing up for a basic AWS account — that entails putting in credit card info but Amazon won’t charge you — you can try the age-guessing software for yourself.”
“}}

Go From Google Drive To MS Office By Converting Your Files with Takeout

February 26, 2017

From #Gdrive To…Office By Converting Your Files w. Takeout
http://fieldguide.gizmodo.com/go-from-google-drive-to-ms-office-by-converting-your-fi-1641164077 Useful tool supporting standard DOC, XLS & PPT formats

Also supports iCal, vcard+CSV (contacts), JPEG (photos), HTML (keep), massive mbox (mail)!, MPEG (voice)…