Wednesday, April 4, 2012

Augmented Reality glasses

The other day in a Google Plus post, several Google employees from the Google X laboratory asked people for input about a new prototype called Project Glass.

The prototype was shown and the well designed glasses can stream information to the lenses and allow the person who wears them to send and receive messages through voice commands. Along with that there are built-in camera and apparently built in 8G storage.

The glasses will be Android based according reports, and will have 3G or 4G data connection, GPS and several sensors.

9to5Google said that: "The navigation system currently used is a head tilting-to scroll and click. We are told it is very quick to learn and once the user is adept at navigation, it becomes second nature and almost indistinguishable to outside users."

Maybe even in the future, there could be contact lenses doing the same thing. For now, some google employees say that the glasses will be available by the end of 2012 and will cost somewhere from $250 to $600.

Wednesday, March 28, 2012

Tweeting from 10 973 meters under the sea

James Cameron, who undertook a dive (10 973 meters) with Mariana Trench's Challenger Deep on 25 March. What was revolutionary about his dive, was that he was tweeting while there. He wrote: "Just arrived at the ocean's deepest pt. Hitting bottom never felt so good. Can't wait to share what I'm seeing w/ you @DeepChallenge".

He went to the bottom by himself to collect sample of the ocean's mud as well as taking a short video. Here is more information about the deep submarine


Wednesday, March 14, 2012

Smashwords vs Paypal - about censorship and money.

With the falling cost of technology and publishing, it is easier than ever to publish your own work online and distributed for free or for money. You can choose the format, the platform and whatnot. But the recent debacle with Paypal and Smashwords leave a bitter taste for the future.

Everything started in February 2012 when the e-book distributor Smashwords received an email from PayPal saying that if certain books with "obscene" content is not removed from their inventory, PayPal will ban their services for Smashwords.

According to Paypal, when users sing for the services, they sign the "acceptable user policy" and they effectively agree with the conditions that certain content is not allowed. This includes adult content.

PayPal spokesman told CNET that "We consider what's standard across the industry, our agreements with the card associations and banks that enable us to provide service to our customers, and of course, the laws governing the sale of adult-oriented content."

According to reports, Paypal was pushed to send the email to Smashwords because of its banking partners and credit cards associations with stance on inappropriate content.

Once Smashwords received the email, they contacted the authors and told them they have to remove the inappropriate content with words like rape, bestiality or incest.

Writers decided to take action and contacted Smashwords, Paypal and the rest of the institutions. While Smashwords and Paypal were in talks about the situation the Electronic Frontier Foundation with other free speech groups joined to stand against censorship.

Finally Paypal backed down, agreeing that books with images will be no longer demanded to be removed from the category. Instead certain books will be identified, the publisher then will be contacted to respond and either remove the content or challenge the decision.

Even though some people will think this is not a big deal, it certainly can turn into one in the future. Paypal is a middle man between people and businesses and what people do with their money is of no ones business as long as no laws are broken. Furthermore, banks, credit card institutions and Paypal receive transfer fees, so why would they need to but into people's decision what books to buy.

With more and more people buying online, we will become highly depended on services like Paypal and online payments, but we should not allow them to tell us what we can and cannot buy with our money.

Resources:
http://www.courthousenews.com/2012/03/14/44701.htm
http://www.publishersweekly.com/pw/by-topic/industry-news/publisher-news/article/50946-censorship-battle-catches-smashwords-in-the-middle.html
http://news.cnet.com/8301-1023_3-57392939-93/paypal-demands-obscene-e-books-be-pulled/

Wednesday, February 15, 2012

Crowdfunding: part of the crowdsource movement


We are now entering an era when new set of paradigms challenge previously established ones. We talk about micro, scale and we are concerned about obtaining funds for new and creative endeavors. But we also have witnessed the rise of crowdsourcing as a business model.

In the case of crowdfunding, the goal is the financing of a project by a group of individuals. Raising funds by tapping the crowd is the most important element of crowdfunding. This is done generally by using social networks through the Internet and by it, consumers volunteer to provide financial backing for the development of a project, often purchasing a product that is not in the market yet.

Take for example Casey Hopkins, who submitted a project to Kickstarter for making a better dock for the iPhone. He asked for $75 000. Instead he received $1.5 million.

The project was successful not only because he wanted to make something useful, but also because he was able to leverage the community. He excited them with his idea, identified the key influences that were blogging about projects, along with spreading the news on Twitter. 

He used the social networking tools perfectly to generate a talk about his idea and raise the money. For example - just two hours after he kicked off the campaign on the social networking sites, he had over $25k. Along with that, he also engaged with his community, sending messages, updates and thank yous.

This is a new way of thinking about funding projects, embracing the crowdsourcing movement in a different way, but engaging nonetheless. And the best part: you have a build in customer base even before you've created your project and all of them want you to succeed cause they invested in your idea.

Saturday, January 28, 2012

From Paper Mill to Data Center for Google

Google created in 2010 a data center from an unused paper mill in Hamina Finland.

According to reports, Google have paid app. $52 million for the mill, claiming it to be the perfect place to build their new data center. As usual, Google was thinking creative, deciding to use the environment and leverage on the already built in granite tunnels (450 meters deep) for pumping water from the Baltic and using it to cool the servers. But before they return the water back to the sea, they cool it down again by mixing it in a separate facility with cold water from the Baltic.

And if it becomes too hot in some of the data centers for the servers to even run, Google uses its propriatary and usually not talked about software tool called "Spanner" which from a presentation in 2009 is described as “storage and computation system that spans all our data centers and that automatically moves and adds replicas of data and computation based on constraints and usage patterns.”

It is interesting to see the decline in the paper print businesses and the closing of mills, newspapers only to be substituted by the new type of data distribution systems. Change and progress are incredible when creativity is used.



You can read more from Wired, The Registrer

or you can see the video from Google Efficient Data Centers Summit in 2009 giving more information about the technologies they use in their data centers. 

Friday, March 4, 2011

Augmented Reality and social networks

Chapter #6 deals with social networks, virtual reality and mobile usage, so I decided to talk about Augmented reality and social networking

Social networks is increasingly popular term, with hundreds of social networking sites popping up every single day, ranging from general interest to more eclectic types. Now it is easier than ever even to start your own social networking site with just a few steps.

And this hype will probably be enhanced my increased mobile (and tablets) usage.Just imagine how good is it if you meet someone and have no recollection who she/he is, but you instantly check through the social networks - and there you go - brief description of that person. And it is possible because nowadays people voluntarely share that information with the world :)

But can we add a social networking touch to Augmented reality or vise versa?

First of all let's describe what is Augmented reality
- The idea is straightforward enough: take a real-life scene, or (better) a video of a scene, and add some sort of explanatory data to it so that you can better understand what's going on, or who the people in the scene are, or how to get to where you want to go.Augmented reality: it's like real life, but better in the words of Charles Arthur (Guardian, UK).



 TAT (The Astonishing Tribe)



Augmented reality is still in its early steps, but there is no doubt that with the increased usage of social networks, smart mobile phones and tablets, AR will be incorporated somehow in the future. The question is whether the people would be able to opt out from that option?


For more information about augmented reality and social networking click here

Tuesday, February 22, 2011

Social Engineering

Chapter #10 deals a lot with security, different types of penetration, encryption and so on, but I think it misses one fundamental part of the equation. And that is that people are the weakest link in that particular system. What exactly do I mean:

1. Users continuously disregard IT recommendations for better password, they often use birthday+name of child/spouse or something similar, making it easy for hackers.
2. Not following security protocols. While I was working as system administrator, we had to support a media business, which had a Linux server with all necessary components, plus an ORACLE database for their specific needs.

The server, the main PBX switch, the routers were all in the communication room, which is supposed to have its own  cooling system and should be locked all the time. The specific problem arose when someone unlocked the door, stopped the cooling cause according to them it was too loud for the neighbours, but in the end of the day left the door open. Later the same night while I was working remotely on the server, my connection was dropped around 1AM. I thought it is a power problem, and even though until 3AM the server was not back on, I decided to go to bed, thinking I will just have an early morning when the power was on.

Imagine my surprise when I get a phone call in the morning that this was not a  power problem, but a burglary. They cut the phone lines, the cable lines and went in the office. Now, that particular firm had very good database, worth several milion, and because the door to the server was left open - the thiefs could just pick up the server and leave. Thanks to their own stupidity, and not being from the competition, they only took the office safe box, that had inside no more than 3000$, leaving the server and the important information intact. But because of several people in the office this story could have a bad ending.

Another example is employee stealing - the managers in another business did not contact IT to say one particular employee is leaving and that his access should be terminated, resulting in his ability to download an entire HR database and going with it to the competition.

One of the last examples is the so called "Social engineering" - which is  is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create attack techniques like:

Pretexting
Pretexting is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.

Phishing
Phishing is a technique of fraudulently obtaining private information. Also there is a phone phishing, extracting information from an employee through a phone call.

Quid pro quo
Quid pro quo means something for something:
An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them.

There are many other techniques, and a lot of them are described in Kevin Mitnick's book "The art of deception". And even if you think that people should be aware and trained not to fall victims to that kind of social engineering, actually it is quite often.