Start up: iMessage v Android, Waze in Costa Rica, Google knows your face!, and more


A bit like Costa Rica’s maps. But here comes Waze! Photo by Ted’s photos on Flickr.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Back to Android » AVC

Rather like those rich people who split their time between whichever hemisphere is sunny, venture capitalist Fred Wilson spends six months a year on an iPhone, and six on an Android phone:

After a few days on iOS I wrote a post about what I liked and did not like about iOS. Reading it now after six months on iOS, it is still pretty accurate. But now that I am back on Android, the two things I really miss about he iPhone are TouchID and iMessage. If Android had both of those two things, I wouldn’t miss anything. I don’t totally understand why Apple doesn’t make an iMessage client for Android. They have the most popular messenger in the US (maybe the world) and they aren’t taking advantage of it. They are doing the same thing with iMessage that Blackberry did with BBM.

Is this man really trusted with other peoples’ money? BlackBerry didn’t fail because it didn’t open BBM; the opposite is true – people stayed on the platform despite its worsening lack of apps because of BBM. (But eventually the lack was too much.) Similarly, iMessage is a USP (unique selling point) for iOS and OSX; making an Android version would add no value to Apple at all. (And in all the fulminating comments, nobody points this out.)


Why Google’s struggles with the EC – and FTC – matter » The Overspill

ICYMI, I read the (half) FTC report so you don’t have to. And:

“Google doesn’t have any friends,” I was told by someone who has watched the search engine’s tussle with the US Federal Trade Commission and latterly with the European Commission. “It makes enemies all over the place. Look how nobody is standing up for it in this fight. It’s on its own.”


Karen, an app that knows you all too well » NYTimes.com

Frank Rose on London-based Blast Theory’s forthcoming (April 16) app:

Unlike most real life-coaching apps, this one displays video rather than text — a tactic that makes it easy to forget the distinction between what’s digital and what’s human. When you open the app, Karen (played by Claire Cage, an actress who has appeared on the British TV series “Coronation Street” and “Being Human”) starts speaking to you directly, asking a series of questions.

She seems winsome and friendly — a little too friendly, perhaps. “She’s only recently out of a long-term relationship,” explained Matt Adams, one of the three members of Blast Theory, “and she has a hunger for a new social alternative.”

The dynamic that unfolds is somewhat reminiscent of “Her,” the 2013 Spike Jonze film in which Joaquin Phoenix’s character falls in love with an operating system. With Karen, however, it’s not the user but the app that starts exhibiting inappropriate behavior. “She develops a kind of friend crush,” Mr. Adams said. “And over the next 10 days or so, she feeds back to you things she’s learning about you — including some things you’re not quite sure how she knows or why.”


Why Waze is so incredibly popular in Costa Rica » The Washington Post

Matt McFarland:

“It’s a nightmare.” That’s how Eduardo Carvajal describes the Costa Rican way to give an address.

“If I want to give the address of my office I say ‘Okay, go to the ice cream cone shop in Curridabat then drive 100 meters south and 50 meters east,” Carvajal said.

He’s part of the team of volunteers who mapped Costa Rica in Waze, a crowdsourced traffic and navigation app. Carvajal, whose day job is running a software company, has made hundreds of thousands of edits to Waze’s map of Costa Rica.

Fellow volunteer Felipe Hidalgo spent 50 hours a week for almost two years helping to map the country. Hidalgo has made 378,000 edits to maps in Costa Rica, Nicaragua, Cameroon, St. Helena Island, Panama and Trinidad and Tobago. He described the work as addicting. Since the mapping of Costa Rica was completed, he scaled back to 10-15 hours a week.

Pity that it wasn’t OpenStreetMap; then everyone could have benefited, including Waze. But as the article shows, Waze “addresses” have become part of the culture there – so much so that the government partnered with it on road closures.


Google: our new system for recognizing faces is the best one ever » Fortune

Derrick Harris:

Last week, a trio of Google researchers published a paper on a new artificial intelligence system dubbed FaceNet that it claims represents the most-accurate approach yet to recognizing human faces. FaceNet achieved nearly 100% accuracy on a popular facial-recognition dataset called Labeled Faces in the Wild, which includes more than 13,000 pictures of faces from across the web. Trained on a massive 260-million-image dataset, FaceNet performed with better than 86% accuracy.

Researchers benchmarking their facial-recognition systems against Labeled Faces in the Wild are testing for what they call “verification.” Essentially, they’re measuring how good the algorithms are at determining whether two images are of the same person…

…However, the approach Google’s researchers took goes beyond simply verifying whether two faces are the same. Its system can also put a name to a face—classic facial recognition—and even present collections of faces that look the most similar or the most distinct.


Samsung Galaxy S6 and Galaxy S6 edge review » Android Central

Andrew Martonik:

Bottom Line: The Galaxy S6 finally offers the hardware that we’ve long desired, and it’s included a wonderful camera. But not everything is perfect — the software experience and battery life just aren’t up to speed.

Harsh? But Jessica Dolcourt at Cnet seems to be unhappy too, saying battery life is less than the S5. (Hers is a review worth reading too.)


Samsung earnings point to smartphones pick-up » FT.com

Simon Mundy:

Samsung executives had stoked anticipation for the first-quarter results with bullish public statements. “We’re done with recovery,” Kim Hyun-seok, head of Samsung’s television business, told local reporters last week.

Nevertheless, revenue was lower than expected, in part a reflection of weaker household electronics revenue in Europe and some emerging markets, whose currencies have fallen significantly in recent months.

And while the earnings figure was up from Won5.3tn in the prior quarter, it reflected significant margin shrinkage following strong profits in the first half of last year — a level of profitability Samsung will not regain in the near future, said CW Chung, an analyst at Nomura, pointing to the ever-fiercer competition in the smartphone market.

“Last year’s smartphone profit in the first half was about Won11tn, but this year it will be maximum Won6tn,” he said…

…Samsung’s first-quarter results were boosted by early shipments of 3m Galaxy S6 phones, said Daniel Kim at Macquarie, citing guidance from the company.

Telling final detail there: Samsung likes to shove handsets into the channel for early revenues. Here’s the graph of Samsung’s revenue and operating profit growth. Really interested to see how the S6/Edge fare.

Samsung revenue and operating profit change

Year-on-year change in operating profit (green) and revenues (blue) at Samsung Electronics


Interview with Matt MacInnis, CEO of Inkling » Pi.co

A long interview by Om Malik with MacInnis, who seems to want – yet also not to want – to “reinvent” the book. This point struck me as particularly relevant:

I look at content through another axis, which is its longevity. If you look at the scale of how long something lasts, a Tweet can have a shelf life of minutes. There are exceptions, but in general a blog post might have a shelf life of a few weeks, sometimes months. If you look at news articles, they tend to have a shelf life of a day. Nobody wants to pick up the New York Times from a week ago and read it for the news. Monthly magazines with long-form feature pieces are interesting on the span of months. And then you get into things like nonfiction and textbooks, which have shelf lives of years. Travel guides have the shelf life of about a year.

You’re talking about taking content that has a long shelf life, things like facts that don’t change, data about the history of something that informs the present, and using it to inform the news article that has a shelf life of a few days. You watch the Tour De France and you want to know who won yesterday. That information that was reported about who got where in the interim period is useless to you once somebody wins the Tour De France.


Angela Ahrendts says a ‘significant change in mindset’ to launching Apple Watch online » Business Insider

Jim Edwards:

For observers, shortages of Apple products have appeared to be a PR advantage. When Apple ran out of the gold iPhone 5S shortly after launch, it generated yet more publicity for the product. Some people have even thought these shortages are part of Apple’s marketing strategy — to make them seem more desired and scarce than they actually are.

The Ahrendts memo, however, is an indicator that Apple does not like being unable to meet demand or leave customers frustrated. Channelling customers online partly solves that problem. Customers will still have to wait if there isn’t enough product, but at least they know the product is on its way — and they’re not wasting their time showing up at Apple’s stores.

For the Apple Watch launch in the UK, the only way to get an Apple Watch will be to order online and then have it shipped to your home, even if you’re in the store.

So much for “observers”.


Google denies YouTube Kids app unfairly targets children » The Guardian

Sam Thielman:

[US] TV rules, for example, mandate “bumpers” between programs and commercials – the five-second segments that announce that the show will be right back – while YouTube Kids goes on in an uninterrupted stream.

More seriously, the complaint alleges YouTube violates its own advertising guidelines: “Products related to consumable food and drinks are prohibited, regardless of nutritional content,” says the company’s Advertising on YouTube Kids page, and yet the stream of watchable videos (not the ads, the actual programs) includes a McDonald’s channel, complete with a video starring Mythbusters’ Grant Imahara called “Our Food. Your Questions: What Are McDonald’s Chicken Nuggets Made Of?”

A small tag in the corner reads “promotional consideration provided by McDonald’s.” The complaint alleges that this counts as deceptive marketing by YouTube of the Kids app, not to kids, but to parents.

The complaint also questions “unboxing” videos – user0generated videos of new products, ranging from iPhones and new toys and sneakers, being opened for the first time. Last year Google said it had received 20m searches for “unboxing.”

Google, the complaint notes, “urges advertisers to ‘[c]onsider how unboxing videos might help your brand connect with consumers.’”

Google, YouTube and advertising. I’m reminded of the fable of the fox, the river and the scorpion.


Start up: Samsung’s #bendgate?, algorithms v April Fool, graphene is coming!, the US’s backward financial improvement


This might be what to do with trading algorithms on April Fools Day. Photo by kippster on Flickr.

A selection of 10 links for you. Not thixotropic. I’m charlesarthur on Twitter. Observations and links welcome.

Chinese fingerprint on smartphone trends in Malaysia, Singapore » Digital News Asia

Karamajit Singh:

Chinese smartphone vendors entered the Malaysian market in earnest in 2013, and this accelerated in 2014 with the various brands winning over a sceptical market with their price-to-performance models.
 
As a consequence, what used to be known as the mid-level phone market in Malaysia – the RM700 to RM1,200 (US$190 to US$325) level – is collapsing rapidly, IDC argues.
 
“The story is that the low-end market is getting more competitive and many phones that carry good specs are already priced below RM700,” says [Jensen] Ooi [IDC market analyst for client devices at IDC Asia Pacific].
 
Feeling the pain here from the rapid commoditisation of the mid-tier market are the traditional large players like Samsung, Sony and LG, which are unable to differentiate their phones at price points above RM700.
 
IDC’s data shows that sub-RM700 phones made up nearly 60% of the Malaysia market in 2014, up from nearly 40% the year before. The majority of the growth has been captured by the Chinese vendors at the expense of Samsung, Sony and LG.
 
More bad news for these Android vendors: “Their share in the mid-range and high-end market has weakened and will continue to weaken this year, with only Apple continuing to grow there in 2014,” says Ooi.


Teardown of new Samsung Galaxy smartphone suggests deeper loss for Qualcomm » Reuters

Se Young Lee and Noel Randewich:

Samsung is not only using its own Exynos mobile processor, as had been widely reported, but also decided to rely on its in-house semiconductor business to source other parts, including the modem and power management integrated circuit chips, Ottawa-based consultancy Chipworks said in a web posting dated April 2.

Samsung is counting on its new flagship Galaxy S6 and S6 edge phones to help revive earnings momentum after a disappointing 2014. Strong sales of system chips such as its Exynos processor could also help boost earnings, analysts and investors say.

The Galaxy S6 also comes with Samsung’s Shannon modem chip, US phone carrier AT&T said on its website.

“It’s pretty clear if they’re using Shannon for the modem for AT&T that they’re trying to use all-Samsung silicon,” said Jim McGregor, an analyst at Tirias Research. “With their market share going down they’re under pressure to increase profit margins.”

Makes sense (and poses a problem for Qualcomm): the more Samsung-built chips are in each phone, the greater its profit. Samsung Electronics’s preliminary results – its range of expected revenues and operating profit – are released on Tuesday 7 April; full results by division later in the month.


Apple invents watertight iDevice buttons » Patently Apple

Jack Purcher:

Apple began working on various waterproofing methods for iDevices back in 2010 and in 2013 devised a waterproofing nano coating. In March we posted a report covering Apple’s most advanced invention on waterproofing to date titled “Apple Invents a Waterproofing Method for Future iDevices using Hydrophobic Conformal Coatings and Silicon Seals.” Today, the US Patent & Trademark Office published yet another waterproofing patent application from Apple that specifically covers a water tight button solution for iDevices.

It feels like an obvious solution, and covers the power switch and volume switches. Is the headphone jack and Lightning port close-ended? In that case water resistance would be sorted – and could become another extra feature to differentiate from past models.


Wal-Mart exec calls credit card upgrade a ‘joke’ » CNN

Wal-Mart’s executive in charge of payments thinks the United States’ switch to chip-based credit cards is going to be a disappointment.

The new “chip & signature” program is barely an improvement on security and fraud, said Mike Cook, Wal-Mart’s assistant treasurer and a senior vice president, at this week’s Electronic Transaction Association’s Transact conference in San Francisco. Cook said Wal-Mart would have preferred a “chip and PIN” system that Europe and Africa have, since PINs would protect cards from being stolen.

“The fact that we didn’t go to PIN is such a joke,” Cook told CNNMoney.

Cook said signatures on checks were sufficient 100 years ago, but they’re outdated today. PINs on debit cards were a major improvement to stop thieves decades ago. They’d do the same for credit cards – which is why banks should use them for all cards.

“Signature is worthless as a form of authentication,” Cook said during a presentation at the conference. “If you look at the Target and Home Depot breaches … not a single PIN debit card needed to be reissued in those breaches. The card number was worthless to the individual thief and fraudsters, because they didn’t know the PIN.”

Americans truly have no idea how backwards their financial systems are.


Schaumburg man acquitted after child porn got mixed up in WWII downloads » DailyHerald.com

Barbara Vitello:

Testifying in his own defense, [Wocjciech] Florczykowski, a 40-year-old electrical engineer, described himself as a history buff with an interest in World War II, specifically battlefield memorabilia. In pursuit of that hobby, Florczykowski said he occasionally travels to battlefields in Poland where he and other military history buffs use metal detectors to unearth everything from medals and canteens to shells, grenades and unexploded land mines.

He testified he was using a program called uTorrent (which enables users to share large files) to research explosives on a laptop supplied to him by his former employer DLS Electronic Systems in Wheeling and inadvertently downloaded pornography.

“What I discovered was completely disgusting. I was not looking for this stuff,” he said, adding that he moved the offensive images and other unwanted material to a folder he intended to delete but was fired from his job before he could do so.

Discovering information on explosives on the laptop, his supervisors alerted federal authorities.

And then things got really bad. (Note: on the site itself, you need to answer a survey question to view the content. Can’t decide if that’s great, terrible, or “never going to scale”.) Also: it’s child abuse, not child “porn”.


Grooveshark publishes proactive anti-piracy policy » TorrentFreak

In the Capitol case the Court noted that while Grooveshark keeps records of all processed DMCA takedown complaints and associated users, it does not keep an “independent record” of repeat infringers.

“Escape does not try to identify repeat infringers and fails to keep
records that would allow it to do so,” the judge said.

Grooveshark says it is now dealing with that criticism.

“In an era of simple database queries this new requirement may be redundant, but we will now create an additional independent record of repeat infringers from our existing databases, until our appeal clarifies this issue for Grooveshark and other hosting services committed to complying with the DMCA,” the company writes.

Grooveshark’s entire business model is basically built around passive piracy – letting people upload and then share stuff whose copyright they don’t own. The music labels have been trying to tear it down for years; it’s basically a wart on the face of the web.


Tesla stockholders can’t take a joke » Bloomberg View

On April 1, five minutes before the market closed, Tesla put out a spoof press release on its official feed. The stock leapt, then drooped:

So people lost maybe as much as a few hundred thousand dollars because, for a brief stupid minute, they thought that Tesla was introducing … a watch? No, of course they didn’t. They thought Tesla was introducing a thing called the Model W, and they didn’t read any further than the headline, and they bought Tesla stock hoping that the Model W, whatever it was, would be a huge success (or would be perceived as a huge success by someone else a minute later), and then they realized that they’d been fooled, and they sold the stock at a small loss and moved on with their day. And when I say “people” I mean mostly “algorithms,” which are faster and more literal than humans, though in the space of a minute it is conceivable that an actual human saw that headline and fired off a buy order before reading any further.

Maybe stock algorithms will kill off April Fool’s Day online. Here’s hoping.


How graphene may revolutionize the mobile industry » Android Authority

Roni Peleg (who edits a graphene news aggregation site):

Graphene can allow for super-efficient batteries that charge within minutes and last much longer than conventional Li-ion batteries, composite materials that make devices lightweight and extremely durable, touch screens that are flexible and transparent, and even chips that are extremely small but much faster than silicon chips.

Love graphene as a concept (and reality), but it’s weird how its implementation is always five years away.


SquareTrade tests shows Samsung S6 Edge as bendable as iPhone 6 Plus and more likely to crack under pressure » YouTube

Pretty brutal treatment, though. (Also includes abuse of HTC M9.) Here, by the way, is a Samsung executive at the S6 launch assuring the audience it won’t bend:

A little part of me wonders about the original “bendgate” stories and their origin.


The Economist’s Tom Standage on digital strategy and the limits of a model based on advertising » Nieman Journalism Lab

Joseph Lichterman interviews Standage, who remarks:

we’re not big on linking out. And it’s not because we’re luddites, or not because we don’t want to send traffic to other people. It’s that we don’t want to undermine the reassuring impression that if you want to understand Subject X, here’s an Economist article on it — read it and that’s what you need to know. And it’s not covered in links that invite you to go elsewhere. We’ll link to background, and we’ll link to things like white papers or scientific papers and stuff like that. The idea of a 600-word science story that explains a paper is that you only need to read the 600-word science story — you don’t actually have to fight your way through the paper. There is a distillation going on there.

I do like that thinking, having lived with it the majority of my life. (Do the links here actually help you? Do you click through? Most people don’t.)

Also worth reading: his observations about ads (“they’re going to go away”) and millenials – who, he says, are “all fans of Snapchat, AdBlock and incognito [mode]”.


Start up: harassment claims against Google, android dog funerals, self-destructing handset makers? and more


A Dropcam watches the snow fall, pretending to ignore you. Photo by Scott Beale on Flickr.

A selection of 10 links for you. Contains minimal Watch content. I’m charlesarthur on Twitter. Observations and links welcome.

Dropcam’s slow slide into Nest — and therefore Google — begins » PandoDaily

Nathaniel Mott:

Dropcam users are being asked to create Nest accounts — regardless of whether or not they own a Nest product — so they can use “new features and improvements” to their cameras.

The Verge reports that the new accounts will be used to support some of the integrations Nest promised when it acquired Dropcam for around $555 million in cash June 2014. It will also ensure that Dropcam customers have agreed to Nest’s updated terms of service.

Anyone who wasn’t worried before about Google acquiring these companies (it acquired Nest in January 2014; Nest then acquired Dropcam in June) before should be worried now.

But of course, you’ve already got a Dropcam (which looks pretty useful). So setting up an account, well..


Google hit with sexual harassment complaint from ex-employee » Betanews

Mark Wilson on Kelly Ellis’s allegations – which are serious, and go up as far as behaviour by Vic Gundotra – made over the weekend:

Google would much prefer to be seen encouraging women into technology but Ellis – who worked on the Google+ team – dismisses this as nothing more than “PR bullshit”. She also says that she was let down by co-workers who failed to back her up.

Ellis spent a good deal of time on Saturday tweeting a series of snippets about her time at Google where she worked from 2010 to 2014. The tweets started with a very blunt statement: “At Google I was sexually harassed by someone who was later promoted to director”. Dozens of tweets then followed giving more details about what had happened.

Now working as a software engineer at Medium, Ellis says that the harassment was the main reason she left the company back in July. She says “I don’t care if people believe me or not”, but, we have to refer to what she says as allegations. She says that Roderick Chavez, another Google engineer, harassed her:

Google hasn’t responded to the allegations at the time of this being collated.


The privacy and security questions we must ask about the Apple Watch » Fusion

Kashmir Hill:

Apple wants to be your iDoctor. Even if its devices aren’t actually FDA-approved, the apps it makes available that could offer up diagnoses and treatment will be.

Now that our iDevices are going to be collecting even more information from us, what privacy and security concerns do we need to be freaking out about?

“Freaking out about”? Asking about, perhaps. It seems there’s nothing to freak out about.


Imaginary ISIS attack on Louisiana and the twitterbots who loved it » Boing Boing

Cory Doctorow:

On September 11, 2014, [Gilad] Lotan, a data scientist, started researching a massive, coordinated, and failed hoax to create panic over an imaginary ISIS attack on a chemical plant in Centerville, Louisiana. The hoax included Twitter, Facebook and Wikipedia identities (some apparently human piloted, others clearly automated) that had painstakingly established themselves over more than a month. Also included: fake news stories, an imaginary media outlet called “Louisiana News,” and some fascinating hashtag trickery whereby a generic hashtag was built up in Russian Twitter by one set of bots, then, once trending, was handed over to a different set of English-language bots that used it to promote the hoax.

More interesting is the fact that the hoax failed. Lotan shows that Facebook’s Edgerank proved to be resistant to gaming using the process employed by the hoax’s creator(s); that Twitter clusters can be trumped by real news sources; and that Wikipedia’s vigilance was adequate to catching fakesters who create hoax pages.

One feels it’s important to add the proviso: “this time”. There’s more from John Borthwick on Medium. And speaking of Twitter bots…


This is what a graph of 8,000 fake Twitter accounts looks like » Terence Eden’s Blog

Like this:

Eden spent a weekend digging into the nests of fake accounts:

There appears to be several “loops” – that is bots which are in an almost closed network with each other. I see at least half a dozen circles – the rest appear to be following other fake accounts at random.

The centre of those circles appear to be real people. I can’t say why they have lots of fake followers – it’s possible that they – or someone else – has just bought them to make it look like they’re more popular than they really are. There’s no suggestion that they control the fake accounts.

One of the central nodes has 650,000 followers. It’s not possible to know quite how many of those are fake – I’m guessing the majority are.

It seems that there’s a nasty nest of these bots. In the last few weeks I’ve reported a dozen or so for spam – but with literately tens of thousands in the network it’s impossible for any individual to make a meaningful impact.


Avoidable Contact: the watery Big Bang, the 32-step power steering fluid check, disposable faux-ury » The Truth About Cars

Jack Baruth starts with racing cars, then veers into watches…

Hublot and other watchmakers are busy CAD-creating their own “manufacture movements” to replace the generic ETA/Sellita/Valjoux movements found in their products. In this, the Cretaceous period of watch enthusiasm, the ability to engineer and manufacture one’s own mechanical watch movement is essential for “credibility”. Not that the genuine prestige watchmakers all used their own movements anyways, but there’s a certain amount of Cadillac-at-the-Nurburgring idiocy going on: Rolex makes their own movements, and they are a respected brand, so we need to have our own movements as well, even more complicated and feature-packed, and then we will be more respected than Rolex.

There’s just one little problem with that strategy. The proliferation of quick-bake “manufacture” movements is creating an entire generation of hugely expensive, amazingly complicated, completely “bespoke” watches which will be impossible to fix.

…and then he comes out the other side and goes into Porsches, and 993s v Boxsters, but it’s really about durability and inheritability. Very appropriate in light of you-know-what.


Chart: Samsung leads the smartwatch market » Statista

Who are the main players in the smartwatch market? Like the smartphone market, Samsung is going to be Apple’s main competitor. The South Korean technology behemoth sold approximately 1.2 million units in 2014, ahead of second placed Pebble with 700,000. The top three was rounded off by Fitbit who sold 600,000 smartwatches.

Fitbit does a smartwatch? Also, Motorola seems to have been subsumed into Lenovo, so that the Moto 360 looks like it did 500,000 units.

My one problem with these numbers is that they don’t fit with the number of Android Wear devices sold and activated, which we know is 720,000 (give or take a few).


The global handset industry is set for self-destruct » Digits To Dollars

Jay Goldberg isn’t happy:

Let’s say you make a product, and you have a lot of competitors, dozens, hundreds. Prices are falling. More people are piling into the market. Now it is time for you to design a new product. Do you experiment with a radically new form factor? Let a single designer attempt to craft a finely honed product that stands out for its quality? Or do you come out with a product that is just a modest upgrade of last year’s product, with no distinguishing design or features?

Well, when you put it like that…..

Really, I am kinda dumbfounded. That handset OEMs seem to be on a path of self-destruction. I visited every major OEM’s booth and dozens of smaller vendors. I am sure I missed one or two interesting devices with some novel feature, but at some point, I can only stare at identical black, plastic slabs for so long. There is nothing new or differentiated out there, and this cannot last.

I have to admit, at one point, I almost lost my temper. A couple times actually. The industry seems to be in some very complicated form of denial. And there seem to be a couple common threads to their excuses.

His idea of a QWERTY Android phone to sweep up the disenfranchised BlackBerry users is one that keeps being put forward, but nobody is brave enough to do. Point is it would have to be enormously tall, and what happens when you turn the phone sideways? Should it be a slide-phone like the G1?


If an algorithm wrote this, how would you even know? » NYTimes.com

Shelley Podolny (well, perhaps):

The multitude of digital avenues now available to us demand content with an appetite that human effort can no longer satisfy. This demand, paired with ever more sophisticated technology, is spawning an industry of “automated narrative generation.”

Companies in this business aim to relieve humans from the burden of the writing process by using algorithms and natural language generators to create written content. Feed their platforms some data — financial earnings statistics, let’s say — and poof! In seconds, out comes a narrative that tells whatever story needs to be told.

These robo-writers don’t just regurgitate data, either; they create human-sounding stories in whatever voice — from staid to sassy — befits the intended audience. Or different audiences. They’re that smart. And when you read the output, you’d never guess the writer doesn’t have a heartbeat.

Consider the opening sentences of these two sports pieces:

“Things looked bleak for the Angels when they trailed by two runs in the ninth inning, but Los Angeles recovered thanks to a key single from Vladimir Guerrero to pull out a 7-6 victory over the Boston Red Sox at Fenway Park on Sunday.”

“The University of Michigan baseball team used a four-run fifth inning to salvage the final game in its three-game weekend series with Iowa, winning 7-5 on Saturday afternoon (April 24) at the Wilpon Baseball Complex, home of historic Ray Fisher Stadium.”

If you can’t tell which was written by a human, you’re not alone.

Cue observation about how many US news reports have read like they’re written by machines for years anyway.


Japan’s robot dogs get funerals as Sony looks away » Newsweek

Lauren Walker:

“I can’t imagine how quiet our living room would have been if Ai-chan wasn’t here,” Sumie Maekawa, a longtime Aibo owner, told The Wall Street Journal, using an honorific suffix applied to girls’ names.

Tatsuo Matsui, who owns two digital dogs with his wife, added, “I can’t risk my precious dogs because they are important members of our family.”

Despite the loyal fanbase, Sony decided to discontinue the bot in 2006, after selling around 150,000 units.

“Our core businesses are electronics, games and entertainment, but the focus is going to be on profitability and strategic growth,” a Sony spokeswoman said at the time. “In light of that, we’ve decided to cancel the Aibo line.”

For years following the announcement, Sony would repair Aibos that experienced technical difficulties. But in July 2014, those repairs stopped and owners were left to look elsewhere for help.

Do androids dream of electric dog funerals?


Start up: Lenovo, Superfish and its implications; identifying Jackson Pollocks, tech v fashion, and more


Currently unfashionable inside Lenovo “consumer laptops”. Photo by sinosplice on Flickr.

A selection of 8 links for you. Makes a lovely salad when added to salad. I’m charlesarthur on Twitter. Observations and links welcome.

How Lenovo’s Superfish ‘malware’ works and what you can do to kill it » Forbes

Thomas Fox-Brewster:

Lenovo might have made one of the biggest mistakes in its history. By pre-installing software called ‘Superfish ’ to get ads on screens it’s peeved the entire privacy community, which has been aghast this morning on Twitter. There are serious security concerns about Lenovo’s move too as attackers could take Superfish and use it to ensnare some unwitting web users.

Here’s what you need to know about Superfish and what you can do to stop it chucking irksome ads on your browser and leaving you open to hackers.

This is probably the most comprehensive piece on the problems around this, though Lenovo suggests it has only installed it since September 2014. On Thursday night it issued instructions on how to remove it. And here’s a site you can use to check whether it’s affecting you. Read on for more of the implications.


AVAST 2015 Release Candidate 1 (10.0.2202) » Avast forums

Avast is a well-known antivirus program:

Features already introduced in previous AVAST 2015 betas:

• GrimeFighter Free
GrimeFighter will offer free cleaning of junk files and tuning of system settings. These tasks are performed by our Zilch and Torque minions. Other minion functions remain as paid-for features.

• HTTPS scanning
Now, we are able to detect and decrypt TLS/SSL protected traffic in our Web-content filtering component. We are using our own generated certificates that are added into the Root Certificate store in Windows and also into major browsers. This feature will protect you against viruses coming through HTTPs traffic as well as adding compatibility for SPDY+HTTPS/ HTTP 2.0 traffic. You can tune/disable this feature in the settings section.

That “https scanning” is exactly the thing that people are worried about with the Lenovo-installed Superfish. The reason why it’s used is because a lot of malware uses https: to connect to command-and-control servers. Superfish used it because connections to Google are https: and it wanted to insert its own adverts into the Google results stream.

Somehow, the Avast reason seems much preferable. (Link via Jon Honeyball.)


Extracting the SuperFish certificate » Errata Security

Robert Graham:

I extracted the certificate from the SuperFish adware and cracked the password (“komodia”) that encrypted it. I discuss how down below. The consequence is that I can intercept the encrypted communications of SuperFish’s victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot. Note: this is probably trafficking in illegal access devices under the proposed revisions to the CFAA, so get it now before they change the law.

I used simple reversing to find the certificate. As reported by others, program is packed and self-encrypted (like typical adware/malware). The proper way to reverse engineer this is to run the software in a debugger (or IDApro), setting break point right after it decrypts itself. The goal is to set the right break point before it actually infects your machine – reversers have been known to infect themselves this way.

This is one of the concerning things about Lenovo’s actions: vulnerabilities like this.


Lenovo CTO: we’re working to wipe Superfish app off PCs » WSJ Digits blog

Shira Ovide:

Lenovo is working quickly to wipe all traces of an app it had pre-installed on some consumer laptops, responding to security researchers’ warnings that the app could give attackers a way to steal people’s encrypted Web data or online passwords.

In an interview Thursday, Lenovo’s chief technology officer, Peter Hortensius, acknowledged that “we didn’t do enough” due diligence before installing Superfish, but that the company doesn’t believe laptop owners were harmed by the app. He said the company realized it needs to do more to respond to consumers’ concerns.

Lenovo, the world’s biggest seller of PCs, is working to write software that will delete any data from the Superfish software off laptops on which it had been installed. Hortensius also said the company should have done more due diligence on the security of the Superfish shopping-search app, which was installed from September to December on Lenovo consumer laptops.

Choice quote from Hortensius: “we agree that this was not something that we want to have on the system”. So how did it get there?


Report: 2014 was a bad year for lyrics sites in Google » Search Engine Land

Barry Schmwartz:

Only one lyrics site saw an increase in visibility from Google’s search results, that is azlyrics.com with a 24% lift.

We saw at the end of December 2013, Rap Genius was penalized for link schemes but then saw themselves back in the search results ten days later. Maybe that manual action had Google’s engineers take a deeper look at the lyrics niche.

One thing, you’d probably see a deeper impact on these lyrics sites in 2015. Google in late December 2014 began showing full lyrics in the search results, which can directly impact the traffic and visibility of these lyrics sites in the Google search results.


How Twitter CEO Dick Costolo keeps his focus » Inc.com

Jeff Bercovici:

A typical week for Costolo involves 12 to 15 standing meetings, so he has a few rules for efficiency’s sake. First, no cancelling. Freeing up that time may be tempting, but it’s how small problems become big ones. “I’m the connective tissue between all these groups,” he says. “It’s important for me to have context for the issues and challenges everyone’s dealing with.”

Second, no sidebars, ever. Nothing irks Costolo more than someone approaching him in private and saying, “I didn’t want to bring this up in front of everyone, but…” That rewards politics over process, he says: “Everyone on my team knows that that’s not a valid way to start a conversation with me.”

Finally, no PowerPoint. Meetings are for communicating, not wasting time on pretty slides. Instead, Costolo asks managers to type briefings. “If that sounds straight out of the Jeff Bezos playbook, it’s because it is,” he says. “I totally agree with that.”

These seem really good ideas. And there are more; the article isn’t so much about what happens, but how Costolo functions.


What the tech world doesn’t understand about fashion » Racked

Leslie Price:

at the biggest fashion houses in Europe, there is a general disdain for the connected future that the tech world fetishizes.

“We don’t like [e-commerce]. I don’t care,” Miuccia Prada said in 2013. “We think that, for luxury, it’s not right. Personally, I’m not interested.” As Bloomberg details, this is the case for many luxury brands. Some fashion OGs, like Valentino, don’t even use computers. Anna Wintour famously carries a flip phone. “The problem with technology is it’s a bit cold. It’s a bit sharp,” said Carine Roitfeld, CR Fashion Book EIC and former French Vogue chief.

This aversion actually makes perfect sense. Fashion is, by its very nature, exclusive. It’s about creating an identity, a brand, that is so cool that people will spend thousands and thousands of dollars to acquire a tiny piece of it. If you make that identity widely available, you risk diluting it. This delicate balance is something that the oldest fashion stalwarts have spent a hundred or more years perfecting.

Terrific piece which neatly illustrates (with examples) the gulf between tech and fashion: quite a lot of it is in the language that attaches to things.


A computer can tell real Jackson Pollocks from fakes » Smithsonian

Laura Clark:

according to many connoisseurs, critics and fakers don’t give the painter enough credit. There are indeed complexities to Pollock’s drip art that show it to be the genuine article. And now there’s a computer program helping to make a science out of the deciphering.

The software uses “computational methods to characterize the low-level numerical differences between original Pollock drip paintings and drip paintings done by others attempting to mimic this signature style,” says Inderscience Publishers. You give it a scan of the possible Pollock, and the program goes to work extracting 4024 numerical image descriptors that the human eye would have trouble deciphering as accurately.

I guess we have to add “art authenticator” to the list of white-collar jobs that computers will wipe out in time.


Start up: Apple Pay in the UK?, 10m Chromecasts, the hacker whose cat betrayed him, and more


OK, definitely seen harder than that. Photo by health_bar on Flickr.

A selection of 9 links for you. Do not plant in acidic soil. I’m charlesarthur on Twitter. Observations and links welcome.

Due to me screwing up, the headline yesterday about finding Waldo referred to an article that’s in today’s list. Hope you didn’t spend too long looking for it.

Is there a battle looming in the UK between Apple Pay and Zapp? » Mobile Payments Today

Will Hernandez:

While Apple has yet to reveal a hard date for Apple Pay’s launch in the UK, pundits speculate that it could happen in April. This also happens to be about the same time Zapp is supposed to make its debut in the U.K.

Zapp relies on banks building it into their mobile apps, although as those banks own Zapp’s parent company, this shouldn’t be too much of a problem. The system is intended to provide real-time payments between consumers and merchants — both online and at the point of sale — without the need for a digital wallet. Zapp will generate digital tokens that will hide customer bank account details from merchants, and it is intended to work with different technologies such as NFC, Bluetooth, QR codes and PIN-entry point-of-sale terminals.

Zapp, however, has faced launch delays since at least the third quarter of 2014. Meantime, it announced in October retail partnerships that will go into effect this year. Asda, Sainsbury’s, House of Fraser and Shop Direct are among some of the major High Street retailers that will support Zapp. Earlier in the year, HSBC, first direct, Nationwide, Santander and Metro Bank announced their support for the system.

I’d never heard of Zapp either. Apparently it’s “a mobile payments system from Vocalink, which created the Faster Payments Service and is owned by all the major UK banks.”

Zapp has lots of benefits (cost, data sharing with retailers) and so could have a UK advantage – this is a good article for getting an idea of the competitive landscape in the UK as Apple prepares to land.


Android Wear’s newest trick, playing a full-length movie » Android Community

John Hoff:

Apparently, your Android Wear smartwatch can be taught to do cooler tricks – cooler than, say, playing Minecraft or Doom, or even running Windows 95. Once again, smart hacker Corbin Davenport has shown us that there’s a lot of stuff – not necessarily important world-changing stuff – just a lot of stuff that can be done to your Android Wear smartwatch when you have a lot of time on your hands.

“You haven’t watched a movie—until you’ve watched it on your watch,” Davenport proudly proclaims of his newest wild idea, which he shows via YouTube. The demo shows Davenport playing Star Trek: Into Darkness on his Android Wear, which is probably a delightful coincidence as he shows us that Android Wear devices can really go where no smartwatch has gone before (excuse the pun, we couldn’t help it).

Davenport has done some weird, weird stuff there.


Big three mobile phone markets beyond China » Counterpoint Technology Market Research

According to the latest research from [the] Market Monitor program for Q4 2014 (Oct-Dec), total mobile phone shipments for India, Indonesia and Bangladesh stood at 89m as smartphone demand skyrocketed and the total smartphone shipments contributed to more than a third of all mobile phones shipped during the quarter. These three markets combined offers an opportunity for mobile phone industry players looking to grow beyond the saturating China mobile phone market.

“Smartphone growth in these regions touches almost all the price segments with regional brands being prominent in the entry level smartphone segment. Apart from this we have seen Chinese vendors entering these geographies for the first time in CY 2014 and enjoyed a significant success rate. However it will be important to keep an eye on  Online only players on how they capture the smartphone growth in rural areas in these regions” says Tina Lu Sr. Consultant at Counterpoint research

Mobile phones, not just smartphones – note. By comparison, Japan bought about 25.7m smartphones in 2014 and that is expected to rise to 27m in 2015. (About half of that total would be iPhones, judging by Kantar’s figure.)


The utterly crazy story of the death threat hacker » We Live Security

Graham Cluley on a Japanese hacker who caused lots of problems via trojan-infected PCs in Japan in 2012:

the police arrested four separate people, and allegedly managed to “extract” confessions from some of those whose computers had posted death threats to a popular messageboard.

However, the confessions were clearly unreliable (one wonders how the confessors were “encouraged” to make them), as the suspects had in fact had their computers infected by the hacker’s malware, which had posted the death threats without their knowing.

It became clear to the police that they had made a colossal blunder, when the hacker – who went by the alias Oni Koroshi (Demon Killer) – continued to send taunting emails to the police force and local newspapers.

You can just imagine how embarrassing that must have been for the Japanese police, in what was becoming a high profile case.

Er.. yeah. But then it gets utterly weird, when the hacker sends a series of clues to the police, and it all ends up with a showdown involving a cat, an island and a sikrit chip worn on the cat. If Ian Fleming were alive today and writing this stuff you’d call it too far-fetched.

(Also, stupid hacker. Should have stopped when the people confessed.)


License plate scanners also taking photos of drivers and passengers » American Civil Liberties Union

The Drug Enforcement Agency is using its license plate reader program not only to track drivers’ locations, but also to photograph these drivers and their passengers, according to newly disclosed records obtained by the ACLU via a Freedom of Information Act request.

One internal 2009 DEA communication stated clearly that the license plate program can provide “the requester” with images that “may include vehicle license plate numbers (front and/or rear), photos of visible vehicle occupants [redacted] and a front and rear overall view of the vehicle.” Clearly showing that occupant photos are not an occasional, accidental byproduct of the technology, but one that is intentionally being cultivated, a 2011 email states that the DEA’s system has the ability to store “up to 10 photos per vehicle transaction including 4 occupant photos.”…

…Some law enforcement agencies that employ ALPRs recognize that the technology should not be used to capture photos of vehicle occupants. We obtained an ALPR policy from Tiburon, California that speaks to our privacy concerns. The policy states that “cameras will be directed only to capture the rear of vehicles and not into any place where a ‘reasonable expectation of privacy’ might exist.”

Tricky argument. You can see that it would be useful for law enforcement to know who’s driving a car. And do you have “a reasonable expectation of privacy” when you’re driving a car on a public road where people can take pictures of you and your car – as happens here?

(By the way, in the UK we call it an “Automatic Number Plate Reader”. Even though it now has letters and numbers.)


Twitter cuts off employee access to its metrics » Re/code

Kurt Wagner:

There’s no metric more important to the social network than the number of people that use the service — more specifically, its monthly active users, or MAUs. Recent events inside the company show how sensitive Twitter’s top brass can be about this number, which also partly explains the company’s push to use other metrics to showcase Twitter’s reach.

The company used to grant all employees access to its MAU figure through an internal intranet, but that access was revoked a few weeks ago, according to multiple sources familiar with change. Now, the MAU metric is only available on a need-to-know basis.

There has been so much noise ahead of Twitter’s results (which came out after I added this) that one has to feel there’s something weird going on there. A culture clash? Internal political struggle? Whatever, this will be the year it plays out.


Xiaomi has a San Francisco press event scheduled for 12 February… but it’s still not entering the US market » Android Police

Any tech journalist worth his silicon would probably assume that Xiaomi intends to finally push into the US market to take on the likes of Apple and Samsung, possibly even with new mobile hardware. But apparently that’s not the case. We specifically asked Xiaomi’s PR representative about the possibility of a North American expansion, and this is the response that we were given:

We can also confirm that Xiaomi will not be launching in the US or entering the US market this time, but this is an opportunity to get to know the company and leadership a bit more.​

Any tech journalist worth her or his silicon would know that Xiaomi would face insuperable IP issues in trying to enter the US market, and also that it’s simply the wrong sort of market to try to get in to just now for Xiaomi.

At least they called Xiaomi to have their castles in the air shot down.


Google sold 10 million Chromecasts last year » Korea Times

Google has sold about 10 million Chromecast, a streaming-media dongle for high-definition (HD) TVs, globally in 2014, Google Korea said Wednesday.

Chromecast, which made its debut in July 2013, now supports more than 350 apps and services, including YouTube, Tving and Hoppin in Korea.

It started selling the device in Korea in May 2014, the first marketing debut in the Asian market.

This number sounds entirely feasible; it also sounds like the sort of thing that Google Korea might blurt out, when its corporate headquarters has only ever said “millions”.

Ten million is pretty impressive. Now, of course, we can divide all the numbers it has put out to get average use, such as its “used for one billion ‘casts’” stat in the January earnings call: that works out to an average of about 100 “casts” per device over the whole of 2014 (but of course not all were in use all through 2014).

So probably double that 100 figure (or even treble it) for those bought early in the year; halve it, or one-third, for those bought later. Sound good?


Here’s Waldo: computing the optimal search strategy for finding Waldo » Randal S. Olson

I decided to approach this problem as a traveling salesman problem: We need to check every possible location that Waldo could be at while taking as little time as possible. That means we need to cover as much ground as possible without any backtracking.

In computer terms, that means we’re making a list of all 68 points that Waldo could be at, then sorting them based on the order that we’re going to visit them. So now we just need to try every possible arrangement of the points and find the one with the shortest distance traveled. Easy, right? Wrong.

Those 68 points can be arranged in ~2.48 x 1096 possible ways. To provide some context, that’s more possible arrangements than the number of atoms in the universe. That’s so many possible arrangements that even if finding Waldo became an international priority and the world banded together to dedicate the 8.25 million computing cores from the world’s 10 largest supercomputers to the job, it would still take ~9.53 x 1077 years — about 6.35 x 1067x longer than the universe has existed — to exhaustively evaluate all possible combinations. (Generously assuming that each core could perform 10,000 evaluations per second.) In other words: if we don’t have a smarter solution, Waldo is as gone as Carmen Sandiego.

I admit I was disappointed that he didn’t do it by image recognition. And anyhow, his solution (probable regions) doesn’t help you at all with Wizard Whitebeard, Wenda, Wilma, Odlaw, Woof or the Waldo Watchers.


Start up: Samsung ChatON going off, USB apps for iPad, the ‘uncanny valley’ for algorithms, Sony hack history, and more


Bitcoin mining: significantly lower health and safety risk than other forms.

A selection of 10 links for you. Wipe off excess. I’m charlesarthur on Twitter. Observations and links welcome.

Apple, is USB allowed now? >> Medium

Matt Ronge, pointing to Duet Display, which lets you use an iPad (via Lightning) as an extra screen for a Mac running 10.9 or better:

For the past year, we’ve been working on an app (launching early 2015) that turns your iPad into a graphic tablet for your Mac (like a Wacom tablet). Our app at its core also streams video content from the Mac to the iPad, so we were very interested in USB connectivity early on in our project.

We knew that using USB instead of Wifi was a decision we had to make early on, as it would completely change our direction of development. USB offers a reliable, low latency connection which is 100x better than any wireless technology (especially with Yosemite experiencing serious Wifi reliability issues).

We were also very hesitant to build a business around a decision Apple may change on a whim. So we submitted an app to test the waters, would Apple allow an app that requires USB? An Apple representative called us and informed us USB connectivity was not allowed.

Duet Display looks like it could be fun, though one usually wants a bigger display – but if you had an 11in Macbook Air, a full-size iPad would almost double your screen size, and improve the resolution a lot.


Our tactics for Gamergate are outdated >> Space Channel 6

Brianna Wu:

For me, personally, I intend to keep lessening the amount I’m posting and writing about Gamergate. Everyone knows they are very sexist, very unhealthy individuals. Thanks to my Patreon, GSX’s full time staffer will document this behavior for law enforcement leaving me free to speak out for change in the industry and make inclusive games.

My suggestion to people rightly outraged about this movement, is to ask yourself what you currently want to accomplish. It’s my suggestion that it would be most helpful to shift the conversation back to representation in the industry. I think the gains in raising awareness of Gamergate have diminished, while the threat of giving the lunatic fringe the attention they desire has stayed the same.

To be blunt, I’m not sure endlessly talking about Gamergate does anything anymore.

I’m not sure it did past the second month. Idiots enjoy being idiots, and won’t be dissuaded from that track.

Topsy suggests a gradual dimunition in the number of tweets on this topic from 50,000 to 20,000 over the past month (and bear in mind that the obsessives tweet many, many times per day).


BuildZoom office burglary – $5000 reward – update!! >> BuildZoom

David Petersen of BuildZoom, from which equipment was stolen:

After our story was covered on ABC 7 News, we were contacted by a nearby startup that was burglarized on July 6th and July 13th. Comparing footage, it’s clear that the same person broke into both offices.

Update 2: It appears that this woman is breaking into SF startups with a Doorking / DKS code entry system. She has obtained a master key and is able to enter any office with this system.

Update 3: We believe we have identified the burglar. It’s a local San Francisco woman who has been convicted of similar crimes in the past. An acquaintance of hers emailed with photographs and additional information. It certainly looks like her.

Someone with a master key for office doors in SF? That’s a problem.


Facebook’s popularity among teens dips again >> Bloomberg

A report yesterday by Frank N. Magid Associates Inc. found that the portion of 13- to 17-year-old social-media users in the U.S. on Facebook slipped to 88% this year from 94% in 2013 and 95% in 2012. In the same period, Twitter and messaging applications rose in popularity in that age group, the study showed.

The Menlo Park, California-based company first warned a year ago that teens weren’t using its website as often as before. Facebook stopped discussing teen usage on its earnings calls after last year’s disclosure alarmed investors. While the issue was all but forgotten as the company’s advertising revenue reached new highs, it’s a bigger concern now, according to Tero Kuittinen, a managing director at Magid in New York.

“You look at Facebook and you say, ‘Wow, something really changed in 2014,’” Kuittinen said. “If kids are starting to use so much of their daily time on messaging apps, surely it’s going to hurt somebody.”

Among 13- to 17 year-olds, Twitter usage climbed 2 percentage points to 48%, according to the report. While more people use Facebook and its messaging app than any competitor, its user base tends to be older, with 55% of Facebook Messenger users being 37 or younger. By the same measure, 86% of Snapchat Inc.’s users and 83% of Kik Interactive Inc.’s users are under 37.

Seems reasonable to think that messaging apps are pulling teens away from Facebook.


2015: the year we get creeped out by algorithms >> Nieman Journalism Lab

Zeynep Tufekci:

It turns out computers have a built-in “uncanny valley” (that creepy feeling android robots generate when they kind of look human). Just like we don’t want robots too human-shaped — we want them to know their place — it turns out we aren’t too happy when our computers go from “smart” (as in automating things and connecting us to each other or information) to “smart” (as in “let me make that decision for you”).

Algorithmic judgment is the uncanny valley of computing.

Algorithms (basically computer programs, but here I’m talking about the complex subset that is being used to calculate results of some consequence, which then shape our experience) have become more visible in 2014, and it turns out we’re creeped out.

Tufekci is super-smart, and always ahead of the curve.


htmlwidgets: JavaScript data visualization for R >> RStudio Blog

Today we’re excited to announce htmlwidgets, a new framework that brings the best of JavaScript data visualization libraries to R. There are already several packages that take advantage of the framework (leaflet, dygraphs, networkD3, DataTables, and rthreejs) with hopefully many more to come.

An htmlwidget works just like an R plot except it produces an interactive web visualization. A line or two of R code is all it takes to produce a D3 graphic or Leaflet map. Widgets can be used at the R console as well as embedded in R Markdown reports and Shiny web applications.

This looks terrific (if you’re into R.)


Bitcoin’s collapse is worse than the ruble’s >> Quartz

Matt Phillips & Melvin Backman:

Why the collapse in bitcoin?  One of the clearest answers seems to be that it’s gotten harder to use bitcoin for some of its less savory uses, such as dodging taxes and buying drugs. Governments increasingly are trying to clamp down on the “dark web” sites where bitcoin quickly was the cryptocurrency of choice. Collapses of large, unregulated bitcoin exchanges — such as Mt. Gox — have done little to instill confidence in the currency either.

Mt Gox was a key reason for the start of the collapse. Yet the nearer Bitcoin gets to its 2011/12 levels, and the more people are using it (thus ironing out the speculative element), the more it looks like a really useful product. The implications of the blockchain are fascinating.


Absolute Sownage >> Attrition.org

Over the last two months, the multi-national Sony Corporation has come under a wide range of attacks from an even wider range of attackers. The backstory about what event prompted who to attack and why will make a mediocre made-for-TV movie someday. This article is not going to cover the brief history of hacks; readers can find details elsewhere. Instead, the following only serves to create an accurate and comprehensive timeline regarding the recent breaches, a cliff notes summary for easy reference.

Starts in April 2011, by the end of which we were up to 21. Current count: 24.


Why the sharing economy could be the internet’s most divisive revolution yet >> The Guardian

By me, on the “sharing economy” companies such as Uber and AirBnB:

what would happen if an Airbnb guest was harmed by fire, or a carbon monoxide leak – a constant concern for hotels. Airbnb’s site says owners “should” make sure they have a functioning CO detector and are following gas safety regulations. But although the money for any stay is paid via Airbnb, Robinson says he doesn’t know who would be responsible if someone were injured that way.

“I’m not a lawyer,” says [Patrick] Robinson [AirBnbB’s public policy director in Europe]. It seems surprising that the eventuality hasn’t come up in business meetings, but Robinson declines to discuss it.

It’s a scenario that has exercised insurance companies, which are wrestling with the question of who is liable in a collision involving a car being driven on an Uber journey, or one of the other car rental services, or a complaint involving Airbnb clients. Premiums might rise, or need extra tweaking.

I still find it surprising if AirBnB hasn’t discussed – and even worked out a plan – for the eventuality of poisoning or death at one of its lets, given that it receives the payments for them.


Samsung says ‘cya’ to ChatON smartphone messaging app >> WSJ

Samsung is closing ChatON, for which it claims a “user base” of over 200m users. To which everyone else says: O RLY? And they used it so much you’re closing it?

“Samsung’s failure in messaging apps is endemic of a broader struggle for the company in software and services,” said Rajeev Chand, managing director at Rutberg & Co., a San Francisco-based investment bank that focuses on the mobile industry.

Mr. Chand said he was puzzled by Samsung’s inability to parlay its massive handset sales into at least some traction in software and services, calling it “the defining issue for the company’s long-term success.”

“If they don’t succeed in apps and software, Samsung has a very large risk of being relegated to an increasingly shrinking-margin company,” he said, referring to the recent gains that low-cost Chinese and Indian competitors have made in handset sales in recent months.

Add in this from April:

Strategy Analytics, a Newton, Mass.-based research firm, said in a report Tuesday that U.S. users of Samsung’s devices spend little time on its own messaging, music and voice-activated applications including apps like ChatON, the South Korean company’s answer to services like WhatsApp, Line and Viber.

The report said that U.S. users of Samsung’s Galaxy S3 and S4 smartphones logged an average of six seconds per month using ChatON, compared to more than 11 hours per month on Facebook and about two hours per month on Instagram.

Six. Seconds. This is Samsung’s problem, writ large (or small). By contrast, Apple failed with Ping – but that was a social media app built on top of iTunes, itself a successful Apple-owned platform; iTunes remained. Samsung is left with nothing.

And it was always reluctant to give any hard numbers about ChatON. The irony is that ChatON is going to remain open for slightly longer in the US – apparently that’s one of the busier places.

Even more fun: at the end of November, Samsung categorically denied that it was going to close ChatON. Denials, eh?


Corrected: the author of the Gamergate post is Brianna Wu, not Anita Sarkeesian. Apologies, and thanks to Ron Hayter.