Start up: Samsung’s US chance, Google’s RTBF extension, hacking Isil, bionic feels!, and more

The world of professional bridge is struggling with accusations of cheating. But how do you prevent people communicating in code, if they can communicate? Photo by jaxx2kde on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 9 links for you. Effortless. I’m charlesarthur on Twitter. Observations and links welcome.

Sizing the US opportunity for Samsung Galaxy S7 & S7 edge » Kantar Worldpanel

Carolina Milanesi:

»By the end of January [2016], the Galaxy S6 represented only 9% of Samsung’s installed base in the US, and the Galaxy S6 edge a mere 2%. The Galaxy S5 remained the most popular device in the installed base, representing 21.5% followed by the Galaxy S4 – now a three-year-old phone – at 14.2%.

Between February 2015 and January 2016, only 26% of Samsung smartphones in use were upgraded. This creates a huge opportunity for Samsung to persuade consumers it is time to upgrade to the new devices.

Of the 26% of Samsung devices that were upgraded, the greatest percentage (27.5%) chose the Galaxy S5, 26.2% the Galaxy S6: 9.4% the Galaxy Note 4: 7.9% the Galaxy Note 5: and 5% the Galaxy S6 edge. The rest of the upgrades were divided among 33 different models, demonstrating how wide the Samsung offering remains in the US market, despite all the attention being given to its flagship products.

Only 3.6% of current Galaxy S6 owners said they are planning to upgrade their smartphone in the next 12 months. This should not worry Samsung, however, as we have shown that a significant opportunity remains among owners of older phones, making them a much easier target for the Korean brand.

«

Suggests that the S6 and S6 Edge really weren’t a big hit, as the S4 has a higher share than both together.
link to this extract

 


Dirty hands » The New Yorker

David Owen, with a fantastic piece about cheating in the world of professional bridge:

»When Brogeland made his first announcement, his evidence against Fisher and Schwartz consisted solely of what he believed to be a collection of suspicious hands; he still didn’t know how they might be exchanging information. A few days later, he created a new Web site, called Bridgecheaters.com, and posted three YouTube videos from the 2014 European Team Championships, which Fisher and Schwartz’s team had won. Each video had been shot from a camera mounted near the table. It showed all four players, as well as the table paraphernalia of modern tournament bridge: four bidding boxes (containing each player’s pre-printed bidding cards); a felt-covered bidding tray (on which the players place bidding cards before sliding it back under the screen); and a plastic duplicate board (a flat, rectangular box in which four pre-dealt hands have been delivered to the table). Brogeland asked for help from other players, and the search for evidence immediately became a collaborative international project.

«

As you read it, you realise that every human element in bridge – speaking, coughing, card movement, any physical movement – makes it feasible to create a code to cheat; the only way to prevent it would be to have people playing via screen, without words or gestures. Which would take away everything that might make it fun.
link to this extract

 


Google finally extends right-to-be-forgotten rules to all search sites, including dot-com » Ars Technica UK

Kelly Fiveash:

»Google has responded to European Union data watchdogs by expanding its right-to-be-forgotten rules to apply to its search websites across the globe.

In 2014, search engines were ordered by Europe’s top court to scrub certain listings on their indexes. Google—which commands roughly 90 percent of the search market in the EU—claimed at the time that such measures amounted to censorship of the Internet.

However, the landmark European Court of Justice ruling in fact stated that search engines were required to remove links that are old, out of date or irrelevant, and—most significantly of all—not found to be in the public interest.

Indeed, the right-to-be-forgotten may seem evocative to privacy campaigners, but as the UK’s Information Commissioner’s Office has previously stated, “there is no absolute right [under the ruling] to have information removed.”

«

Google’s blogpost on the topic says “We’re changing our approach as a result of specific discussions that we’ve had with EU data protection regulators in recent months”. No mention of the swingeing fines the regulators threatened.
link to this extract

 


Bionic fingertip gives sense of touch to amputee » Reuters

Matthew Stock:

»A bionic fingertip has given an amputee the sensation of rough or smooth textures via electrodes implanted into nerves in his upper arm.

Scientists from EPFL (Swiss Federal Institute of Technology) and SSSA (Sant’Anna School of Advanced Studies, Italy) successfully allowed amputee Dennis Aabo Sørensen to receive this sophisticated tactile information in real-time.

The research, published in science journal eLife, says Sørensen is the first person in the world to recognize texture using a bionic fingertip connected to electrodes surgically implanted above his stump.

The nerves in Sørensen’s arm were wired to a machine with the fingertip attached to it. The machine then controlled the movement of the fingertip over pieces of plastic engraved with different textures, either rough or smooth. When the fingertip moved across the plastic, its sensors generated an electrical signal which was translated into a series of electrical spikes that mimic the language of the nervous system. This was then delivered to Sørensen’s nerves.

«

Odd – and a little sad – how little of the billions washing around Silicon Valley are being used to set up companies to do things like this.
link to this extract

 


AlphaGo defeats Lee Sedol in first game of historic man vs machine match » Go Game Guru

You probably heard the news that Google’s DeepMind system AlphaGo beat the best player in the world. Here are the reactions of the pros (“9p” means “9-dan professional”, ie the highest level):

»Lee Changho 9p said,  “I’m so shocked by AlphaGo’s play!”

Meanwhile Cho Hanseung 9p remarked, “AlphaGo is much stronger than before, when it played against Fan Hui 2p! When Google said the odds were fifty-fifty, it seems they weren’t joking. I still can’t believe its performance even though I just saw it with my own eyes.”

In a post-game interview, Lee Sedol was visibly startled by AlphaGo’s strength. “I was so surprised. Actually, I never imagined that I would lose. It’s so shocking. Regarding the game, I got off to a bad start and AlphaGo played well right until the end. Even when I was behind, I still didn’t imagine that I’d lose. I didn’t think that it would be able to play such an excellent game. I heard that the DeepMind CEO Demis Hassabis said that he respects me as a Go player, but I have great respect for both of them [referring to Demis Hassabis and Eric Schmidt] for making this amazing program. I also respect all the programmers who helped to make AlphaGo.”

«

The second game should finish around 0800 GMT on Thursday.
link to this extract

 


Exclusive: 1736 documents reveal ISIS jihadists personal data » Zaman Al Wasl

»Zaman Al Wasl has exclusively obtained the personal data of 1736 ISIS fighters from over 40 countries, including their backgrounds, nationalities and hometown addresses.

The document that branded by ISIS as confidential is shedding the light on the inner circle of the de facto a state which has its own institutions and official documents as well data bank.

Two thirds of ISIS manpower are from Saudi Arabia, Tunisia, Morocco and Egypt. 25% of ISIS fighters are Saudis, the data disclosed.

While Turkish fighters are taking the lead among ISIS foreign fighters, French fighters come next.

Syrians are just 1.7 % of the total number of fighters. The Iraqis make 1.2.

Expert told Zaman al-Wasl that Iraqis and Jordanians can make the backbone of ISIS but most of them are based in Mosul and ISIS-controlled areas in Ramadi.

The most notably that ISIS fighters do not know the real names of their fellow fighters since they used to have code names, or names de guerre, and for security issues they have been obliged to follow high ranks of secrecy.

The documents have been written and organized by the General Administration of Borders, and ISIS commission that tracks all Jihadists data.

The data document is including 23 fields, starting with the Jihadist’s first name, last name, code name, date of birth and nationality. The jihadist who cross the the Islamic State’s borders for the first time is ought to acknowledge the Borders Administration everything about himself, even what he wants to be in ISIS, a fighter or a suicide bomber.

«

Hacking is damned annoying thing.
link to this extract

 


Maybe we could tone down the JavaScript » fuzzy notepad

Alex Munroe is kinda annoyed about pages which insist on a ton of Javascript:

»These aren’t cutting-edge interactive applications; they’re pages with text on them. We used to print those on paper, but as soon as we made the leap to computers, it became impossible to put words on a screen without executing several megabytes of custom junk?

I can almost hear the Hacker News comments now, about what a luddite I am for not thinking five paragraphs of static text need to be infested with a thousand lines of script. Well, let me say proactively: fuck all y’all. I think the Web is great, I think interactive dynamic stuff is great, and I think the progress we’ve made in the last decade is great. I also think it’s great that the Web is and always has been inherently customizable by users, and that I can use an extension that lets me decide ahead of time what an arbitrary site can run on my computer.

What’s less great is a team of highly-paid and highly-skilled people all using Chrome on a recent Mac Pro, developing in an office half a mile from almost every server they hit, then turning around and scoffing at people who don’t have exactly the same setup. Consider that any of the following might cause your JavaScript to not work:

• Someone is on a slow computer.
• Someone is on a slow connection.
• Someone is on a phone, i.e. a slow computer with a slow connection.
• Someone is stuck with an old browser on a computer they don’t control — at work, at school, in a library, etc.
• Someone is trying to write a small program that interacts with your site, which doesn’t have an API.

«

And he’s only just getting started.
link to this extract

 


How the smartphone shapes millennials’ online activities » Global Web Index

Chase Buckle:

»From a marketing perspective, the term Millennial is increasingly becoming synonymous with mobile. And for good reason – almost 90% own a smartphone and these internet users clock up on average over 3 hours per day online via mobiles (rising to over 4 hours in Latin America and the Middle East). That means they’re spending up to 5x longer per day online on mobile than older age groups.

Understandably, this enthusiasm for smartphones is having a huge impact on their online activities. Our latest research shows that Millennials overwhelmingly cite smartphones as their most important device for getting online, and we’re seeing more-and-more staple internet activities take place on mobile.

«

What I notice about the above graphic is that in the past month, about 76% used a search engine on mobile – and (slightly) more used a social network. By contrast on desktop, it would probably be 100% and 100%. Plus these are the millennials; for those who are older, both uses will be less. That search engine use is Google’s problem on mobile: lots of people don’t do search on a daily basis on mobile.
link to this extract

 


We need to save online journalism from ad blocking – and here’s how » Alphr

James O’Malley:

»Historically, journalism has had two major sources of income: Advertisers and readers. But now publishing is being squeezed from both ends. Thanks to the internet, and the explosion in ‘content’ (that’s what we call it now), people are very reticent to pay to read news, like they would have done for a print newspaper. And now thanks to ad-blockers, fewer people are looking at the adverts.

So what to do? How can a business model be found that will make journalism pay? Is there anything that can save this noble trade?

Bizarrely, the solution to this problem has already been invented. Six years ago. By one of the last people you’d expect to have an interest in paying people for their work.

Flattr was co-founded in 2010 by Peter Sunde, who is better known as one of the co-founders and former spokesperson for The Pirate Bay. Given that his website is responsible for distributing huge swathes of pirated content, you can’t help but wonder if Flattr was his attempt at atonement.

Flattr is a “microdonation” platform. The idea is that you sign up and allocate a fixed amount of cash to pay in every month – say £10 for the sake of argument – and then if you’re reading an article online that you like, you can click the “Flattr” button nestled amongst the existing social media sharing links. At the end of the month, your £10 is then divided up between the publishers of the articles that you’ve chosen to flattr. So if you flattr two articles, they earn £5 each. If you flattr ten, then each gets a pound. And so on.

The genius is that it solves the biggest problem with any micropayment system: Friction.

«

Neat idea. The problem now is just adoption by publishers and readers (and getting users of adblockers to see it in the first place).
link to this extract

 


Errata, corrigenda and ai no corrida:

Start up: Apple’s conundrum, watch birds migrate!, the 5am startup, and more

A Go endgame: where would you play next? DeepMind’s systems would know. Photo by chadmiller on Flickr.

Only humans can sign up to receive each day’s Start Up post by email. They need to click a confirmation link, so no spam.

A selection of 9 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Apple wants to be a services company » Business Insider

Jay Yarow with a neat summary of Apple’s conundrum:

So, Apple is in this weird cycle: It wants to grow services revenue, but services revenue depends on iPhone sales. Currencies are falling because the global economy is weak relative to the US economy, which is leading Apple to raise prices on the iPhone, which is hurting iPhone sales, which will limit services revenues.

Apple could lower prices of the iPhone to sell more units and then grow services, but it doesn’t seem to want to do that.

Cook said Apple already had a variety of price points, from the low-tier iPhone 5s to the high-end iPhone 6s Plus.

“I don’t see us deviating from that approach,” Cook said.

This makes sense since Apple is a hardware company. If it were a services company, it would lower prices, go for smartphone unit volume, then get more money from that. But it is not a services company.

It is not principally a services company. The money it does make from services is actually pretty substantial, and threatens to overtake iPad revenue. Poor iPad.
link to this extract

 


iPhone Headwinds » Tech-Thoughts

Sameer Singh:

Apple also increased iPhone channel inventory by 3.3m over the quarter compared to a decline of 0.2m in the same quarter last year. Keeping in mind that Apple reports sell-in (shipments), not sales to end users, this implies that iPhone sell-through actually declined by 4.3% YoY, from 74.7m to 71.5m units. This is the first such decline in the history of the product.

In addition to this sell-through decline, Apple’s revenue guidance for the next quarter implies a steeper YoY decline in unit sales. And finally, this was accompanied with a YoY increase in average selling price (ASP) which suggests that the iPhone mix is shifting towards higher end models…

…As Clay Christensen is fond of saying, “Disruption is a process, not an event”. The mechanics of low-end disruption have been working ever since the first Android smartphone was unveiled in 2008. The key test for the iPhone will be the iPhone 7 cycle, starting in fiscal Q1 [Oct-Dec] 2017. In a “redesign year”, it will be easier to gauge whether meaningful product improvements can continue to generate increased demand or if today’s smartphones have already reached “good enough” territory.

The sell-through point is valid (only BlackBerry also gives the same data). The odd thing is that rising ASP: it points to people having the disposable income to buy the pricier models, which argues against the “low-end disruption” thesis.

But the gap between the average selling price of an Android handset and the average selling price of an iPhone has never been larger. That must have knock-on effects. But what?
link to this extract

 


Google AI algorithm masters ancient game of Go » Nature

Elizabeth Gibney:

DeepMind’s program AlphaGo beat Fan Hui, the European Go champion, five times out of five in tournament conditions, the firm reveals in research published in Nature on 27 January. It also defeated its silicon-based rivals, winning 99.8% of games against the current best programs. The program has yet to play the Go equivalent of a world champion, but a match against South Korean professional Lee Sedol, considered by many to be the world’s strongest player, is scheduled for March. “We’re pretty confident,” says DeepMind co-founder Demis Hassabis.

“This is a really big result, it’s huge,” says Rémi Coulom, a programmer in Lille, France, who designed a commercial Go program called Crazy Stone. He had thought computer mastery of the game was a decade away.

The IBM chess computer Deep Blue, which famously beat grandmaster Garry Kasparov in 1997, was explicitly programmed to win at the game. But AlphaGo was not preprogrammed to play Go: rather, it learned using a general-purpose algorithm that allowed it to interpret the game’s patterns, in a similar way to how a DeepMind program learned to play 49 different arcade games.

This means that similar techniques could be applied to other AI domains that require recognition of complex patterns, long-term planning and decision-making, says Hassabis. “A lot of the things we’re trying to do in the world come under that rubric.” Examples are using medical images to make diagnoses or treatment plans, and improving climate-change models.

This is a gigantic result; being good at Go requires a subtle intuition and feel for space. (At least, for a human.) It’s far, far more complex than chess. And that this was done by a non-specific program has colossal implications.

As Nature’s leader on the topic comments, as these systems spread into our lives, “The machine becomes an oracle; its pronouncements have to be believed… Intuitive machines will need more than trust: they will demand faith.”

As a side note, DeepMind looks like one of Google’s smartest purchases – perhaps after YouTube.
link to this extract

 


Nest thermostat goes from ‘Internet Of Things’ darling to cautionary tale » Techdirt

Karl Bode:

[Tech writer Stacey Higginbotham’s] Nest device began trying to cook her family in the middle of the night, something Nest first tried to blame on her smart garage door opener, then tried to blame on her Jawbone fitness tracker (Nest never did seem to pinpoint the cause). Her report suggests that an overall culture of “arrogance” at Nest shockingly isn’t helping pinpoint and resolve bugs:

“One Nest partner, who declined to be named to preserve his business relationship with the company, said that Nest being quick with the blame didn’t surprise him, citing a culture of arrogance at the company. When something went wrong during integration testing between his device and Nest’s, problems were first blamed on his servers and team.”

And fast-forward to last week, when researchers putting various internet of thing devices through tests found that the Nest thermostat was one of many IOT devices happily leaking subscriber location data in cleartext (with Nest, it’s only the zip code, something the company quickly fixed in a patch). Granted Nest’s not alone in being an inadvertent advertisement for a product’s “dumb” alternatives. In 2016, smart tea kettles, refrigerators, televisions and automobiles are all busy leaking your private information and exposing you to malicious intrusion (or worse).

It’s a fascinating, in-progress lesson about how our lust for the sexy ideal of the connected home appears to be taking a brief pit stop in reality.

link to this extract

 


Vigilant solutions and the spread of police surveillance » The Atlantic

Conor Friedersdorf:

Throughout the United States—outside private houses, apartment complexes, shopping centers, and businesses with large employee parking lots—a private corporation, Vigilant Solutions, is taking photos of cars and trucks with its vast network of unobtrusive cameras. It retains location data on each of those pictures, and sells it.

It’s happening right now in nearly every major American city.

The company has taken roughly 2.2bn license-plate photos to date. Each month, it captures and permanently stores about 80m additional geotagged images. They may well have photographed your license plate. As a result, your whereabouts at given moments in the past are permanently stored. Vigilant Solutions profits by selling access to this data (and tries to safeguard it against hackers). Your diminished privacy is their product. And the police are their customers.

Sounds a bit similar to the UK police’s Automatic Number Plate Reader network, which extends around the UK, except this is historic too. (Then again, the UK’s ANPR system probably is too.)
link to this extract

 


How to wake up at 5am and build your startup » Medium

Patrick Park (once he’s got past the stuff about how to, you know, get up at 5am, and gets on to the stuff about building your startup):

It’s hard to admit, but no one really knows what they’re doing at first. Even the largest startup unicorns in the world, took a long time to find their footing. AirBnb survived by selling political themed cereal Obama O’s and Cap’n McCain’s. #Slack came out of a failed game “Glitch.” Even YouTube began as a video dating service “Tune in Hook Up.”

Micro-startups work well with the Lean Startup methodology. Not only are micro-startups easier to implement, but provide a shorter feedback loop that keeps you more in touch with your audience. With 75% of all startups failing, would you rather spend 100 days in a basement building a product your customers “might” like or connect with your audience everyday “while” you adapt your startup to address your customer’s pain-points? Don’t build another Blockbuster.

Start with the assumption that you’re wrong. Constantly validate your theories through micro-experiments. When I first started “Krown.io”. I explained the service as an “Annotation Blogging Platform.” That was, until I found out the majority of people have no idea what “Annotations” are. We tried a variation of “Smart Blogging,” “Highlight Blogging,” “Feedback Blogs,” and “Contextual Blogging Platform.” Which surprise, surprise. People still had no idea what we were talking about. So we added a bare-to-the-bones explanation, “Highlight a text and add comments directly on the highlighted text.” Validate your hypothesis.

The startup advice is fine. Waking up at 5am isn’t that hard, but he makes it sound like one of the 12 tasks of Hercules.
link to this extract

 


Lenovo used 12345678 as hard-coded password in SHAREit for Windows » Graham Cluley

Cluley is amazed – as you will be:

The first vulnerability [of four, all of which could be exploited remotely] (CVE-2016-1491) is perhaps the most infuriating. CoreLabs discovered that whenever SHAREit for Windows is configured to receive files, this process creates a Wi-Fi hotspot that is ‘protected’ by the password “12345678”.

Not surprisingly, this password just recently earned a top spot on the latest list of worst passwords you could possibly choose.

What is surprising is the fact that Lenovo would incorporate such an insecure password into its application — and one that does not change, no less!

Then again, I suppose the issue could be worse. In the second vulnerability (CVE-2016-1492), which applied only to SHAREit for Android, there is no password set up to protect the Wi-Fi hotspot when the app is configured to receive files.

To be sure, it doesn’t say much when Lenovo could have mitigated two separate vulnerabilities by adhering to the most basic principles of password security.

But moving right along. The third vulnerability (CVE-2016-1490) discovered by CoreLabs builds upon the insecure Windows password issue discussed above

When elephants do software while dancing. Yes, it was Lenovo which preinstalled Superfish.
link to this extract

 


Mesmerizing migration: watch 118 bird species migrate across a map of the western hemisphere » All About Birds

Pat Leonard:

For the first time, scientists at the Cornell Lab of Ornithology have documented migratory movements of bird populations spanning the entire year for 118 species throughout the Western Hemisphere. The study finds broad similarity in the routes used by specific groups of species—vividly demonstrated by animated maps showing patterns of movement across the annual cycle.

There’s also a version showing which species is which.
link to this extract

 


Apple India enterprise head Sharad Mehrotra quits, starts up with Hyve Mobility » timesofindia-economictimes

Muntazir Abbas:

Sharad Mehrotra, iPhone maker Apple’s enterprise mobility head in India, has quit and set up a handset company to compete in the world’s fastest-growing smartphone market. Mehrotra, who was with Apple India since October 2007, has cofounded Hyve Mobility , which will launch smartphones using Android, the operating system that rivals Apple’s iOS, by March.

“While consumers today have a lot of options to choose a smartphone, the element of customer delight is seriously missing,” he told ET, adding that it was high time to get into the smartphone market…

…”In the current Android scenario, no brand enjoys customer loyalty and we want to bring the change with our path-breaking products portfolio and service offerings,” said [Aditya] Agarwal, MD of Hyve Mobility.

link to this extract

 


Errata, corrigenda and ai no corrida: none noted.