Start up: trouble with bots, big data’s fable, Google and the White House, beware iCloud phishers, and more

Google search for various speech-related commands
“Call mom” has overtaken “call home” in Google search – probably voice commands. Dad still lingers a way behind.

You can sign up to receive each day’s Start Up post by email. Isn’t that something.

A selection of 11 links for you. Well, it is Monday. I’m charlesarthur on Twitter. Observations and links welcome.

How big data creates false confidence » Nautilus

Jesse Dunietz:

»If I claimed that Americans have gotten more self-centered lately, you might just chalk me up as a curmudgeon, prone to good-ol’-days whining. But what if I said I could back that claim up by analyzing 150 billion words of text? A few decades ago, evidence on such a scale was a pipe dream. Today, though, 150 billion data points is practically passé. A feverish push for “big data” analysis has swept through biology, linguistics, finance, and every field in between.

Although no one can quite agree how to define it, the general idea is to find datasets so enormous that they can reveal patterns invisible to conventional inquiry. The data are often generated by millions of real-world user actions, such as tweets or credit-card purchases, and they can take thousands of computers to collect, store, and analyze. To many companies and researchers, though, the investment is worth it because the patterns can unlock information about anything from genetic disorders to tomorrow’s stock prices.

But there’s a problem: It’s tempting to think that with such an incredible volume of data behind them, studies relying on big data couldn’t be wrong. But the bigness of the data can imbue the results with a false sense of certainty. Many of them are probably bogus — and the reasons why should give us pause about any research that blindly trusts big data.

«

link to this extract

 


Google’s remarkably close relationship with the Obama White House, in two charts » The Intercept

David Dayen:

»[Mikey] Dickerson led the U.S. Digital Service, a new agency whose mission was to fix other technology problems in the federal government. Ex-Google staffers were prevalent there as well. Dickerson attended nine White House meetings with Google personnel while working for the government between 2013 and 2014.

Meetings between Google and the White House, viewed in this context, sometimes function like calls to the IT Help Desk. Only instead of working for the same company, the government is supposed to be regulating Google as a private business, not continually asking it for favors.

Much of this collaboration could be considered public-minded — it’s hard to argue with the idea that the government should seek outside technical help when it requires it. And there’s no evidence of a quid pro quo. But this arrangement doesn’t have to result in outright corruption to be troubling.

The obvious question that arises is: Can government do its job with respect to regulating Google in the public interest if it owes the company such a debt of gratitude?

Google doesn’t think its activities present an antitrust problem. It doesn’t feel constrained from holding incredible amounts of data. But should Google be in a position to make that determination itself? How much influence is too much influence?

«

It’s a very, very comprehensive look at how close Google is to the White House. Would it be any different under Clinton?
link to this extract

 


SMS phishing attackers continue to pursue Apple users » WeLiveSecurity

Graham Cluley:

»A week ago I reported on my personal blog how criminals were spamming out SMS messages that claimed to come from Apple, but were actually designed to steal personal information for the purposes of identity theft.

The messages all used a cunning piece of social engineering – posing as a notice from Apple that their Apple ID was due to expire that very day – to get unsuspecting users to click on a link to a phishing website.

The SMS messages were even more convincing because they referred to recipients by name, most likely fooling some into believing that there was a genuine reason to act upon the alert and visit the site pointed to by the criminals.

Although the site the criminals were initially using – appleexpired.co.uk – was quickly blocked by the major web browsers and taken down, that didn’t take the wind out of the criminals’s sails.

In the days since it has become clear that the identity thieves have registered a series of other domains – all claiming to be related to Apple or Apple ID. Examples have included icloudauth.co.uk, mobileicloud.uk, and icloudmobile.co.uk.

«

There was a big run of these over the weekend; my wife received two, which used her name. They do come via SMS; it seems that once someone’s address book is hacked, messages are then sent out to people in the address book. Standard phishing attack, jumping from one victim to the potential next.

Apple needs to be proactive and set up a way for people to forward these to its security team. And make two-factor authentication easier to implement. (Too late for those who have been hit.)
link to this extract

 


Microsoft Android patent-licensing revenue falling » Business Insider

Matt Rosoff:

»Microsoft missed earnings expectations by a couple of cents per share on Thursday afternoon because of an unexpected tax adjustment that skimmed $0.04 off its earnings per share.

In the release, Microsoft noted that its patent-licensing revenue was down 26% from a year ago. And it’s because of Android.

Android phones are still selling just fine, but the market is dominated by cheap handsets being sold in developing countries like China and India.

“The mix of devices in that market has shifted to the low end,” said Chris Suh, Microsoft’s head of investor relations.

Microsoft’s cut is also sinking. Suh also noted that not every Android manufacturer has a licensing deal with Microsoft. He didn’t name names, but Chinese phone makers typically take a very loose approach toward licensing American intellectual property, and as those inexpensive phones take over the world, Microsoft doesn’t benefit as much.

«

Well, OK, but there may be another part to the drop. Read on..
link to this extract

 


April 2015: Microsoft reportedly cutting patent fees in exchange for pre-installed apps » AndroidAuthority

Rob Triggs, in April 2015:

»Last month, Microsoft announced a global partnership with Samsung and other hardware manufacturers to bring its mobile productivity services, such as its Office suite, to consumers and business users. But there may be more to it than simply offering customers compelling services, DigiTimes Research suggests that Microsoft is tempting Android manufacturers to pre-install its software in exchange for discounts on its licensing fees.

Android hardware manufacturers have all signed a patent licensing agreement with Microsoft for various essential technologies developed by the company. However, according to findings from Taiwan’s and China’s smartphone/tablet upstream supply chain, Microsoft is offering discounts to those who pre-install Office programs such as Word, Excel, PowerPoint and OneNote, as well as OneDrive and Skype onto their Android devices. So far, 11 hardware partners are signed up to the deal.

«

link to this extract

 


As search changes, Google changes » Search Engine Land

Adam Dorfman:

»Recently, a company known as MindMeld, which provides voice search technologies, surveyed US smartphone users and found that 60% had started using voice search within the past year. You can also see a rise in search queries that are clearly voice commands when you look at Google Trends for phrases such as “call mom,” which are highly unlikely to be typed into a search box.

Voice search is no longer coming. It’s here.

These changes do not bode well for Google’s traditional revenue model, which relies on serving up ads while you search on Google.com. The user interface of talking to your mobile phone or wearable device to order a pizza does not leave any room for a paid search ad. So it’s not surprising that display advertising spend is overtaking search ad spend, and the gap between the two will widen over the next few years.

«

But, as Dorfman points out, Google is adapting. That graph of “call mom” is definitely one which would merit playing around with using a few other search terms. Here’s “Call home” against “call Mom” against “call Dad” and “call John” and “call Mary” (also at top of page).
link to this extract

 


Amazon unintentionally paying scammers to hand you 1000 pages of crap you don’t read » Consumerist

Kate Cox on a scam related to Kindle Unlimited:

»if you read 75 pages on your Kindle today, then turn the WiFi on and sync it, Amazon will mark you at page 75. If you never pick up the book again, that’s your furthest synced point. If it’s a 300 page book and you finish it, page 300 is your furthest synced point.

But e-books don’t have to be linear. You might, for example, open up a new Kindle book and find it has a link on the first page, to take you to a later chapter or a table of contents or another language. Tapping that link could put you hundreds of pages into the book — which means that the author of that file is now making money off you, even if you haven’t read a word… or even if there’s not a single real word there to be read.

And that is exactly what’s happening. Scammers are basically uploading “books” that are nothing but files full of nonsense with some link on page 1 that puts readers on page 300 or 3000 (the maximum page length for which Amazon will pay out) almost instantly. In between there’s nothing but nonsense, but the scammer can use click farms to drive up the ranking of their book and so people download it anyway.

The user hasn’t paid for this book directly, because they have an unlimited subscription, so they just close the file, forget about it, and move on to the next. But if dozens, hundreds, or even thousands of readers get tricked into the same maneuver, that “author” has just made a decent amount of money for something like 15 minutes’ worth of total work.

«

link to this extract

 


Bangladesh Bank exposed to hackers by cheap switches, no firewall: police » Reuters

Serajul Quadir:

»Bangladesh’s central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world’s biggest cyber heists said.

The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank’s SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police’s criminal investigation department.

“It could be difficult to hack if there was a firewall,” Alam said in an interview.

«

The Internet of Astonishingly Insecure Things.
link to this extract

 


Bots won’t replace apps. Better apps will replace apps » Dan Grover

Grover points out the nonsense of people thinking AI-driven chatbots will take over from touch-and-choose visual interfaces:

»It shouldn’t require any detailed analysis, then, to point out the patent inanity of these other recent examples of bots and conversational UI proffered by companies on the vanguard of the trend:

This notion of a bot handling the above sorts of tasks is a curious kind of skeumorphism. In the same way that a contact book app (before the flat UI fashion began) may have presented contacts as little cards with drop shadows and ring holes to suggest a Rolodex, conversational UI, too, has applied an analog metaphor to a digital task and brought along details that, in this form, no longer serve any purpose. Things like the small pleasantries in the above exchange like “please” and “thank you”, to asking for various pizza-related choices sequentially and separately (rather than all at once). These vestiges of human conversation no longer provide utility (if anything, they impede the task). I am no more really holding a conversation than my contact book app really is a l’il Rolodex. At the end, a single call to some ordering interface will be made.

«

Earlier Grover points out that the “quick and easy way to order pizza with your chatbot” takes 73 precise clicks (of virtual keys), whereas doing it through the visual menu interface on the Pizza Hut app takes 16 fat-fingered ones.

Case closed.
link to this extract

 


Four fresh presentations, four key charts » Creative Strategies, Inc

Ben Bajarin looks at why people who have a PC aren’t upgrading, what people like about wearables, who wants virtual reality, and also whether people in India are interested in PCs:

»My gut told me there was an interesting opportunity brewing in India. I decided to commission a study, in collaboration with local researchers, to see if India was ready to move beyond the smartphone. We focused on the regions in India where PCs, smartphones, and tablets have the highest penetration — Delhi, Bangalore, Mumbai, Hyderabad, and Chennai. We did a mix of online studies, focus groups, and 1:1 interviews of 525 Indian consumers in this market.

The theory was simple. As consumers in India mature and have owned more than a few smartphones, they will look to more traditional PC form factors to use for work, school, and more. But with Windows PC penetration in India at less than 10% of the total population and Windows largely being an enterprise/workplace requirement in India, our theory was Android would be more popular as an operating system. As it turns out, it was for the overwhelming majority of consumers looking to buy their first PC in India. Which is encouragingly high for a market that began their journey on the internet on a smartphone.

«

link to this extract

 


Microsoft, Google end regulatory disputes » WSJ

Stephen Fidler and Sam Schechner:

»According to a person familiar with the matter, the two companies have agreed to talk to each other first in the future before taking any problems to regulators.

The change reflects the shift in approach that followed Microsoft’s 2014 appointment of Satya Nadella as its new chief executive. Mr. Nadella has taken a less combative stance than his predecessor Steve Ballmer, according to a person familiar with the matter.

“The relationship between the two companies has changed,” the person said, adding that “Nadella has made most of the difference.”

Microsoft’s business priorities also have changed, among other things, with the growth of cloud computing.

The relationship between the two companies began publicly to thaw last year as they worked together to settle their long-running patent war involving roughly 20 pending lawsuits, said a person close to Google.

Microsoft also resigned from FairSearch, a group of digital companies—including Nokia Corp. and Oracle Corp.—that are prominent Google complainants. In addition, the software maker has discouraged ICOMP, another lobby group of which it was a member, from pursuing Google.

«

Wow. Going to be interesting to see whether Icomp and Fairsearch can continue without funding from Microsoft.
link to this extract

 


Errata, corrigenda and ai no corrida: none notified.

Start up: Apple on software, 1970 reporting, Microsoft leaves ICOMP?, cycling’s new doping scandal, and more

Voters at the Iowa caucus were profiled and tracked via their phones – perhaps without knowing. Photo by ellenmac11 on Flickr.

»You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.«

A selection of 13 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

(To help formatting on the email, I’ve added » and « on the blockquotes to make it clearer what is quoted, and what is my commentary.)

The Talk Show ✪: Ep. 146, with very special guests Eddy Cue and Craig Federighi » Daring Fireball

John Gruber:

»
Very special guests Eddy Cue and Craig Federighi join the show. Topics include: the new features in Apple’s upcoming OS releases (iOS 9.3 and tvOS 9.2); why Apple is expanding its public beta program for OS releases; iTunes’s monolithic design; how personally involved Eddy and Craig are in using, testing, and installing beta software; the sad decline of Duke’s men’s basketball team; and more.
«

This is, what, the second or third time I’ve recommended a podcast? This is an hour, and fascinating (with data points: iMessage peaked at 200,000 per second, there are 782m iCloud users – v 1bn devices in use, so do the maths – and 11m Apple Music subscribers, up from 10m in December).

Federighi’s point about how they tracked Bluetooth keyboard use for the Apple TV, and which calendar week it dwindled to zero, made me laugh aloud.

You can consider *why* Apple made Cue and Federighi available to Gruber, and it’s pretty obvious: they’re aiming to get their message out about Apple’s software and services quality, after all sorts of criticism lately. And that performance turns out to be pretty impressive – hundreds of millions of users who turn them on straight away that it goes live, such as iOS 9.0, iCloud Drive, and so on. Are they perfect? No. But they iterate to improvement pretty fast, given their scale.
link to this extract

 


Cycling’s mechanical-doping scandal » Business Insider

Daniel McMahon:

»
In the days that followed, the UCI said it had tested more than a hundred bikes at the world championships — and that it would be testing a lot more going forward:

»
The Union Cycliste Internationale (UCI) has taken the issue of technological fraud extremely seriously for many years. It has been clear for some time that the equipment exists to enable people determined to cheat to do so by installing devices hidden in bikes. That is why we’ve invested considerable time and financial resources in organising unannounced tests at races and have recently been trialing new methods of detection. We’ve also been using intelligence gathered from the industry and other information given to us. We tested over 100 bikes at the 2016 UCI Cyclo-cross World Championships in Heusden-Zolder and will continue to test large numbers of bikes at races throughout the season.
«

And sure enough, on Friday, February 12, the UCI announced it had tested another 90 bikes for motors, but this time at a road race in France.
«

This is weird. Motors in bicycles is A Thing. A Doping Thing.
link to this extract

 


64-bit iPhones and iPads get stuck in a loop when set to January 1, 1970 » Ars Technica

Peter Bright:

»
Take a 64-bit iOS device—iPhone 5S or newer, iPad Air or newer, iPad Mini 2 or newer, sixth generation iPod touch or newer—laboriously set its date to January 1, 1970, and reboot. Congratulations: you now have a shiny piece of high-tech hardware that’s stuck at the boot screen, showing nothing more than the Apple logo… forever.
«

From the highest-rated comment on the comments below the story:

»
It appears to solve itself when the internal clock is allowed to advance normally to a point when «current time» minus time zone is greater than zero.

(This may be why people are seeing a battery drain fix it or see it fixed when inserting a SIM card that supports carrier time information)
«

Versions of Bright’s story, all written from the same YouTube video, are all over the web. More informed (and stupider) comments can be found beneath them (where they allow comments). The more informed ones point out the errors.

It’s quite the problem for journalists: news editors clamour for the story now, but it’s hard to check all the details, and especially the causes. This isn’t a “forever” bug. But you need to get the story written. That lack of time to research and check erodes trust in outlets which have been quick to follow a YouTube video. It’s not “permanent”, it’s not “bricked”, it’s not “forever”.

Though they then get a second bite of the cherry with “how to fix” articles. (Answer: let the battery run down.)
link to this extract

 


This company tracked Iowa caucusgoers through their phones » Fusion

Kashmir Hill:

»
What really happened is that Dstillery gets information from people’s phones via ad networks. When you open an app or look at a browser page, there’s a very fast auction that happens where different advertisers bid to get to show you an ad. Their bid is based on how valuable they think you are, and to decide that, your phone sends them information about you, including, in many cases, an identifying code (that they’ve built a profile around) and your location information, down to your latitude and longitude.

Yes, for the vast majority of people, ad networks are doing far more information collection about them than the NSA–but they don’t explicitly link it to their names.

So on the night of the Iowa caucus, Dstillery flagged all the auctions that took place on phones in latitudes and longitudes near caucus locations. It wound up spotting 16,000 devices on caucus night, as those people had granted location privileges to the apps or devices that served them ads. It captured those mobile ID’s and then looked up the characteristics associated with those IDs in order to make observations about the kind of people that went to Republican caucus locations (young parents) versus Democrat caucus locations. It drilled down farther (e.g., ‘people who like NASCAR voted for Trump and Clinton’) by looking at which candidate won at a particular caucus location.
«

Deeply disturbing. You can bet that tons of those people had no idea that they were being profiled, or that their data was even being shared in that way.
link to this extract

 


Douglas Rushkoff: ‘I’m thinking it may be good to be off social media altogether’ » The Guardian

»
Ian Tucker: What do you find most objectionable about the kind of economy that technology appears to create?

Douglas Rushkoff: What’s most pernicious about it is that we are developing companies that are designed to do little more than take money out of the system – they are all extractive. There’s this universal assumption that we have to turn working currency into share price.
«

link to this extract

 


Microsoft looks to be retreating from EU antitrust fight against Google » Ars Technica

Quite a scoop from Kelly Fiveash:

»
Ars has learned that members including UK-based price comparison site Foundem—the original complainant in the antitrust case against Google—resigned from ICOMP after Microsoft backed away from what had been a dogged campaign against its search rival in Europe. ICOMP was founded in 2008 to fight for an “online competitive marketplace.”

One source told us that Microsoft had agreed to prop up ICOMP’s food, travel, and accommodation expenses without having any active involvement in the group.

In a letter from Foundem to ICOMP—seen by Ars—the company said: “In our view, an ICOMP that is prohibited from commenting on Google’s immensely damaging business practices is an ICOMP working against, rather than for, the interests of a fair, competitive online marketplace.”

Foundem added in its December 2 missive: “As a leading complainant in the European Commission’s ongoing competition investigation into Google’s search manipulation practices, Foundem cannot be a member of an organisation that has turned its back on such an important issue.”

Ars asked Microsoft to comment on this issue to confirm claims that its fight against Google on search in the EU was effectively over. It did not respond directly to that question, however. Instead we were told that Microsoft’s complaint against Google in the European Commission had not been withdrawn.
«

Fiveash has been covering the Google/Microsoft proxy battle for years since she was at The Register. But it sounds as though Satya Nadella, having gotten rid of the vicious ex-political lobbyist Mark Penn, is dialing down the quiet lobbying.
link to this extract

 


How to gain unauthorized fingerprint access to an LG V10 » AndroidAuthority

John Dye:

»
If this person isn’t running Nova Launcher, the game’s up here. This vulnerability is only known to work on this particular launcher so far, so if your quarry is operating Google Now then they are safe from your malicious intent. However, if they are running Nova Launcher, you can tap the Home button while on the main home screen, then tap the Widgets option. Add a Nova Action widget to the home screen, and then choose the activity “com.lge.fingerprintsettings.”

Pause here for a second, because this is where the vulnerability exists. Through the normal Settings menu, it’s impossible to access this particular activity before going through a security checkpoint and confirming either a fingerprint or PIN. However, since Nova is able to ignore the normal menu flow that leads to this screen, it creates a situation where a user can add their own fingerprint to the list of allowed fingerprints without ever proving that they have authorized access to the device.

The widget on the homescreen will now lead directly to fingerprint settings, and you can add your own fingerprint before deleting the widget, leaving little trace of your actions.
«

Nova Launcher presently has more than 10m downloads, so it’s possible you’d find it on a high-end phone. Commenters suggest it can be done on a Samsung Galaxy S5 and S6 too.

Sure that this will be all over news sites in a day or so of course with hundreds of comments. No?
link to this extract

 


Researcher illegally shares millions of science papers free online to spread knowledge » ScienceAlert

»
A researcher in Russia has made more than 48 million journal articles – almost every single peer-reviewed paper every published – freely available online. And she’s now refusing to shut the site down, despite a court injunction and a lawsuit from Elsevier, one of the world’s biggest publishers.

For those of you who aren’t already using it, the site in question is Sci-Hub, and it’s sort of like a Pirate Bay of the science world. It was established in 2011 by neuroscientist Alexandra Elbakyan, who was frustrated that she couldn’t afford to access the articles needed for her research, and it’s since gone viral, with hundreds of thousands of papers being downloaded daily. But at the end of last year, the site was ordered to be taken down by a New York district court – a ruling that Elbakyan has decided to fight, triggering a debate over who really owns science.

“Payment of $32 is just insane when you need to skim or read tens or hundreds of these papers to do research. I obtained these papers by pirating them,” Elbakyan told Torrent Freak last year. “Everyone should have access to knowledge regardless of their income or affiliation. And that’s absolutely legal.”…

… She also explains that the academic publishing situation is different to the music or film industry, where pirating is ripping off creators. “All papers on their website are written by researchers, and researchers do not receive money from what Elsevier collects. That is very different from the music or movie industry, where creators receive money from each copy sold,” she said.
«

The journals’ argument is that they add value by getting papers peer-reviewed, and edited, and choosing the important ones to publish. The existence of free unpeered sites such as Arxiv hasn’t noticeably dented their business.

But it always feels wrong when publicly funded research in particular ends up behind giant paywalls. If the public pays for the research, the public should be able to see its fruits.
link to this extract

 


Evidence suggests the Sony hackers are alive and well and still hacking » WIRED

Kim Zetter:

»
According to new data released this week by Juan Andrés Guerrero-Saade, senior security researcher with Kaspersky Lab’s Global Research and Analysis Team, and Jaime Blasco who heads the Lab Intelligence and Research team at AlienVault Labs, the hackers behind the Sony breach are alive and well…and still hacking. Or at least evidence uncovered from hacks of various entities after the Sony breach, including South Korea’s nuclear power plant operator, suggests this later activity has ties to the Sony case.

“[T]hey didn’t disappear…not at all,” Guerrero-Saade said during a presentation with Blasco this week at the Kaspersky Security Analyst Summit in Spain.

If true, it would mean the hackers who demonstrated an “extremely high” level of sophistication in the Sony attack have been dropping digital breadcrumbs for at least the last year, crumbs that researchers can now use to map their activity and see where they’ve been. The clues include—to name a few—re-used code, passwords, and obfuscation methods, as well as a hardcoded user agent list that showed up repeatedly in attacks, always with Mozilla consistently misspelled as “Mozillar.”
«

link to this extract

 


So who’s going to buy Pandora? » Music Business Worldwide

Tim Ingham:

»
the US public company has reportedly begun talking to Morgan Stanley about finding a potential buyer.

As we stand, Pandora, for all its historical global licensing issues and growing annual net losses, looks a little like a bargain.

The company has lost $7bn in market cap valuation over the past two years. It’s currently sitting at $1.9bn – less than a quarter of Spotify’s latest private valuation.

However, there are other reasons why possible acquirers may cool their jets on Pandora – not least the fact that its active listener base is dropping, down year-on-year in Q4 2015 to 81.1m.

In addition, the firm’s acquisition of Rdio’s assets means an entry into the hugely competitive space of interactive music streaming is an inevitability, while it paid a scary $450m to buy Ticketfly last year – a sister operation that contributed just $10m to the bottom line in Q4.

So who might cough up and buy Pandora if (and it’s a big if) its shareholders agree to push for a sale?
«

Suggestions: Google, Apple, IHeartMedia, Samsung. Can’t honestly see any of them wanting it, rather than just waiting for it to vanish.
link to this extract

 


Why mobile is different » The Economist

Anonymous, as ever with The Economist:

»
the combination of personalisation, location and a willingness to pay makes all kinds of new business models possible. Tomi Ahonen, head of 3G Business Consulting at Nokia, gives the example of someone waiting at a bus stop who pulls out his Internet-capable phone to find out when the next bus will arrive. The information sent to the phone can be personalised, reflecting the fact that the user’s location is known, and perhaps his home address too; so bus routes that run from one to the other can appear at the top of the list, saving the user from having to scroll and click through lots of pages and menus. A very similar service, which allows users to find out when the next bus is due by sending a text message from a bus stop, is already available in Italy.

Would-be providers of mobile Internet services cannot simply set up their servers and wait for the money to roll in, however, because the network operators—who know who and where the users are, and control the billing system—hold all the cards. This has changed the balance of power between users, network operators and content providers. On the fixed Internet, the network access provider acts as a “dumb pipe” between the user’s PC and, say, an online bookstore or travel agent. The access provider will not know how the connection has been used, and there is no question of claiming a commission. Mobile network operators, on the other hand, are in a far more powerful position. “Wireless is a smarter pipe,” says Chris Matthiasson of BT Cellnet. This means that operators are much less likely to be disintermediated.
«

The sharp-eyed will have started in the second sentence; others, in the second paragraph. That’s because this piece is from October 2001. It took a while, but the operators are pretty thoroughly disintermediated now.
link to this extract

 


TfL social media: adapting to Twitter’s changes » TfL Digital blog

Steven Gutierrez of Transport for London, which runs London’s buses and underground services:

»
in the last few years, Twitter has introduced various changes to the way it serves content to its users, and these have impacted upon our ability to reliably deliver these real-time status updates to our followers.

Now selected content on Twitter is shown out of sequence, we will reduce the amount of minor alerts and focus on providing up-to-the-minute alerts for major issues, as well as a renewed focus on customer service across our various accounts.

Our teams will continue to work day and night to support customers including First Contact who take care of the Tube line Twitter feeds as well as CentreComm and LSTCC who have access to everything from iBus (our system for tracking London Buses) to police helicopters monitoring London from above.
«

Wow: you think Twitter is a static thing, but these changes really do affect what happens. The point about image search shows it’s not trivial either.
link to this extract

 


Artificial intelligence offers a better way to diagnose malaria » Technology Review

Anna Nowogrodzki:

»
For all our efforts to control malaria, diagnosing it in many parts of the world still requires counting malaria parasites under the microscope on a glass slide smeared with blood. Now an artificial intelligence program can do it more reliably than most humans.

That AI comes inside an automated microscope called the Autoscope, which is 90 percent accurate and specific at detecting malaria parasites. Charles Delahunt and colleagues at Intellectual Ventures Laboratory—the research arm of Nathan Myhrvold’s patent licensing company Intellectual Ventures in Seattle—built the system with support from Bill and Melinda Gates through the Global Good Fund. The Autoscope was tested in the field at the Shoklo Malaria Research Unit on the Thailand-Myanmar border during malaria season in December 2014 and January 2015. The results were published in December.
«

If I’m reading the results correctly, it got about 95% accuracy. (Correct me if I’m wrong.)

My own forecast is that “an [AI] algorithm for..” will be the “listen to this!” phrase of 2016, and utterly commonplace in 2017.
link to this extract

 


Errata, corrigenda and ai no corrida: None noted.