Start up: Facebook’s video hope, Amy on Outlook, Apple’s neural nets, a Trump rally in Greensboro, and more

06

Deleting the default apps on iOS 10 will get rid of them, right? Wrong. Photo by tuaulamac on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 12 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Facebook is predicting the end of the written word • Quartz

Cassie Werber:

»Facebook has arguably made us all writers, since it has become the medium of choice for millions to share their views and life experiences. But in five years that creativity may look very different. Facebook is predicting the end of the written word on its platform.

In five years time Facebook “will be definitely mobile, it will be probably all video,” said Nicola Mendelsohn, who heads up Facebook’s operations in Europe, the Middle East and Africa, at a conference in London this morning. Mark Zuckerberg, Facebook’s CEO, has already noted that video will be more and more important for the platform. But Mendelsohn went further, suggesting that stats showed the written word becoming all but obsolete, replaced by moving images and speech.

“The best way to tell stories in this world, where so much information is coming at us, actually is video,” Mendelsohn said. “It conveys so much more information in a much quicker period. So actually the trend helps us to digest much more information.”

«

Not buying this.
link to this extract

 


How ‘deleting’ built-in Apple apps works in iOS 10 • iMore

Rene Ritchie:

»when you delete a built-in app, you don’t really delete it. You do remove the icon from the Home screen, the user data is flushed, and the hooks into the system for things like default links and Siri handling are removed. But, it doesn’t delete the actual app binary.

There are two reasons for this:

• Apple’s built-in apps are very, very small, taking up only 150 MB of storage. That’s because they wrap a lot of core functionality and so don’t introduce a lot of extraneous code or assets.

• When a version of iOS is released, Apple signs it so your iPhone or iPad can verify it’s legitimate and hasn’t been tampered with by a third party. That code signing covers the entirety of iOS, including built-in apps. If everyone had different apps, some present, some not, the current form of signing security wouldn’t work.

«

Deleting the user data might save a fair amount of storage, though.
link to this extract

 


X.ai works with Microsoft Outlook.com • Business Insider

Matt Weinberger:

»For the last two years, the popular x.ai virtual personal assistant has been helping Google Calendar users manage their meetings.

Today, x.ai is finally coming to Microsoft calendars, with support for Office 365 and Outlook.com, as the company moves closer to the release of its paid business edition later this year.

«

Amy is a really terrific system – I don’t know why Google or Microsoft hasn’t snapped up x.ai.
link to this extract

 


BNNS • Apple Developer Documentation

»Basic neural network subroutines (BNNS) is a collection of functions that you use to implement and run neural networks, using previously obtained training data.

«

Embedded in all four platforms (iOS, tvOS, watchOS, OSX/MacOS):

»BNNS supports implementation and operation of neural networks for inference, using input data previously derived from training. BNNS does not do training, however. Its purpose is to provide very high performance inference on already trained neural networks.

«

Does Android have anything comparable?
link to this extract

 


The perils and promises of gene-drive technology • The New Yorker

Michael Specter:

»Normally, the progeny of any sexually reproductive organism receives half its genome from each parent. For decades, however, biologists have been aware that some genetic elements are “selfish”: evolution has bestowed on them a better-than-fifty-per-cent chance of being inherited. But, until scientists began to work with Crispr, which permits DNA to be edited with uncanny ease and accuracy, they lacked the tools to make those changes.

Then the evolutionary biologist Kevin Esvelt, who runs the Sculpting Evolution Group at M.I.T.’s Media Lab, realized that, by attaching a gene drive to a desired DNA sequence with crispr, you could permanently alter the genetic destiny of a species. That’s because, with crispr, a change made on one chromosome would copy itself in every successive generation, so that nearly all descendants would inherit the change. A mutation that blocked the parasite responsible for malaria, for instance, could be engineered into a mosquito and passed down every time it reproduced. Within a year or two, none of the original mosquito’s offspring would be able to transmit the infection. And if gene drives work for malaria they ought to work for other mosquito-borne diseases, such as dengue, yellow fever, and Zika.

This is tremendously promising news, but nothing so powerful comes without risk—and there has never been a more powerful biological tool…

…Pretty soon, we are going to have to make some of the most pressing decisions we have ever made about how, whether, and when to deploy a new technology.

«

link to this extract

 


The end of reflection • The New York Times

Teddy Wayne:

»By 2012, Google engineers had discovered that when results take longer than two-fifths of a second to appear, people search less, and lagging just one quarter of a second behind a rival site can drive users away.

“That hints at the way that, as our technologies increase the intensity of stimulation and the flow of new things, we adapt to that pace,” [author of The Shallows, Nichola] Carr said. “We become less patient. When moments without stimulation arise, we start to feel panicked and don’t know what to do with them, because we’ve trained ourselves to expect this stimulation — new notifications and alerts and so on.”

What this often translates to in the discourse of the internet is demand for immediate and perfunctory “hot takes” rather than carefully weighed judgments, whether they’re about serious or superficial matters.

Mr. Carr also noted counterarguments: Formulating relatively simple thoughts on the internet can yield more complex ones through real-time exchanges with others, and people whose reflex is to post a notion hastily rather than let it sit may not have been the most deliberative thinkers in a pre-smartphone time, either.

Nevertheless, he sees our current direction as indicative of “the loss of the contemplative mind,” he said.

«

link to this extract

 


What is Differential Privacy’? • A Few Thoughts On Cryptographic Engineering

Matthew Green of Johns Hopkins University, explaining the system Apple says it’s using for its machine learning system:

»A much more promising approach is not to collect the raw data at all. This approach was recently pioneered by Google to collect usage statistics in their Chrome browser. The system, called RAPPOR, is based on an implementation of the 50-year old randomized response technique. Randomized response works as follows:

• When a user wants to report a piece of potentially embarrassing information (made up example: “Do you use Bing?”), they first flip a coin, and if the coin comes up “heads”, they return a random answer — calculated by flipping a second coin. Otherwise they answer honestly.

• The server then collects answers from the entire population, and (knowing the probability that the coins will come up “heads”), adjusts for the included “noise” to compute an approximate answer for the true response rate.

Intuitively, randomized response protects the privacy of individual user responses, because a “yes” result could mean that you use Bing, or it could just be the effect of the first mechanism (the random coin flip). More formally, randomized response has been shown to achieve Differential Privacy, with specific guarantees that can adjusted by fiddling with the coin bias.

RAPPOR takes this relatively old technique and turns it into something much more powerful. Instead of simply responding to a single question, it can report on complex vectors of questions, and may even return complicated answers, such as strings – e.g., which default homepage you use. The latter is accomplished by first encoding the string into a Bloom filter – a bitstring constructed using hash functions in a very specific way. The resulting bits are then injected with noise, and summed, and the answers recovered using a (fairly complex) decoding process.

«

I think “it’s complicated” will probably do as a first pass.
link to this extract

 


Android share growth slows after historic gains last period • Kantar Worldpanel

»“In Great Britain, both Android and iOS had higher market share in the three months ending April 2016. Android represented 58.5% of the market in that period, a gain of 4.1% year-on-year,” said Dominic Sunnebo, Business Unit Director for Kantar Worldpanel ComTech Europe. “And for iOS, this term showed the first increase since October 2015, though modest at just 0.4%, from 34.7% to 35.1%. Android gains came from Windows phone owners switching, a trend that produced nearly 10% of new Android customers, while 21.8% of new iOS buyers switched from Android.”

«

In other words: Windows Phone, the platform, is burning, and not in a good way. This will sound familiar to students of history, and not in a good way either.

»

“In Urban China, Android share rose 4.8% year-over-year, and 1.1% period-over-period, to capture 78.8% of smartphone sales in the three months ending April 2016,” noted Tamsin Timpson, Strategic Insight Director at Kantar Worldpanel ComTech Asia. “While movement from featurephones to smartphones has slowed significantly in developed markets like the US and EU5, this still makes up a significant proportion of smartphone sales in Urban China. Nearly a third of Android users during this time were purchasing their first smartphone, in contrast to iOS buyers, of whom only 14% were first-time smartphone customers.”

«

That doesn’t tell us whether Chinese iOS buyers were moving from Android in any measurable quantity. But clearly Android is still effective at gaining from featurephones.
link to this extract

 


A Trump rally in Greensboro • · Storify

Jared Yates Sexton went along and tweeted what he saw and heard, with this as the tagline:

»”Anger in here is palpable”: in which a sane man live tweets insanity.

«

It really is scary. (Over 170,000 views at the time of tagging.) A question one might like to consider is whether Trump would let his wife walk unaccompanied through the car park following one of his rallies. (There’s more of Sexton’s work on this blog.)
link to this extract

 


OnePlus X series is no more, says CEO • Engadget

Richard Lai:

»While it’s common practice for smartphone makers to offer two or three product lines to cover all the bases, OnePlus has recently decided to go from two to one. At the OnePlus 3 launch event in Shenzhen today, CEO Pete Lau confirmed that his company’s more affordable offering, the OnePlus X, will not have a followup model. That’s not to say it was a bad phone (even we liked it) nor was it unpopular, but Lau reasoned that OnePlus will instead focus on just one “true flagship” line from now on, in order to strengthen its foundation – something that Lau admitted his team neglected last year – rather than fighting the low-end price war.

«

OnePlus is on thin margins and (comparatively) low volumes, so it has to shift towards premium pricing to survive.
link to this extract

 


Now Peter Thiel’s lawyer wants to silence reporting on Trump’s hair [Updated] • Gawker

J K Trotter:

»But if you were under the impression that praise-worthy journalism [investigating whether Donald Trump’s hair is a $60,000 wig/weave – which I would think is very likely indeed] is somehow inoculated against campaigns like Thiel’s, you’d be mistaken. Last week, Thiel’s lawyer-for-hire, Charles J. Harder, sent Gawker a letter on behalf of Ivari International’s owner and namesake, Edward Ivari, in which Harder claims that Feinberg’s story was “false and defamatory,” invaded Ivari’s privacy, intentionally inflicted emotional distress, and committed “tortious interference” with Ivari’s business relations. Harder enumerates 19 different purportedly defamatory statements—almost all of which were drawn from several publicly available lawsuits filed against Ivari.

Harder’s demands included the immediate removal of the story from Gawker, a public apology, the preservation of “all physical and electronic documents, materials and data in your possession” related to the story, and, notably, that we reveal our sources.

«

Thiel’s lawyer’s filing is nonsense; and Gawker now does not give a flying one how much it offends either of them. When you’re on Death Row, death threats hardly scare you.
link to this extract

 


Shutterbugs, rejoice: Apple’s iOS 10 will shoot raw photos • CNET

Stephen Shankland:

»Apple’s next-gen iOS 10 software adds a new programming interface that will let camera apps retrieve unprocessed raw photo data from the camera hardware, according to Apple developer documentation. Google’s Android has supported raw photos since the release of the Lollipop version in 2014.

There’s a good reason Apple didn’t include raw photo support in its top-10 list of new iOS 10 features unveiled at its annual Worldwide Developer Conference (WWDC) Monday. Raw photography is complex and too much of a hassle for most people to bother with. But with photography now so central to mobile phones, and with photo enthusiasts being such an active and visible type of customer, raw photo support is a major improvement. Raw photos should help Apple’s iPhones keep their place atop the list of most popular cameras on Flickr, the photo-sharing site.

«

link to this extract

 


Errata, corrigenda and ai no corrida: none notified.

Start up: lightening YouTube, more Flash vulnerability, farewell to Apple’s store fan, NSA cracking, and more


“Yeah, pretty frazzled after a long day writing clickbait headlines. You?” Photo by peyri on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 8 links for you. Hand-picked by fingers. I’m charlesarthur on Twitter. Observations and links welcome.

Page weight matters » Chris Zacharias

At YouTube, Zacharias was challenged to get the standard 1.2MB page down below 100KB:

Having just finished writing the HTML5 video player, I decided to plug it in instead of the far heavier Flash player. Bam! 98KB and only 14 requests. I threaded the code with some basic monitoring and launched an opt-in to a fraction of our traffic.

After a week of data collection, the numbers came back… and they were baffling. The average aggregate page latency under Feather had actually INCREASED. I had decreased the total page weight and number of requests to a tenth of what they were previously and somehow the numbers were showing that it was taking LONGER for videos to load on Feather. This could not be possible. Digging through the numbers more and after browser testing repeatedly, nothing made sense. I was just about to give up on the project, with my world view completely shattered, when my colleague discovered the answer: geography.

The explanation is rather smart.
link to this extract


Forbes: a quick adtech video » Medium

Rob Leathern wanted to read an article – you know, one of those text things – on Forbes:

In order for me to read that one article I had to receive 1,083 URL calls from 197 different domains adding up to 18.3 Megabytes of data, summarized here in an Excel spreadsheet. I closed any videos as soon as I could if they had the ability to do so.

Is it worth it? I like Alex Konrad and the article was probably a good one, but given I’m not sure where my data is going, or who some of these entities are (jwpltx.com? wishabi.com?) I just don’t know.

link to this extract


Auto-generating clickbait with recurrent neural networks » Lars Eidnes’ blog

To generate clickbait, we’ll train such an RNN [recurrent neural network] on ~2,000,000 headlines, scraped from Buzzfeed, Gawker, Jezebel, Huffington Post and Upworthy.

How realistic can we expect the output of this model to be? Even if it can learn to generate text with correct syntax and grammar, it surely can’t produce headlines that contain any new knowledge of the real world? It can’t do reporting? This may be true, but it’s not clear that clickbait needs to have any relation to the real world in order to be successful. When this work was begun, the top story on BuzzFeed was “50 Disney Channel Original Movies, Ranked By Feminism“. More recently they published “22 Faces Everyone Who Has Pooped Will Immediately Recognized“. It’s not clear that these headlines are much more than a semi-random concatenation of topics their userbase likes, and as seen in the latter case, 100% correct grammar is not a requirement.

The training converges after a few days of number crunching on a GTX980 GPU. Let’s take a look at the results.

The results are spooky – such as “Taylor Swift Becomes New Face Of Victim Of Peace Talks” and “This Guy Thinks His Cat Was Drunk For His Five Years, He Gets A Sex Assault At A Home”. Because, you know, if you looked out of the corner of your eye, isn’t that what was on some site somewhere? (They weren’t.)

One feels Eidnes’s work should have happened in a Transylvanian laboratory in a thunderstorm. Next you get a machine to write the story that fits the headline, and.. we can all knock off for the century.
link to this extract


Broadband in the UK ‘to stay top of the 5 major EU countries until 2020’ » ISPreview UK

Mark Jackson:

A new BT-commissioned report from telecoms analyst firm Analysys Mason has perhaps unsurprisingly found that the take-up and availability of superfast broadband (30Mbps+) connectivity in the United Kingdom is ahead of Spain, Germany, Italy and France, and will remain there until at least 2020.

The benchmarking report marks the United Kingdom as the “most competitive broadband market of all the countries it features“, although there are a few caveats to its findings. For example, the report overlooks most of Europe’s other states, including those with superior broadband infrastructure to ours, and seems to only focus on fixed line networks.

Furthermore it also makes an assumption that the current roll-out progress will hold to the Government’s promised targets, which may well be the case but we won’t know for certain until 2020. In addition, the study only appears to consider “superfast” services (defined as 30Mbps+ in the report), which overlooks the important area of “ultrafast” (100Mbps+) connectivity.

BT tweeted this headline and added “thanks to BT’s rollout of fibre”, and the culture/media/sport minister Ed Vaizey retweeted it without comment.

Is it really healthy that during an Ofcom examination of BT’s position a minister is doing that? Meanwhile Jackson’s longer analysis provides much-needed scepticism about the claims, and the lack of data in the report.
link to this extract


Adobe Flash Player security vulnerability: how to protect yourself » BGR

Zach Epstein:

The fun never ends with Adobe Flash.

Just one day after Adobe released its monthly security patches for various software including Flash Player, the company confirmed a major security vulnerability that affects all versions of Flash for Windows, Mac and Linux computers. You read that correctly… all versions. Adobe said it has been made aware that this vulnerability is being used by hackers to attack users, though it says the attacks are limited and targeted. Using the exploit, an attacker can crash a target PC or even take complete control of the computer.

And now for the fun part: The only way to effectively protect yourself against this serious security hole is to completely uninstall Flash Player from your machine.

Here’s the security note: “Adobe is aware of a report that an exploit for this vulnerability is being used in limited, targeted attacks. Adobe expects to make an update available during the week of October 19.” Spear phishing, no doubt; but Flash really is beginning to look like the worst thing you can have on your machine, especially if you’re in any sort of sensitive work.
link to this extract


Why Google is wrong to say advertisers should shift 24% of their TV budgets to YouTube » Business Insider

Lindsey Clay in chief executive of Thinkbox, which just happens to be a commercial TV marketing body, and doesn’t like Google’s suggestion:

why would an advertiser remove a quarter of the money they invest in the most effective part of their advertising and give it to something that hasn’t shown any proof of actually selling anything? 

However, it needs a response lest anyone believes Google on this. Here are some things to consider:

This is Google’s data. We’ve asked to see the data itself, but usually Google doesn’t share. If and when it does, we’ll comment on it but we obviously need to comment now. We understand the TV elements are based around a panel of Google users managed by Kantar that does not measure all TV and that the YouTube element is provided by Google themselves.

If that isn’t flaky and biased enough, it is also unaudited. They even called it the “Google Extra Reach Tool”; it is a self-fulfilling prophecy. And does it take account of the 50% of online ads that are not seen by humans? And how does it square with the report in the FT recently revealing that YouTube has been selling fraudulent ad views to advertisers?

Their recommendation also seriously challenges common sense when official industry sources including comScore show that YouTube accounts for 7.5% of 16 to 24-year-olds’ video time, with TV at 65%. The numbers for the whole population are 3.5% and 81%. Ad minutage on commercial TV is approximately 15% of that time, but is much lower on YouTube, and that is before you consider users’ impatient use of its ‘Skip ad’ button.

Clay is hardly impartial, but she raises worthwhile points.
link to this extract


Apple’s biggest fan has died » The Washington Post

Michael Rosenwald:

There are plenty of goofballs — like me — who stand outside Apple stores all night waiting for the company’s latest, thinnest, must-have offering.

There was nobody like Gary Allen, who died Sunday from brain cancer at 67.

Allen didn’t care so much about Apple’s new products (though he bought many of them.) He cared about the stores, the sleek and often innovative ways Apple presented itself to the world — the winding staircases, the floor-to-ceiling glass, the exposed brick.

Allen, a retired EMS dispatcher, traveled around the world — obsessively and expensively — to be among the first in line at the company’s new stores. He attended more than 140 openings, collecting all sorts of trivia. He could even tell you where Apple store tables are made (Utah; he stopped by the factory once to say thanks).

The headline is a trifle unfair; Allen was a fan of the stores, and their design. Rosenwald recounts a story of someone who just liked paying attention to detail; it’s a delightful mini-obituary.
link to this extract


How is NSA breaking so much crypto? » Freedom To Tinker

Alex Halderman and Nadia Heninger:

The Snowden documents also hint at some extraordinary capabilities: they show that NSA has built extensive infrastructure to intercept and decrypt VPN traffic and suggest that the agency can decrypt at least some HTTPS and SSH connections on demand.

However, the documents do not explain how these breakthroughs work, and speculation about possible backdoors or broken algorithms has been rampant in the technical community. Yesterday at ACM CCS, one of the leading security research venues, we and twelve coauthors presented a paper that we think solves this technical mystery.

The key is, somewhat ironically, Diffie-Hellman key exchange, an algorithm that we and many others have advocated as a defense against mass surveillance. Diffie-Hellman is a cornerstone of modern cryptography used for VPNs, HTTPS websites, email, and many other protocols. Our paper shows that, through a confluence of number theory and bad implementation choices, many real-world users of Diffie-Hellman are likely vulnerable to state-level attackers.

Estimated cost: $100m for a system that could break a single Diffie-Hellman key per year. But after two years, with the correctly chosen keys, you could passively eavesdrop on 20% of the top million HTTPS sites. Don’t underestimate the NSA. But of course, don’t underestimate the Chinese, Russians, and so on..
link to this extract