Start up: Facebook’s video hope, Amy on Outlook, Apple’s neural nets, a Trump rally in Greensboro, and more

06

Deleting the default apps on iOS 10 will get rid of them, right? Wrong. Photo by tuaulamac on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 12 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Facebook is predicting the end of the written word • Quartz

Cassie Werber:

»Facebook has arguably made us all writers, since it has become the medium of choice for millions to share their views and life experiences. But in five years that creativity may look very different. Facebook is predicting the end of the written word on its platform.

In five years time Facebook “will be definitely mobile, it will be probably all video,” said Nicola Mendelsohn, who heads up Facebook’s operations in Europe, the Middle East and Africa, at a conference in London this morning. Mark Zuckerberg, Facebook’s CEO, has already noted that video will be more and more important for the platform. But Mendelsohn went further, suggesting that stats showed the written word becoming all but obsolete, replaced by moving images and speech.

“The best way to tell stories in this world, where so much information is coming at us, actually is video,” Mendelsohn said. “It conveys so much more information in a much quicker period. So actually the trend helps us to digest much more information.”

«

Not buying this.
link to this extract

 


How ‘deleting’ built-in Apple apps works in iOS 10 • iMore

Rene Ritchie:

»when you delete a built-in app, you don’t really delete it. You do remove the icon from the Home screen, the user data is flushed, and the hooks into the system for things like default links and Siri handling are removed. But, it doesn’t delete the actual app binary.

There are two reasons for this:

• Apple’s built-in apps are very, very small, taking up only 150 MB of storage. That’s because they wrap a lot of core functionality and so don’t introduce a lot of extraneous code or assets.

• When a version of iOS is released, Apple signs it so your iPhone or iPad can verify it’s legitimate and hasn’t been tampered with by a third party. That code signing covers the entirety of iOS, including built-in apps. If everyone had different apps, some present, some not, the current form of signing security wouldn’t work.

«

Deleting the user data might save a fair amount of storage, though.
link to this extract

 


X.ai works with Microsoft Outlook.com • Business Insider

Matt Weinberger:

»For the last two years, the popular x.ai virtual personal assistant has been helping Google Calendar users manage their meetings.

Today, x.ai is finally coming to Microsoft calendars, with support for Office 365 and Outlook.com, as the company moves closer to the release of its paid business edition later this year.

«

Amy is a really terrific system – I don’t know why Google or Microsoft hasn’t snapped up x.ai.
link to this extract

 


BNNS • Apple Developer Documentation

»Basic neural network subroutines (BNNS) is a collection of functions that you use to implement and run neural networks, using previously obtained training data.

«

Embedded in all four platforms (iOS, tvOS, watchOS, OSX/MacOS):

»BNNS supports implementation and operation of neural networks for inference, using input data previously derived from training. BNNS does not do training, however. Its purpose is to provide very high performance inference on already trained neural networks.

«

Does Android have anything comparable?
link to this extract

 


The perils and promises of gene-drive technology • The New Yorker

Michael Specter:

»Normally, the progeny of any sexually reproductive organism receives half its genome from each parent. For decades, however, biologists have been aware that some genetic elements are “selfish”: evolution has bestowed on them a better-than-fifty-per-cent chance of being inherited. But, until scientists began to work with Crispr, which permits DNA to be edited with uncanny ease and accuracy, they lacked the tools to make those changes.

Then the evolutionary biologist Kevin Esvelt, who runs the Sculpting Evolution Group at M.I.T.’s Media Lab, realized that, by attaching a gene drive to a desired DNA sequence with crispr, you could permanently alter the genetic destiny of a species. That’s because, with crispr, a change made on one chromosome would copy itself in every successive generation, so that nearly all descendants would inherit the change. A mutation that blocked the parasite responsible for malaria, for instance, could be engineered into a mosquito and passed down every time it reproduced. Within a year or two, none of the original mosquito’s offspring would be able to transmit the infection. And if gene drives work for malaria they ought to work for other mosquito-borne diseases, such as dengue, yellow fever, and Zika.

This is tremendously promising news, but nothing so powerful comes without risk—and there has never been a more powerful biological tool…

…Pretty soon, we are going to have to make some of the most pressing decisions we have ever made about how, whether, and when to deploy a new technology.

«

link to this extract

 


The end of reflection • The New York Times

Teddy Wayne:

»By 2012, Google engineers had discovered that when results take longer than two-fifths of a second to appear, people search less, and lagging just one quarter of a second behind a rival site can drive users away.

“That hints at the way that, as our technologies increase the intensity of stimulation and the flow of new things, we adapt to that pace,” [author of The Shallows, Nichola] Carr said. “We become less patient. When moments without stimulation arise, we start to feel panicked and don’t know what to do with them, because we’ve trained ourselves to expect this stimulation — new notifications and alerts and so on.”

What this often translates to in the discourse of the internet is demand for immediate and perfunctory “hot takes” rather than carefully weighed judgments, whether they’re about serious or superficial matters.

Mr. Carr also noted counterarguments: Formulating relatively simple thoughts on the internet can yield more complex ones through real-time exchanges with others, and people whose reflex is to post a notion hastily rather than let it sit may not have been the most deliberative thinkers in a pre-smartphone time, either.

Nevertheless, he sees our current direction as indicative of “the loss of the contemplative mind,” he said.

«

link to this extract

 


What is Differential Privacy’? • A Few Thoughts On Cryptographic Engineering

Matthew Green of Johns Hopkins University, explaining the system Apple says it’s using for its machine learning system:

»A much more promising approach is not to collect the raw data at all. This approach was recently pioneered by Google to collect usage statistics in their Chrome browser. The system, called RAPPOR, is based on an implementation of the 50-year old randomized response technique. Randomized response works as follows:

• When a user wants to report a piece of potentially embarrassing information (made up example: “Do you use Bing?”), they first flip a coin, and if the coin comes up “heads”, they return a random answer — calculated by flipping a second coin. Otherwise they answer honestly.

• The server then collects answers from the entire population, and (knowing the probability that the coins will come up “heads”), adjusts for the included “noise” to compute an approximate answer for the true response rate.

Intuitively, randomized response protects the privacy of individual user responses, because a “yes” result could mean that you use Bing, or it could just be the effect of the first mechanism (the random coin flip). More formally, randomized response has been shown to achieve Differential Privacy, with specific guarantees that can adjusted by fiddling with the coin bias.

RAPPOR takes this relatively old technique and turns it into something much more powerful. Instead of simply responding to a single question, it can report on complex vectors of questions, and may even return complicated answers, such as strings – e.g., which default homepage you use. The latter is accomplished by first encoding the string into a Bloom filter – a bitstring constructed using hash functions in a very specific way. The resulting bits are then injected with noise, and summed, and the answers recovered using a (fairly complex) decoding process.

«

I think “it’s complicated” will probably do as a first pass.
link to this extract

 


Android share growth slows after historic gains last period • Kantar Worldpanel

»“In Great Britain, both Android and iOS had higher market share in the three months ending April 2016. Android represented 58.5% of the market in that period, a gain of 4.1% year-on-year,” said Dominic Sunnebo, Business Unit Director for Kantar Worldpanel ComTech Europe. “And for iOS, this term showed the first increase since October 2015, though modest at just 0.4%, from 34.7% to 35.1%. Android gains came from Windows phone owners switching, a trend that produced nearly 10% of new Android customers, while 21.8% of new iOS buyers switched from Android.”

«

In other words: Windows Phone, the platform, is burning, and not in a good way. This will sound familiar to students of history, and not in a good way either.

»

“In Urban China, Android share rose 4.8% year-over-year, and 1.1% period-over-period, to capture 78.8% of smartphone sales in the three months ending April 2016,” noted Tamsin Timpson, Strategic Insight Director at Kantar Worldpanel ComTech Asia. “While movement from featurephones to smartphones has slowed significantly in developed markets like the US and EU5, this still makes up a significant proportion of smartphone sales in Urban China. Nearly a third of Android users during this time were purchasing their first smartphone, in contrast to iOS buyers, of whom only 14% were first-time smartphone customers.”

«

That doesn’t tell us whether Chinese iOS buyers were moving from Android in any measurable quantity. But clearly Android is still effective at gaining from featurephones.
link to this extract

 


A Trump rally in Greensboro • · Storify

Jared Yates Sexton went along and tweeted what he saw and heard, with this as the tagline:

»”Anger in here is palpable”: in which a sane man live tweets insanity.

«

It really is scary. (Over 170,000 views at the time of tagging.) A question one might like to consider is whether Trump would let his wife walk unaccompanied through the car park following one of his rallies. (There’s more of Sexton’s work on this blog.)
link to this extract

 


OnePlus X series is no more, says CEO • Engadget

Richard Lai:

»While it’s common practice for smartphone makers to offer two or three product lines to cover all the bases, OnePlus has recently decided to go from two to one. At the OnePlus 3 launch event in Shenzhen today, CEO Pete Lau confirmed that his company’s more affordable offering, the OnePlus X, will not have a followup model. That’s not to say it was a bad phone (even we liked it) nor was it unpopular, but Lau reasoned that OnePlus will instead focus on just one “true flagship” line from now on, in order to strengthen its foundation – something that Lau admitted his team neglected last year – rather than fighting the low-end price war.

«

OnePlus is on thin margins and (comparatively) low volumes, so it has to shift towards premium pricing to survive.
link to this extract

 


Now Peter Thiel’s lawyer wants to silence reporting on Trump’s hair [Updated] • Gawker

J K Trotter:

»But if you were under the impression that praise-worthy journalism [investigating whether Donald Trump’s hair is a $60,000 wig/weave – which I would think is very likely indeed] is somehow inoculated against campaigns like Thiel’s, you’d be mistaken. Last week, Thiel’s lawyer-for-hire, Charles J. Harder, sent Gawker a letter on behalf of Ivari International’s owner and namesake, Edward Ivari, in which Harder claims that Feinberg’s story was “false and defamatory,” invaded Ivari’s privacy, intentionally inflicted emotional distress, and committed “tortious interference” with Ivari’s business relations. Harder enumerates 19 different purportedly defamatory statements—almost all of which were drawn from several publicly available lawsuits filed against Ivari.

Harder’s demands included the immediate removal of the story from Gawker, a public apology, the preservation of “all physical and electronic documents, materials and data in your possession” related to the story, and, notably, that we reveal our sources.

«

Thiel’s lawyer’s filing is nonsense; and Gawker now does not give a flying one how much it offends either of them. When you’re on Death Row, death threats hardly scare you.
link to this extract

 


Shutterbugs, rejoice: Apple’s iOS 10 will shoot raw photos • CNET

Stephen Shankland:

»Apple’s next-gen iOS 10 software adds a new programming interface that will let camera apps retrieve unprocessed raw photo data from the camera hardware, according to Apple developer documentation. Google’s Android has supported raw photos since the release of the Lollipop version in 2014.

There’s a good reason Apple didn’t include raw photo support in its top-10 list of new iOS 10 features unveiled at its annual Worldwide Developer Conference (WWDC) Monday. Raw photography is complex and too much of a hassle for most people to bother with. But with photography now so central to mobile phones, and with photo enthusiasts being such an active and visible type of customer, raw photo support is a major improvement. Raw photos should help Apple’s iPhones keep their place atop the list of most popular cameras on Flickr, the photo-sharing site.

«

link to this extract

 


Errata, corrigenda and ai no corrida: none notified.

Start up: the stuck smart home, McAfee’s hack trick, ICO probes Deepmind deal, Flash the zombie, and more


Yes, Runkeeper tracks your runs. But Norway’s consumer council thinks it tracks more than that. Photo by Gordon on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 11 links for you. Ain’t that something? I’m charlesarthur on Twitter. Observations and links welcome.

The smart home is stuck • Tech.pinions

Jan Dawson:

»The challenge, then, is the addressable market for most smart home technology is pretty small, composed of innovators and early adopters in the classic technology diffusion curve. As a result, many products are attempting to squeeze every opportunity out of these small markets until they’re maxed out. Nest has been criticized for not innovating more around its original product but I suspect this is the result of a deliberate strategy to saturate many individual product markets rather than focus on ongoing significant improvements in a single market. This helps to explain Nest’s acquisition of Dropcam, its smoke and carbon monoxide detector, and the other products it’s been rumored to be working on. There’s more mileage in opening up new markets than there is in squeezing incremental value out of existing markets already nearing saturation.

I see some people referring to Amazon’s Alexa as a more mainstream smart home or home automation product, and I think that’s actually a red herring. Yes, it can be used to control smart home devices but I suspect (a) only a subset of Alexa devices are used for this purpose and (b) such a focus would limit its appeal to a niche within that smart home early adopter category. I think Alexa’s potential is much broader than that and it’s precisely because it isn’t just a smart home controller. Alexa isn’t extending the smart home market – it’s more mainstream precisely because it’s not limited to that small and limited opportunity.

«

link to this extract


Mobile traffic dominates among the web’s most popular sites • The Atlantic

Adriene Lafrance:

»More than half of Facebook’s roughly 1.7 billion monthly users visit the site exclusively from their smartphones—that’s 894 million mobile-only users each month, up from 581 million such users last year and 341 million mobile-only users in 2014, according to the company’s latest earnings report.

Google confirmed last year that more searches come from mobile devices than computers in 10 countries, including the United States. Over the holiday season, Amazon said more than 60% of shoppers used mobile. And Wikipedia, which recently revamped the way it tracks site traffic, says it’s getting more mobile than desktop visits to its English language site.

In April, Wikipedia had about 361 million unique visits from smartphones and tablets compared with some 229 million from desktops—meaning roughly 61% of traffic to the English-language version of Wikipedia came from mobile devices, according to data provided by a spokeswoman.

«

Didn’t know the Wikipedia stat, but that’s really persuasive.
link to this extract


John McAfee apparently tried to trick reporters into thinking he hacked WhatsApp • Gizmodo

William Turton:

»McAfee has a history of being shifty with the press about his alleged cybersecurity exploits. In March, for instance, during a media tour that included appearances on CNN and RT, McAfee claimed he would be able to hack into the phone of San Bernadino terrorist Syed Farook. McAfee never proved his claims, and later admitted that he was lying in order to garner a “shitload of public attention.” And earlier this year, McAfee hedged on his terrorism-prevention ideals for America during an interview with CNN about his Libertarian candidacy for president, saying that his strategy for preventing homegrown terrorism was “difficult to explain.”

Now, it seems McAfee has tried to trick reporters again, by sending them phones pre-cooked with malware containing a keylogger, and convincing them he somehow cracked the encryption on WhatsApp. According to cybersecurity expert Dan Guido, who was contacted by a reporter trying to verify McAfee’s claims, McAfee planned to send this reporter two Samsung phones in sealed boxes. Then, experts working for McAfee would take the phones out of the boxes in front of the reporters and McAfee would read the messages being sent on WhatsApp over a Skype call.

«

Pointless.
link to this extract


ICO probes Google DeepMind patient data-sharing deal with NHS Hospital Trust • Computer Weekly

Caroline Donnelly:

»The Information Commissioner’s Office, the data protection watchdog, confirmed an investigation into the arrangement is underway, on the back of at least one complaint from the general public.

The deal gives DeepMind access to the healthcare records of 1.6 million patients that pass through three hospitals in North London, which fall under the care of the Royal Free Hospital Trust.

The complaint, seen by Computer Weekly, questions whether DeepMind will be expected to encrypt the patient data it receives when at rest.

“Whilst the information-sharing agreement insists that personally identifiable information – such as name, address, post code, NHS number, date of birth, telephone number, and email addresses, etc – must be encrypted whilst in transit to Google, it does not explicitly prohibit that data being unencrypted at the non-NHS location,” the complaint read.

«

First there’s a deal; then it turns out it’s not directly approved. The complaint is essentially that individuals at Google/Deepmind might access personal data. This is the essential battleground of the coming years: how compatible is tight data regulation with data mining?
link to this extract


Let’s talk about Amazon reviews: how we spot the fakes • The Wirecutter

Lauren Dragan:

»Amazon has a history of trying hard to deal with offenders and shut them down. In fact, in April, Amazon sued another round of companies that are accused of selling fraudulent reviews. But by the time those companies are caught, their clients have already made a bunch of sales, and the fraudulent reviewers will likely pop up again under new names to repeat the process.

(Want to know more? Wirecutter headphones editor Lauren Dragan talks to Marketplace Tech about compensated Amazon reviews and how to tell real crowdsourced opinions from astroturfing.)

You have a few ways to suss out what may be a fake review. The easiest way is to use Fakespot. This site allows you to paste the link to any Amazon product and receive a score regarding the likelihood of fake reviews.

For example, we ran an analysis on some headphones we found during a recent research sweep for our guide about cheap in-ear headphones. You can see from the results below that the headphones’ reviews didn’t score so well.

«

Hadn’t come across Fakespot before; it seems pretty useful.

link to this extract


The real cost of big tech’s accounting games • FT.com

Jonathan Ford:

»How much did LinkedIn make over the past three years? Sounds a simple enough question doesn’t it? But it is also one that is capable of being answered in multiple and very diverse ways.

First, let’s look at the figure the US online networking site wants you to focus on. That’s a mouthful called adjusted earnings before interest, tax, depreciation and amortisation (ebitda), and the total there between 2013 and 2015 came in at a positive $1.7bn.

Sounds pretty hunky dory? Well, now check out the operating profit line for the business — the one calculated according to the generally accepted accounting principles (GAAP) that companies must present but often don’t emphasise. Over the same period, LinkedIn racked up a $67m loss.

What explains the yawning $1.8bn difference between those two figures? It isn’t simply the depreciation and amortisation charges the company took against the value of its assets. Those, while pretty hefty, came to just $791m. No, the biggest single reason for the negative swing was the $1bn cost of the stock LinkedIn stuffed into its employees’ pay packets over those three years.

«

Why does it matter if the company gives stock to employees? As Ford explains, it’s because by doing that

»the firm denies itself the chance to sell those shares or options for value in the market. Failing to recognise that forgone cash effectively understates the cost the company has incurred in employing those individuals.

«

So stock grants are a cost. So they come off the bottom (operating) line. I’m constantly surprised by how many companies’ non-GAAP results are reported as if they were the ones to compare.
link to this extract


Google faces record-breaking fine for web search monopoly abuse • Sunday Telegraph

Christopher Williams:

»Google faces a record-breaking fine for monopoly abuse within weeks, as officials in Brussels put the finishing touches to a seven-year investigation of company’s dominant search engine.

It is understood that the European Commission is aiming to hit Google with a fine in the region of €3bn, a figure that would easily surpass its toughest anti-trust punishment to date, a €1.1bn fine levied on the microchip giant Intel.

Sources close to the situation said officials aimed to make an announcement before the summer break and could make their move as early as next month, although cautioned that Google’s bill for crushing competition online had not been finalised.

The maximum possible is around €6.6bn, or a tenth of Google’s total annual sales.

It will mark a watershed moment in Silicon Valley’s competition battle with Brussels. Google has already been formally charged with unlawfully promoting its own price comparison service in general search results while simultaneously relegating those of smaller rivals, denying them traffic.

«

I’m hearing the same about the timing and intention from my sources; the fine, meanwhile, is indeterminate.
link to this extract


This fitness app tracks you too much, consumer advocates claim • Fortune

David Meyer:

»According to the Norwegian Consumer Council, which has lodged a complaint with the country’s data protection authority, Runkeeper transmits data about its users all the time, not just when the app is in use.

The Norwegian data protection commissioner, Bjørn Erik Thon, confirmed to Fortune that his office has received the complaint and will now look into it.

“Everyone understands that Runkeeper tracks users while they exercise, but to continue to do so after the training session has ended is not okay,” said Finn Myrstad, the consumer council’s technical director.

The data in question includes timestamped location information, as well as Google advertising IDs that can be used to identify the individual.

“Our users’ privacy is of the utmost importance to us, and we take our obligation to comply with data protection laws very seriously,” Runkeeper CEO Jason Jacobs told Fortune. “We are in the process of reviewing the issues raised in the complaint, and we will cooperate with the Norwegian [data protection authority] if it has any questions arising out of the complaint.”

According to the council, Runkeeper’s terms and conditions do not explain how regularly data is transmitted, and users do not give consent to being monitored in this way. The council claims this breaches Norwegian and EU data protection laws.

«

Here’s Runkeeper’s privacy policy. It’s astonishingly vague (though in that respect, probably not so different from other privacy policies). What intrigues me is why the Runkeeper CEO didn’t just say “nah, we don’t collect data after your run.”
link to this extract


Five things you can get in India with a missed call • WSJ

Shefali Anand:

»Want to transfer funds from your account? Give your bank a missed call. Want to hear Bollywood music? Dial a number and hang up.

Making a missed call by calling a number and letting it ring is a popular way of communicating in India because the caller doesn’t have to spend money. Marketing companies, politicians, banks and others now use this practice to reach millions who have cellphones but limited means.

«

Brilliant. Recalls how, in the days when long-distance calls were expensive, kids on their travels would call the operator and ask to set up a reverse-charge call to their parents. Parent’s phone rings: “Alley Okey is calling from Wichita, Kansas. Will you accept the charge?” Parent: “No.” Conversation ends, with parent knowing that the kid is OK and presently in Wichita.
link to this extract


Chinese smartphone market has slowed, but Huawei, Oppo & Vivo have not • Counterpoint Technology

»According to the latest research from Counterpoint’s Market Monitor service, the demand for smartphones in China softened during Q1 2016 (Jan-Mar) as the smartphone shipments were down 2% annually and 13% sequentially.

Commenting on the results, Research Director, Neil Shah, said: “In spite of the Chinese holiday season quarter, the Chinese smartphone market demand reached a standstill. This has led to intense competition between the players as they struggle to take share away from each other. In a market with hundred of brands, growth is now limited to a handful of players with the greatest marketing budgets and headturning designs, and available at competitive price points.

“Only five brands registered healthy growth during the quarter. Oppo, Huawei and Vivo drove the majority of the volume, capturing a combined 40% of the total Chinese smartphone market. Demand for rest of the brands declined, especially Apple after the strong demand for iPhone 6 & 6 Plus in the quarter a year ago, and lacklustre performance from Lenovo, ZTE and Coolpad.”

The Chinese smartphone market saw a lull in the first two months of 2016, however sales for smartphones started to pick up in March, with the largest sales contribution from Huawei, Oppo and Vivo, the new leaders in Chinese domestic market.

«

Other notable points: 98% of phones sold were smartphones (hence Microsoft’s 90% year-on-year drop); the “premium” segment of RMB3000+ ($450+) makes up a fifth of the market, with Apple, Samsung and Vivo dominating.
link to this extract


HTML5 by default: Google’s plan to make Chrome’s Flash click-to-play • Ars Technica UK

Peter Bright:

»In a plan outlined last week, Flash will be disabled by default [in Google Chrome] in the fourth quarter of this year. Embedded Flash content will not run, and JavaScript attempts to detect the plugin will not find it. Whenever Chrome detects that a site is trying to use the plugin, it will ask the user if they want to enable it or not. It will also trap attempts to redirect users to Adobe’s Flash download page and similarly offer to enable the plugin.

«

Great!

»

There will be a few exceptions to this policy, with Google planning to leave Flash enabled by default on the top 10 domains that depend on the plugin. This list includes YouTube, Facebook, Twitch, and Amazon.

«

Crap.

»

Even this reprieve is temporary. The plan is to remove sites from the list whenever possible—Twitch, for example, is switching to HTML5 streaming, so should start to phase out its use of Flash—and after one year the whitelist will be removed entirely. This means that after the fourth quarter 2017, Flash will need to be explicitly enabled on every site that tries to use it.

«

“After the fourth quarter of 2017”, aka 2018. Flash, the desktop web’s malware zombie. (Notice that all those sites somehow muddle through on mobile, which is far bigger, without Flash.)
link to this extract


Errata, corrigenda and ai no corrida: none notified.

Start up: infected airplanes, Samsung gets VR-y, the real counterfeiters, Youtube’s unstoppable ads, and more


Facial recognition is being used for unsavoury purposes in Russia. (This is an example from Iran, at SXSW.) Photo by TheSeafarer on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 9 links for you. Suits you. I’m charlesarthur on Twitter. Observations and links welcome.

Europe’s web privacy rules: bad for Google, bad for everyone » NYTimes.com

Daphne Keller and Bruce Brown on the “right to be forgotten” [more correctly, “delisted from search”] laws in Europe, which now applies to google.com accessed inside Europe:

»News outlets should have particular cause for alarm about geo-blocking. Journalists rely on global networks to investigate and report on international stories, like the recent Panama Papers revelations. They themselves are often the first targets when governments seek to control the flow of information to their citizens. Protection exists in European Union privacy law for journalistic activities, so the news media is not directly in the cross hairs of the “right to be forgotten.” But American news organizations have faced libel actions in hostile foreign courts — and when plaintiffs start asking for geo-blocking in those cases, journalists will be on the front lines.

Privacy is a real issue, and shouldn’t be ignored in the Internet age. But applying those national laws to the Internet needs to be handled with more nuance and concern. These developments should not be driven only by privacy regulators. State departments, trade and justice ministries and telecom regulators in France and other European countries should be demanding a place at the table. So should free-expression advocates.

One day, international agreements may sort this all out. But we shouldn’t Balkanize the Internet in the meantime. Once we’ve erected barriers online, we might not be able to tear them down.

«

There’s a wonderful unspoken cultural imperialism about this approach: whatever the prevailing thought in the US is about [topic], well, that should be the approach to [topic] everywhere. Applying US laws to the internet is just as misguided as applying any other national laws. The Panama Papers is a complete red herring in this context.

You might wonder if Keller and Brown are unaware of their imperial approach. Keller, as it happens, used to be a lawyer at Google.
link to this extract


Uh-oh, Apple — Samsung has a bona fide ecosystem around virtual reality » Re/code

Ina Fried:

»For a long time, Samsung’s phones have gone head to head with the iPhone, but when it came to having an ecosystem of different devices, Apple was the hands-down winner.

Sure, Samsung had its own tablets and watches, but it was Apple that was able to build loyalty, convincing customers to make purchase after purchase.

With virtual reality, though, Samsung is off to the early lead. Alongside Sunday’s debut of the Galaxy S7 and S7 Edge at the Mobile World Congress 2016 in Barcelona, the company is announcing the Gear 360 — a consumer camera for capturing virtual-reality content. That completes the VR circle, with its Gear VR headset, already the most accessible way to consumer virtual-reality content outside of Google’s ultra-cheap cardboard viewer, which is more for getting a taste of VR than long-term consumption.

The Gear 360 isn’t due out until the second quarter — and Samsung won’t say how much the orb will cost — but it looks small, simple and powerful, at least at first glance.

«

VR is coming.
link to this extract


German nuclear plant infected with computer viruses, operator says » Reuters

Christoph Steitz and Eric Auchard:

»Mikko Hypponen, chief research officer for Finland-based F-Secure, said that infections of critical infrastructure were surprisingly common, but that they were generally not dangerous unless the plant had been targeted specifically.

The most common viruses spread without much awareness of where they are, he said.

As an example, Hypponen said he had recently spoken to a European aircraft maker that said it cleans the cockpits of its planes every week of malware designed for Android phones. The malware spread to the planes only because factory employees were charging their phones with the USB port in the cockpit.

Because the plane runs a different operating system, nothing would befall it. But it would pass the virus on to other devices that plugged into the charger.

«

Absolutely gobsmacking.
link to this extract


This city embedded traffic lights in the sidewalks so that smartphone users don’t have to look up » The Washington Post

Rick Noack:

»Few nations in the world take red traffic lights more seriously than Germany.

Foreign visitors frequently wonder why crowds of Germans wait for traffic lights to turn green when there are no cars in sight.

That is why officials in the city of Augsburg became concerned when they noticed a new phenomenon: Pedestrians were so busy looking at their smartphones that they were ignoring traffic lights.

The city has attempted to solve that problem by installing new traffic lights embedded in the pavement — so that pedestrians constantly looking down at their phones won’t miss them.

«

(The headline pretty much covers the whole of the story, but there you go.) Cities being redesigned for our devices.
link to this extract


Fantastic fakes: busting a $70m counterfeiting ring » Bloomberg BusinessWeek

Del Quentin Wilber:

»By the time Gaab began his investigation in 2012, the Secret Service had linked at least 10 different versions to the same family of fake $50s and $100s. The margins were impressive. The agency estimated that the counterfeiter sold his initial run to his U.S. distributors for 10 percent of their face value. The distributors then dealt their haul to middlemen for 25¢ to 35¢ on the dollar. By the time they reached the person passing the bills at Walmart or Target, a bogus $100 note was being sold for as much as $65.

«

Another great read from Bloomberg’s team. Bloomberg BW is a print magazine.
link to this extract


Facial recognition service becomes a weapon against Russian porn actresses » Global Voices Advocacy

Kevin Rothrock:

»From the start, FindFace has raised privacy concerns. (Even in his glowing recommendation, [software engineer Andrei] Mima addressed fears that the service further erodes people’s freedoms in the age of the Internet.) In early April, a young artist named Egor Tsvetkov highlighted how invasive the technology can be, photographing random passengers on the St. Petersburg subway and matching the pictures to the individuals’ Vkontakte pages, using FindFace. “In theory,” Tsvetkov told RuNet Echo, this service could be used by a serial killer or a collector trying to hunt down a debtor.”

Hoping to raise concerns about the potential misuses of FindFace, Tsvetkov seems to have inspired a particularly nasty effort to identify and harass Russian women who appear in pornography. On April 9, three days after the media reported on Tsvetkov’s art project, users of the Russian imageboard “Dvach” (2chan) launched a campaign to deanonymize actresses who appear in pornography. After identifying these women with FindFace, Dvach users shared archived copies of their Vkontakte pages, and spammed the women’s families and friends with messages informing them about the discovery.

«

Oh, Russia. But this is how facial recognition systems will be used; this genie just announced its out-of-bottleness.
link to this extract


New ad format will bring unskippable 6-second ads to YouTube » AndroidAuthority

John Dye:

»Nobody likes ads, but they’re kind of the cost of doing business in a world where we’ve grown accustomed to getting our content for free. Although YouTube has long had ads before videos, Google is pushing out a new ad format called “Bumpers,” which are unskippable 6-second shorts placed in front of videos.

In the Adwords blogpost that announced the format, Product Manager Zach Lupei compares these Bumper ads to video haikus. Current ads placed before videos are often full-length ads that can be skipped after a few seconds. However, these ads have a hard cap of six seconds, making them more like Vine videos than traditional ads. Marketers will have to get pretty clever to squeeze meaningful, worthwhile content into that narrow window of time, so we might actually be getting some creative and hilarious little shorts out of this.

«

“Creative and hilarious”. And unskippable. (Also, I abhor the “hey, I just happened to be passing a keyboard and I kinda wrote this blogpost of no consequence except it fills our ad quota” style of writing.)
link to this extract


Worldwide smartphone growth goes flat in the first quarter as Chinese vendors churn the top 5 vendor list » IDC

»Vendors shipped a total of 334.9m smartphones worldwide in the first quarter of 2016 (1Q16), up slightly from the 334.3m units in 1Q15, marking the smallest year-over-year growth on record. The minimal growth this quarter is primarily attributed to strong smartphone saturation in developed markets, as well as a year-over-year decline from both Apple and Samsung, the two market leaders.

The biggest change to the market, however, was the addition of lesser-known Chinese brands OPPO and vivo, which pushed out previous fourth and fifth place players Lenovo and Xiaomi, respectively. As the China market matures, the appetite for smartphones has slowed dramatically as the explosion of uptake has passed its peak. In 2013, China’s year-over-year shipment growth was 62.5%; by 2015, it had dropped to 2.5%. Conversely, the average selling price (ASP) for a smartphone in China rose from US$207 in 2013 to US$257 in 2015.

“Along China’s maturing smartphone adoption curve, the companies most aligned with growth are those with products serving increasingly sophisticated consumers. Lenovo benefited with ASPs below US$150 in 2013, and Xiaomi picked up the mantle with ASPs below US$200 in 2014 and 2015. Now Huawei, OPPO, and vivo, which play mainly in the sub-US$250 range, are positioned for a strong 2016,” said Melissa Chau, senior research manager with IDC’s Worldwide Quarterly Mobile Phone Tracker. “These new vendors would be well-advised not to rest on their laurels though, as this dynamic smartphone landscape has shown to even cult brands like Xiaomi that customer loyalty is difficult to consistently maintain.”

«

Unless you’re quite into the phone business, you’ve probably never heard of OPPO or vivo before. The erosion of ASP is dramatic too. Which of course is a problem for Apple – even if it’s rising in China. Is there new growth left in the business?
link to this extract


Apple Music on course to top 20m subs this year as it flies past 13m » Music Business Worldwide

Rhian Jones:

»Apple Music has gained 2 million subscribers since February, surpassing 13 million this month, according to the company.

The latest figures put the Spotify rival on course to top 20m by the end of this year if it continues on its current impressive trajectory – adding a million subscribers per month.

The news was revealed in Apple’s latest earnings report covering its Q2 2016, released yesterday.

Apple Music gained a million subscribers in both January and February this year. Since first arriving on June 30 last year, Apple Music has launched in 113 countries. It’s now available in 58 markets in which Spotify is not – including Russia, China, India and Japan.

Last we heard, from SVP Eddy Cue, the platform’s subscribers went above 11m two months ago.

Apple CEO Tim Cook said in an earnings call yesterday: “Apple Music continues to grow in popularity, with over 13 million paying subscribers today.

“We feel really great about the early success of Apple’s first subscription business, and our music revenue has now hit an inflection point after many quarters of decline.”

«

Many quarters of what’s that now again? I don’t recall Apple mentioning music revenue declines before.
link to this extract


Errata, corrigenda and ai no corrida:

Start up: Trump’s casino flop, Micromax hits a bump, Samsung’s warning, the prime conspiracy and more

Google’s Deepmind systems are used to recognise handwriting in images. Photo by invisible monsters on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Here’s how Donald Trump treats the little people » Mother Jones

Kevin Drum on the publicly listed Trump casino-controlling company in the 1990s:

»Trump’s fans were conned into buying up his debt-laden properties and turning them into a public company. Trump, who plainly had no interest in running a casino and had demonstrated no corporate management skills during the prior decade, paid himself millions of dollars from the company’s coffers for doing essentially nothing. He then unloaded his third casino onto the public company at an inflated price.

The public company didn’t show a profit during a single year of its existence. In 2004 the stock was delisted and the company forced into Chapter 11 reorganization. It was renamed Trump Entertainment Resorts, but with Trump still at the helm it continued to pile up losses and amassed debts of nearly $2bn. In 2008, after missing a $53m bond payment, it declared bankruptcy yet again and Trump resigned as the company’s chairman. Its investors lost all their money.

In case you’re curious, this is how Trump treats the little people.

«

Just so you can’t say you weren’t warned. Would a President Trump be as corrupt as Berlusconi? Odds seem strong.
link to this extract

 


Google DeepMind: What is it, how it works and should you be scared? » Techworld

Sam Shead interview with Mustafa Suleyman, co-founder of Deepmind, who explains where the systems are used inside Google:

»We use it to identify text on shopfronts and maybe alert people to a discount that’s available in a particular shop or what the menu says in a given restaurant. We do that with an extremely high level of accuracy today. It’s being used in Local Search and elsewhere across the company.

We also use the same core system across Google for speech recognition. It trains roughly in less than 5 days. In 2012 it delivered a 30 percent reduction in error rate against the existing old school system. This was the biggest single improvement in speech recognition in 20 years, again using the same very general deep learning system across all of these.

Across Google we use what we call Tool AI or Deep Learning Networks for fraud detection, spam detection, hand writing recognition, image search, speech recognition, Street View detection, translation.

Sixty handcrafted rule-based systems have now been replaced with deep learning based networks. This gives you a sense of the kind of generality, flexibility and adaptiveness of the kind of advances that have been made across the field and why Google was interested in DeepMind.

«

link to this extract

 


Letter to shareholders » Samsung Investor Relations

Oh-Hyun Kwon, CEO of Samsung Electronics:

»In 2016, the overall global economy may slow down, and uncertainties such as financial risks in emerging markets are expected to increase. The IT industry will change in an unprecedented speed, and competitions will intensify further.

We expect core products of our company, such as smartphone, TV, and memory, will face oversupply issues and intensified price competition. Our competitors will follow close behind our leading position in the global IT industry with aggressive investments and innovations. Moreover, innovative business models such as O2O (Online to Offline) and sharing economy are undermining the importance of hardware, which is our strength, and shifting the core competitiveness to software platform.

To cope with these changes in the business environment, we will continue to implement groundbreaking changes and innovations, and strive to secure differentiated competitiveness.

«

“Oversupply issues” probably doesn’t apply to the smartphones, but the price competition will. And there’s no explanation of how it’s going to cope exactly with that shift to software-based competition.
link to this extract

 


Privacy absolutism » AVC

Venture capitalist Fred Wilson:

»I do not think that because we now have the technology to lock things down (strong encryption) and because the industry that develops and maintains all of this technology has a strong libertarian bent that we should just abandon the framework that has worked in our society for hundreds of years. If society thinks someone is doing something wrong, and if law enforcement can get a warrant, there should be a mechanism to get access to our devices.

I would love to see the tech sector work to figure out a smart way to address this issue. My partner Albert has suggested an approach on his blog. There are some interesting approaches that are already being used in cold storage of bitcoin that could be applied to this situation.

But my meta point here is that I am saddened by the tech sector’s absolutist approach to this issue. The more interesting and fruitful approach would be to think about the most elegant solutions and build them.

«

The linked suggestion by his partner is this:

»I would posit that each device should ship with an *individual* key that is created by the manufacturer specifically for the purpose of unlocking the device. The key should then be stored in a way where it can be requested by law enforcement (either by the manufacturer or a third party that specializes in compliance for this). The process for such a request should run via the judiciary and mirror that for a warrant.

«

It’s also known as “key escrow” and was part of the “Clipper chip” idea which was proposed by the Clinton administration in the 1990s and comprehensively shown to be a bad idea by Matt Blaze (who is still around, on Twitter and elsewhere).

Wilson is the one who was previously stunned by Apple not making iMessage cross-platform, despite the fact that it is demonstrably valuable as an iOS exclusive. I’m approaching the point where I learn what Wilson’s view is on something, and then assume the opposite is what will happen.
link to this extract

 


Microsoft stops taking Bitcoin for Microsoft Store payments » Digital Trends

Trevor Mogg:

»Much was made of Microsoft’s move two years ago to start accepting Bitcoin as a form of payment for purchasing content from its online store.

The situation has, however, quietly changed, as the computer giant has recently added a note to its website revealing it’s no longer accepting the cryptocurrency in the Microsoft Store on Windows 10 devices.

“You can no longer redeem Bitcoin into your Microsoft account,” the message says, though adds that existing balances in user accounts “will still be available for purchases from Microsoft Store, but can’t be refunded.” So to be clear, any funds in your account now are good to use, but forget trying to make any new deposits into your account using Bitcoin.

«

Microsoft accepted Bitcoin? For Windows apps? Doubt that troubled the blockchain very much.
link to this extract

 


India’s Micromax, once a rising star, struggles » Reuters

Himank Sharma:

»A year ago, Micromax vaulted past Samsung Electronics Co Ltd to become India’s leading smartphone brand. Today, its market share has nearly halved, several top executives have resigned, and the company is looking for growth outside India.

In Micromax’s slide to second place is a tale of the promise and peril of India’s booming but hyper-competitive smartphone industry.

India is the world’s fastest-growing smartphone market. Shipments of smartphones jumped 29% to 103m units last year.

Rapid growth has helped nurture a crop of local brands, led by Micromax, that outsourced production to Chinese manufacturers. Now, as Samsung rolls out more affordable phones, the same Chinese factories are entering the Indian market with their own brands, depressing prices and forcing Indian mobile makers to rethink their strategies.

“What the Indian brands did to the global brands two years ago, Chinese phone makers are doing the same to Indian brands now, and over the next year we see tremendous competition for Micromax and other Indian smartphone makers,” said Tarun Pathak, analyst at Counterpoint Research in New Delhi…

…Last May, Alibaba walked away from a mooted $1.2bn purchase of a 20% stake, citing a lack of clarity on growth plans, according to one executive involved in the discussion. Micromax co-founder Vikas Jain said in an interview with Reuters this week that the company and Alibaba disagreed on a future roadmap.

«

The smartphone business’s evolution has been like the PC business’s evolution speeded up; India’s is like the smartphone one, speeded up again.
link to this extract

 


Here’s what a knockoff Apple Watch looks like » Daily Dot

Mike Wehner, way back in April 2015:

»The story of how I came to own this forgery isn’t particularly remarkable: In early March, just as the hype around Apple’s new wearable was reaching a fever pitch, I found a Taiwanese seller who claimed to be selling the Apple Watch for immediate shipment. There was no size option or “collection” to choose from, just four colors, so I selected one and placed an order. It cost me the equivalent of roughly $53, and while I knew the watch that eventually arrived wouldn’t be anything impressive, I was nonetheless curious about just how bad it would be. Now I know.

«

Pretty dire. Wonder if they’re any better now?
link to this extract

 


Music piracy hasn’t gone, it has merely changed its spots » MIDiA Research

Mark Mulligan:

»P2P piracy was tailor made for the 2000’s when:

• Home internet connections were slow
• Most content consumption was desk top based
• People still liked owning music

Now in the streaming era all three of those market dynamics have lessened massively. So little wonder then that piracy technology has evolved to meet the needs of the streaming consumer.

With YouTube the number one digital music destination, and with a catalogue that no other music service will ever be able to match, it makes complete sense that YouTube rippers have emerged as one of the key strands of music piracy tech. Many of which transform YouTube into a fully offline, on demand, ad free, high quality music service.

«

And that’s why the music labels tend to hate YouTube.
link to this extract

 


GMG’s David Pemsel: Membership will make up a third of the Guardian’s revenue within three years » The Media Briefing

Chris Sutcliffe:

»The Guardian has not been agile enough to respond to the challenges faced by the publishing industry over the past few years, according to Guardian Media Group CEO David Pemsel.

Speaking at Digital Media Strategies 2016, Pemsel said that an overly narrow focus on the “big number” of its global audience masked some of the strategic issues that the Guardian was facing:

»

“I think all those big numbers are a proof point about how fast and innovative we’ve been in getting to digital [but] monetising anonymous reach is essentially over.

“To be able to parade around and say ‘we’re big’ is not good enough. We want to convert our anonymous reach into a known audience.”

«

That conversion of its unknown audience to a known one is a “massive opportunity”, based around a refinement and reinvention of The Guardian’s membership scheme, which Pemsel believes could make up one third of the Guardian’s overall revenue within three years.

«

The point about “monetising anonymous reach is essentially over” is a key one. Pemsel is saying that online advertising in itself isn’t enough to fund the Guardian – which ought to worry everyone else.
link to this extract

 


Mathematicians discover prime conspiracy » Quanta Magazine

Erica Klarreich:

»Two mathematicians have uncovered a simple, previously unnoticed property of prime numbers — those numbers that are divisible only by 1 and themselves. Prime numbers, it seems, have decided preferences about the final digits of the primes that immediately follow them.

Among the first billion prime numbers, for instance, a prime ending in 9 is almost 65 percent more likely to be followed by a prime ending in 1 than another prime ending in 9. In a paper posted online on Sunday, Kannan Soundararajan and Robert Lemke Oliver of Stanford University present both numerical and theoretical evidence that prime numbers repel other would-be primes that end in the same digit, and have varied predilections for being followed by primes ending in the other possible final digits.

“We’ve been studying primes for a long time, and no one spotted this before,” said Andrew Granville, a number theorist at the University of Montreal and University College London. “It’s crazy.”

«

My first objection on reading those paragraphs was “they should do it in a different number base than decimal”. Then it turns out that they started in a different number base (3) and worked out from there. So yes, this is a spooky property.
link to this extract

 


Errata, corrigenda and ai no corrida:

Start up: VR porn!, privacy and the FBI, Baidu’s data grab, why Trump?, and more

A Nissan Leaf charging. But you’d know that if you were to plug its VIN into a public API. Photo by Janitors on Flickr.

Don’t be late! Sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs » Troy Hunt

Someone in one of Hunt’s classes discovered how to find out the battery status of Nissan’s popular electric car – and also turn its air conditioning on or off. For any LEAF. Without authorisation. Via API. From anywhere. And Nissan didn’t listen, and four different groups have discovered it independently:

»Nissan need to fix this. It’s a different class of vulnerability to the Charlie Miller and Chris Valasek Jeep hacking shenanigans of last year, but in both good and bad ways. Good in that it doesn’t impact the driving controls of the vehicle, yet bad in that the ease of gaining access to vehicle controls in this fashion doesn’t get much easier – it’s profoundly trivial. As car manufacturers rush towards joining in on the “internet of things” craze, security cannot be an afterthought nor something we’re told they take seriously after realising that they didn’t take it seriously enough in the first place. Imagine getting it as wrong as Nissan has for something like Volvo’s “digital key” initiative where you unlock your car with your phone.

By pure coincidence, this week Nissan unveiled a revised LEAF at the GSMA Mobile World Congress. Clearly, like many car makers, their future involves a strong push for greater connectivity in their vehicles:

»

In a fully connected, fully mobile world, in-vehicle connectivity is an absolute must for today’s drivers.

«

«

Perhaps not an “absolute must”, actually.
link to this extract

 


I got hacked mid-air while writing an Apple-FBI story » USAToday

Steven Petrow works for USA Today, and was writing and sending emails via Gogo Wi-Fi on a flight to Raleigh, Virginia. On touchdown, the guy in the seat behind him explained that he had hacked him, and “most people on the flight”:

»“That’s how I know you’re interested in the Apple story,” he continued. “Imagine if you had been doing a financial transaction. What if you were making a date to see a whore?” My mind raced: What about my health records? My legal documents? My Facebook messages?

And then the kicker:

“That’s why this story is so important to everyone,” he told me. “It’s about everyone’s privacy.”

Then he headed down the escalator and I headed out the front door. I may have been wearing my jacket, but I felt as exposed as if I’d been stark naked…

…[He then called Alex Abdo, a civil rights lawyer]: who is in actual danger here? The answer, apparently, is pretty much all of us. “Anyone who relies on the security of their devices,” Abdo told me.

It should be up to each of us to decide what to make public, and what to keep private, he continued. For me, I felt as though the stranger on the plane had robbed me of my privacy — as was explicitly his intent. He took the decision of what to share out of my hands. He went in through the back door of the GoGo connection.

«

link to this extract

 


Microsoft has acquired Xamarin » Petri

Brad Sams:

»Xamarin is one of the leading platforms for mobile app development and provides a robust platform that helps developers build mobile apps using C# and deliver fully native mobile app experiences to all major devices, including iOS, Android, and Windows. Seeing as Microsoft is a productivity focused company whose Visual Studio product is used by millions around the globe, this acquisition will fit nicely into their portfolio of products.

With more than 15,000 customers in 120 countries, of which 100 are Fortune 500 firms, Xamarin has become a leader in this space. Companies like Alaska Airlines, Coca-Cola Bottling, Thermo Fisher, Honeywell and JetBlue all use the software to develop their apps.

«

Apparently MSDN devs want to know if they’ll get it for free.
link to this extract

 


Solid support for Apple in iPhone encryption fight: poll » Reuters

Jim Finkle:

»Nearly half of Americans support Apple Inc’s (AAPL.O) decision to oppose a federal court order demanding that it unlock a smartphone used by San Bernardino shooter Rizwan Farook, according to a national online Reuters/Ipsos poll.

Forty-six percent of respondents said they agreed with Apple’s position, 35 percent said they disagreed and 20 percent said they did not know, according to poll results released on Wednesday.

Other questions in the poll showed that a majority of Americans do not want the government to have access to their phone and Internet communications, even if it is done in the name of stopping terror attacks.

«

Wait, I thought half supported the FBI? Oh god I’m so confused. As are the people being asked subtly different questions about the same topic.
link to this extract

 


Apple-FBI fight asks: is code protected as free speech? » Bloomberg Business

Adam Satriano:

»There’s some precedent for arguing that code is protected legal speech. In the 1990s, a graduate student at the University of California at Berkeley wrote an encryption program for his own research that he wanted to make public. Under federal regulations, a coder must get a license to publish cryptography tools, and the government denied the student’s license. In 1999, the U.S. Court of Appeals in San Francisco ruled for the first time that source code was protected as speech, and the student, Dan Bernstein, who is now an instructor at the University of Illinois at Chicago, was allowed to share the code freely.

The case, Bernstein v. U.S. Department of Justice, has been highlighted by those who favor less regulation of the Internet. But judges have also ruled that free speech protections don’t apply to code. Courts have been especially skeptical in cases involving piracy of music and movies.
The law “is murky in this area,” said Michael Froomkin, a law professor at the University of Miami — and that’s why Apple’s case could break new ground.

«

link to this extract

 


I tried VR porn, and I liked it » Ars Technica UK

Sebastian Anthony:

»You will probably be unsurprised to hear that VR porn is awesome. It’s like porn, but better. The porn I was sampling—made by Naughty America—was essentially a standard first-person-perspective film, but with the ability to look around. Unlike some VR experiences that are just two-dimensional 360-degree panoramas, Naughty America’s porn is stereoscopic; stuff actually sticks out, or comes flying at you. You really do want to reach out and touch things.

I watched three different scenes as I sat there in the cafe. In all three of them, “I” (a male actor) was reclining on some kind of sofa, looking down at my muscular physique and giant appendage. In some scenes, other people did things to me—in other scenes, I was much more proactive.

To be honest, it was a bit weird, looking down and seeing someone else’s body. But, after a few minutes of watching, I began to feel a sense of agency; I began to feel that yes, those rippling muscles were mine; I began to feel that it was me being tended to by two other beautiful people.

And of course, just as I was starting to get into it, the demo ended and I found myself back in the real world, being grinned at by a couple of guys from Naughty America. “Pretty cool, eh?”

All I can do is nod. Why did the demo have to end so soon?

Right now Naughty America’s films only allow have a 180-degree field of view, primarily because a standard porn scene doesn’t require anything greater, but also because it’s technologically quite challenging as well. Different varieties of porn—orgies and the like—would require a 360-degree field of view, but it doesn’t seem that Naughty America is working on that just yet.

When I asked Ian Paul, the company’s CIO, about how they actually film the VR scenes, he refused to tell me anything. “I can’t give away anything right now.” Basically, according to Paul, it’s quite hard to shoot a 3D VR film from an actor’s perspective, and lots of porn studios are currently trying to find the optimal setup.

«

You think kids playing video games is a problem now? Wait until this stuff becomes easily available.
link to this extract

 


Trump shatters the Republican Party » Politico

Shane Goldmacher:

»While Cruz has tried to tap into frustrated voters via ideology, Rubio has been far more reticent to amplify the angriest voices, saying repeatedly, “It is not enough to simply nominate someone who is angry.”

In South Carolina last week, when a voter shouted out that Hillary Clinton was a “traitor,” Rubio interjected gently, “I wouldn’t go that far, sir.” And last month, in Iowa, when another voter worried about Islamic sharia law coming to America, Rubio rebutted, “Guys, that’s not going to happen.”

While Rubio dances around the electorate’s resentments, Trump revels in them. On primary night in South Carolina, he tapped into their nationalism as he whacked at Mexico and China. “They’ve taken out jobs, they’ve taken our money, they’ve taken our everything,” he declared.

The crowd cheered wildly. “I showed anger and the people of our country are very angry!” Trump later tweeted about his South Carolina victory.

Perkins, the evangelical leader, described the Trump phenomenon’s lack of ideology this way: “You can’t be fearful and thoughtful at the same time.”

«

I remain fascinated by Trump’s rise (from the relatively safe distance of a few thousand miles of ocean). What I don’t know, and nobody seems to be saying much, is: how does Trump play with the broader electorate? If it’s Trump v Clinton (as seems likely), how does that play out?
link to this extract

 


Huawei Watch: Android Wear burn-in prevention 4K lapse [N5X] » YouTube

»

Quick 4K time lapse of Android Wear burn in prevention on the Huawei Watch. Captured with Framelapse Pro using a Nexus 5X.

«

That moves around quite a bit. Which prompts the thought – how long will always-on screens survive before they’re burnt out? Something to consider with wearables.
link to this extract

 


Announcing Spotify Infrastructure’s Googley future » News

Nicholas Harteau:

»in a business growing quickly in users, markets and features, keeping pace with scaling demands requires ever increasing amounts of focus and effort. Like good, lazy engineers, we occasionally asked ourselves: do we really need to do all this stuff?

For a long time the answer was “yes.” Operating our own data-centers may be a pain, but the core cloud services were not at a level of quality, performance and cost that would make cloud a significantly better option for Spotify in the long run. As they say: better the devil you know…

Recently that balance has shifted. The storage, compute and network services available from cloud providers are as high quality, high performance and low cost as what the traditional approach provides. This makes the move to the cloud a no-brainer for us. Google, in our experience, has an edge here, but it’s a competitive space and we expect the big players to be battling it out for the foreseeable future.

«

Lots of people are interpreting this as the first step to Spotify’s entirely Googley (ie Google-owned) future, and it’s hard not to see this that way.
link to this extract

 


Thousands of apps running Baidu code collect, leak personal data: research » Reuters

Jeremy Wagstaff and Paul Carsten:

»Thousands of apps running code built by Chinese Internet giant Baidu have collected and transmitted users’ personal information to the company, much of it easily intercepted, researchers say.

The apps have been downloaded hundreds of millions of times.

The researchers at Canada-based Citizen Lab said they found the problems in an Android software development kit developed by Baidu. These affected Baidu’s mobile browser and apps developed by Baidu and other firms using the same kit. Baidu’s Windows browser was also affected, they said.

The same researchers last year highlighted similar problems with unsecured personal data in Alibaba’s UC Browser, another mobile browser widely used in the world’s biggest Internet market.

Alibaba fixed those vulnerabilities, and Baidu told Reuters it would be fixing the encryption holes in its kits, but would still collect data for commercial use, some of which it said it shares with third parties. Baidu said it “only provides what data is lawfully requested by duly constituted law enforcement agencies.”…

…”It’s either shoddy design or it’s surveillance by design,” said Citizen Lab director Ron Deibert.

«

Tricky choice.
link to this extract

 


Errata, corrigenda and ai no corrida: yesterday’s web page headline briefly said that it was Acer’s routers, not Asus’s, which had been found to be full of holes by the FTC. This was wrong.

Start up: Google adds ads, HTC nears Vive, Watch wrinkles and worries, FBI v Apple redux, and more

It’s the Samsung Galaxy S7! Looks completely unlike previous ones, right? Photo by Janitors on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 13 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Four ads on top: the wait is over » Moz

Peter Meyers:

»For the past couple of months, Google has been testing SERPs with 4 ads at the top of the page (previously, the top ad block had 1-3 ads), leading to a ton of speculation in the PPC community. Across the MozCast data set, 4 ads accounted for only about 1% of SERPs with top ads (which matches testing protocol, historically). Then, as of yesterday, this happened:

Over the past 2 weeks, we’ve seen a gradual increase, but on the morning of February 18, the percentage of top ads blocks displaying 4 ads jumped to 18.9% (it’s 19.3% as of this morning). Of the 5,986 page-1 SERPs in our tracking data that displayed top ads this morning, here’s how the ad count currently breaks down:

As you can see, 4-ad blocks have overtaken 2-ad blocks and now account for almost one-fifth of all top ad blocks. Keep in mind that this situation is highly dynamic and will continue to change over time. At the 19% level, though, it’s unlikely that this is still in testing.

«

Google came up in a time when search engine results pages (SERPs) were stuffed with paid-for ads. Google’s clean results page was different. Now the other search engines have gone away. And SERPs are becoming stuffed with ads again.
link to this extract

 


Phone makers look to add-on gizmos to revitalize market » Reuters

Meanwhile, there’s that event called Mobile World Congress going on in Barcelona this week. Paul Sandle notes the pressures on “traditional” handset makers:

»while the competition [among handset makers] intensifies true innovation has not, with the Barcelona show expected to feature instead other products that connect to phones, like all-round cameras capable of producing immersive views, new wearable devices and electronic gadgets for the home or workplace that use smartphones as a processing hub.

As usual Apple will be absent, preferring to run its own events for new product launches.

“We will see a lot of stuff around 360-degree cameras and virtual reality headsets with a smartphone,” said Francisco Jeronimo, an analyst with research firm IDC. “Commodities rather than innovation”, said Forester analyst Thomas Huston.

“I don’t expect true innovation, it’s going to be more about the specifications, the better processing power, the battery life,” he said.

“What’s the benefit for consumers? I think it will be very limited.”

«

link to this extract

 


Samsung Galaxy S7 and S7 Edge: curvier, faster, micro SD expansion — available March 11 » Ars Technica UK

Mark Walton:

»In a surprise move, those that pre-order in the UK and US will receive a free Galaxy Gear VR headset to go along with their shiny new phone.

At first glance—besides their larger screen sizes—both phones look largely identical to their predecessors, the S7 sporting a flat glass front, and the S7 Edge sporting a curved display that gently folds in at the edges to the meet the aluminium body. Both phones will be available in Black Onyx and Gold Platinum, with the S7 Edge also available in Silver Titanium. Unfortunately for fans of 4K, both the S7 and S7 Edge are rocking 2560×1440 pixel displays. The most noticeable design change comes to the rear of the phone, where the dreaded camera bump has been removed to to make the camera module flush with the body. Surprisingly, this hasn’t affected the thickness of the phones, which remain fairly svelte at 7.9mm for the S7 and 7.7mm for the S7 Edge. The regular S7 also gains a curved back like the Galaxy Note 5.

Perhaps more exciting is that the S7 and S7 Edge both feature a microSD card slot, a much requested feature that was removed from the S6. Both phones will ship with Android 6.0 Marshmallow, which allows users to merge the SD card with the internal flash memory to create one large seamless pool of storage, making the SD card slot a welcome addition. Also back is water and dust resistance, which was previously found in the Galaxy S5 but was skipped over for the S6. The Galaxy S7 and S7 Edge are both rated IP68, which equates to “totally dust tight” and prolonged submersion in water (the S5 was IP67, which is only “temporary immersion”).

There’s nothing too surprising happening on the inside, aside from the bump up to 4GB of RAM.

«

Don’t think this will make the slightest difference to the general arc of smartphone sales. I doubt these will sell better than either the S5 or S6 or S6 Edge. Water/dust resistance didn’t help the S5; and the Edge feature didn’t change anything much in sales terms.
link to this extract

 


The consumer version of HTC’s Vive VR headset will arrive in April for $799 with two free games » Android Police

Michael Crider:

»The headset is nearing completion, and the company has announced that the final consumer model will ship in early April for the disappointing price of $799. For that price you get two motion-sensing controllers, two room scale sensors, and VR games Job Simulator: The 2050 Archives and Fantastic Contraption. Pre-orders begin next week on February 29th.

Unlike Google Cardboard, Samsung’s Gear VR, and other systems that rely on a smartphone as a slide-in display, the Vive is a fully contained unit with screens, optical lenses, sensors, a camera and microphone, and other electronics built into the device itself. Like the Oculus, it needs a standard PC (and a quite powerful one) to send video and process images for gaming and other applications. Early reports of the Vive have praised it as an impressive experience, particularly with games that have been developed specifically for the platform. However, the Vive will also be able to connect to at least some smartphones via Bluetooth for answering phone calls and viewing notifications, perhaps allowing HTC some synergy with its phone lines.

«

“The headset is nearing completion”? I’m hoping that’s just a loose version of “it’s nearly public”. If it isn’t complete yet, they’ve got some problems. (As for “synergy” – dream on.)
link to this extract

 


Watch apps worth making » David Smith

Smith has shipped 11 Watch apps over the past year:

»There seem to be only three kinds of apps that make sense given the current hardware and software on the Apple Watch.

1: Notifications — Not really an “app” in the traditional sense but getting real-time alerts of things that are important to me is great. Any iOS app that sends notifications should do the basic work to make sure they look and perform well on the Apple Watch.

2: Complications — Showing timely information at the raise of the wrist. These are probably the most practically useful apps on my watch. I typically have my watch show me the current temperature, my current step count, and battery percent. All of which present me with timely information that is useful to know now.

3: Sensors — The last kind of app that has actually stuck for me on the Apple Watch are apps that make use of the sensors on the watch. These apps are essentially impossible to re-create on an iPhone. The Apple Watch includes a heart rate monitor, accelerometer and microphone. I don’t think the range and variety of uses for these has been fully explored yet. Having these sensors persistently attached to your body is very different than any use you might come up with on an iPhone.

«

Completely agree. More sensors would be really useful (even sensors relaying stuff from the phone, as the weather is).

link to this extract

 


Exclusive: common mobile software could have opened San Bernardino shooter’s iPhone » Reuters

Jim Finkle:

»The legal showdown over U.S. demands that Apple Inc AAPL.O unlock an iPhone used by San Bernardino shooter Rizwan Farook might have been avoided if his employer, which owns the device, had equipped it with special mobile phone software it issues to many workers.

San Bernardino County, which employed Farook as an environmental health inspector, requires some, but not all, of its workers to install mobile-device management software made by Silicon Valley-based MobileIron Inc MOBL.O on government-issued phones, according to county spokesman David Wert.

That software is designed to secure corporate data. It also allows information technology departments to remotely unlock phones, even without assistance of the phone’s users or access to the password needed to open the phone and unscramble the data.

“If that particular iPhone was using MobileIron, the county’s IT department could unlock it,” MobileIron Vice President Ojas Rege told Reuters.

«

So there was huge confusion around this phone. Understandable: there’s a mass shooting, the fugitives escape surveillance, a phone is found. Perhaps it is bagged as evidence and its battery runs down, which means it can’t be forced to make an iCloud backup even on trusted Wi-Fi, and that you can’t ask Siri for details about phone calls. Then they reset the password (at the FBI’s request), which made things even worse.

A mess from start to finish – but given that Farook destroyed two other phones, how likely is it that this phone was used to communicate with anyone relevant? Answer: it’s extremely unlikely.
link to this extract

 


Reconciling perspectives: new report reframes encryption debate » Berkman Center

»The Berklett Cybersecurity Project of the Berkman Center for Internet & Society at Harvard University is pleased to announce the publication of a new report entitled “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” The report examines the high-profile debate around government access to encryption, and offers a new perspective gleaned from the discussion, debate, and analyses of an exceptional and diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community.

“Many conversations on sensitive subjects of technology and security are productive because they’re among people who already agree,” said Prof. Jonathan Zittrain, faculty chair of the Berkman Center. “The aim of this project is to bring together people who come from very different starting points and roles, and who very rarely have a chance to speak frankly with one another. We want to come away with some common insights that could help push the discussion into some new territory.”

The report takes issue with the usual framing of the encryption debate and offers context and insights that widen the scope of the conversation to more accurately reflect the surveillance landscape both now and in the future.

«

Thanks Seth Finkelstein for the link.
link to this extract

 


Apple is selling you a phone, not civil liberties » Lawfare

Susan Hennessey and Benjamin Wittes:

»First, the Going Dark skeptics [who say that it’s OK for phones to be encrypted beyond the capability of companies or law enforcement to decrypt them] demand, show us the cases in which the absence of extraordinary law enforcement access to encrypted data is actually posing a problem. And this demand seemed quite reasonable, in our view. If the FBI wants to take the position that it has a problem, it has to do more than cry wolf. Show us the wolf.

And in the last couple of weeks, the bureau has shown some serious wolf. Consider this excerpt from Director James Comey’s testimony before Congress last week: “A woman was murdered in Louisiana last summer, eight months pregnant, killed, no clue as to who did it, except her phone is there when she’s found killed. They couldn’t open it, still can’t open it. So the case remains unsolved.” (The discussion is available here starting at 31:00.)

Then came the filing in the San Bernardino case this week. Note that this is a case that has a potentially serious ISIS link. The FBI has been sitting on one of the shooter’s phones for more than two months, unable to open it. It wants Apple’s help to determine “who [the shooters] may have communicated with to plan and carry out the IRC shootings, where Farook and Malik may have traveled to and from before and after the incident, and other pertinent information that would provide more information about their and others’ involvement in the deadline shooting.”

This is, in other words, a law enforcement and intelligence interest of the highest order…

«

That Comey testimony, in this extract, is pretty thin gruel; her phone contains the whole answer to the crime? No clues in any physical evidence at all? No clues from her telephone records (which are available from the mobile carrier)? Nothing in her personal computer, assuming she has one? Nothing on any social media profiles, perhaps linked to Tinder? That’s a pretty remarkable murder, and the implication that all the necessary clues are locked inside her phone feels even more remarkable.

But it’s important to read viewpoints like this to realise what the other side of the argument is, and how it carries the same steamroller-style momentum that you might think the privacy/security one does.
link to this extract

 


No, Apple has not unlocked 70 iPhones for law enforcement » TechCrunch

Matthew Panzarino:

»I keep seeing reports that Apple has unlocked “70 iPhones” for the government. And those reports argue that Apple is now refusing to do for the FBI what it has done many times before. This meme is completely inaccurate at best, and dangerous at worst.

There are two cases involving data requests by the government which are happening at the moment. There is a case in New York — in which Apple is trying really hard not to hand over customer information even though it has the tools to do so — and there is the case in California, where it is fighting an order from the FBI to intentionally weaken the security of a device to allow its passcode to be cracked by brute force. These are separate cases with separate things at stake.

The New York case involves an iPhone running iOS 7. On devices running iOS 7 and previous, Apple actually has the capability to extract data, including (at various stages in its encryption march) contacts, photos, calls and iMessages without unlocking the phones. That last bit is key, because in the previous cases where Apple has complied with legitimate government requests for information, this is the method it has used.

It has not unlocked these iPhones — it has extracted data that was accessible while they were still locked. The process for doing this is laid out in its white paper for law enforcement…

It’s worth noting that the government has some tools to unlock phones without Apple’s help, but those are hit and miss, and have nothing to do with Apple. It’s worth noting that in its statements to the court in the New York case, the government never says Apple unlocks devices, but rather that it bypasses the lock to extract the information.

«

Just to clear that up.
link to this extract

 


The colour of surveillance » Slate

Alvaro Bedoya:

»The FBI has a lead. A prominent religious leader and community advocate is in contact with a suspected sleeper agent of foreign radicals. The attorney general is briefed and personally approves wiretaps of his home and offices. The man was born in the United States, the son of a popular cleric. Even though he’s an American citizen, he’s placed on a watchlist to be summarily detained in the event of a national emergency. Of all similar suspects, the head of FBI domestic intelligence thinks he’s “the most dangerous,” at least “from the standpoint of … national security.”

Is this a lone wolf in league with foreign sponsors of terrorism? No: This was the life of Martin Luther King Jr. That FBI assessment was dated Aug. 30, 1963—two days after King told our country that he had a dream…

…Across our history and to this day, people of color have been the disproportionate victims of unjust surveillance; Hoover was no aberration. And while racism has played its ugly part, the justification for this monitoring was the same we hear today: national security.

The FBI’s violations against King were undeniably tinged by what historian David Garrow has called “an organizational culture of like-minded white men.” But as Garrow and others have shown, the FBI’s initial wiretap requests—and then–Attorney General Robert Kennedy’s approval of them—were driven by a suspected tie between King and the Communist Party. It wasn’t just King; Cesar Chavez, the labor and civil rights leader, was tracked for years as a result of vague, confidential tips about “a communist background,” as were many others.

«

link to this extract

 


October 2010: What’s really wrong with BlackBerry (and what to do about it) » Mobile Opportunity

Michael Mace, on an old post which happens to hold some useful insights that are worth remembering:

»When I worked at Apple, I spent a lot of time studying failed computer platforms. I thought that if we understood the failures, we might be able to prevent the same thing from happening to us.

I looked at everything from videogame companies to the early PC pioneers (companies like Commodore and Atari), and I found an interesting pattern in their financial results. The early symptoms of decline in a computing platform were very subtle, and easy for a business executive to rationalize away. By the time the symptoms became obvious, it was usually too late to do anything about them.

The symptoms to watch closely are small declines in two metrics: the rate of growth of sales, and gross profit per unit sold (gross margins). Here’s why:

Every computing platform has a natural pool of customers. Some people need or want the platform, and some people don’t. Your product spreads through its pool of customers via the traditional “diffusion” process — early enthusiasts first, late adopters at the end.

It’s relatively easy to get good revenue from the early adopters. They seek out innovations like yours, and are willing to pay top dollar for it. As the market for a computer system matures, the early adopters get used up, and the company starts selling to middle adopters who are more price-sensitive. In response to this, the company cuts prices, which results in a big jump in sales. Total revenue goes up, and usually overall profits as well. Everybody in the company feels good…

«

But trouble lies ahead.
link to this extract

 


Global smartwatch shipments overtake Swiss watch shipments in Q4 2015 » Strategy Analytics

»According to the latest research from Strategy Analytics, global smartwatch shipments reached 8.1m units in Q4 2015, compared with 7.9m Swiss Watch shipments. It is the first time ever that smartwatches have outshipped Swiss watches on a global basis.

Cliff Raskind, director at Strategy Analytics, said, “We estimate global smartwatch shipments reached 8.1m units in Q4 2015, rising a healthy 316% from 1.9m in Q4 2014. Smartwatches are growing rapidly in North America, Western Europe and Asia. Apple Watch captured an impressive 63% share of the global smartwatch market in Q4 2015, followed by Samsung with 16%. Apple and Samsung together account for a commanding 8 in 10 of all smartwatches shipped worldwide.”

Steven Waltzer, Analyst at Strategy Analytics, added, “We estimate global Swiss watch shipments reached 7.9m units in Q4 2015, falling 5% from 8.3m in Q4 2014. Global demand for Swiss watches is slowing down, and major players like Swatch are struggling to find growth.”

«

The lost 0.4m units doesn’t seem like a big problem at first. But then, nothing bad seems like a big problem at first – as above.
link to this extract

 


Peeling paint, website bugs: Ringing Bell’s ₹251 phone in a storm of controversies day after launch » Huffington Post

Ivan Mehta:

»It started on an off note after Manohar Parrikar, India’s defence minister, did not show up at the event hosted to launch the phone. The details given out about the phone’s specs were nothing if not vague. A Hindustan Times report suggested that when asked the policy behind the pricing of the phone, Ashok Chadha, an official from the company, said the real cost of the device was ₹2500, which will be recovered through a raft of measures like economies of scale, innovative marketing, reduction in duties and creating an e-commerce marketplace.

Pranav Dixit, Tech editor for the Hindustan Times also said in a Reddit AMA that he has received a letter from the Indian Cellular Association (ICA), written to telecom minister Ravi Shankar Prasad, that estimates that the phone should cost at least USD 60 (Approx. ₹4100).

The phones handed over to the press all have an Adcom logo hidden behind a coat of white paint that easily peeled off. A report from Gadgets 360 suggested that phones handed out as review units were not the final products which will be shipped. That raises the question that who is building the final product? The report also says that Ringing Bells has not been registered at BIS, making their devices unsafe to use.

«

Gets worse. So, $4? Probably more like $40 in reality.
link to this extract

 


Errata, corrigenda and ai no corrida:

Start up: UK encryption doubletalk, Netflix VPN crackdown, Apple’s iAd retreat, and more


A Nest thermostat: malfunctioning, but what about privacy? Photo by Elvert Barnes on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

No backdoors but UK government still wants encryption decrypted on request… » TechCrunch

Natasha Lomas:

During the committee session [in the UK Parliament] [home secretary Theresa] May was asked to clarify the implications of the draft bill’s wording for encryption. Various concerns have been raised about this — not least because it includes a clause that communications providers might be required to “remove electronic protection of data”.

Does this mean the government wants backdoors inserted into services or the handing over of encryption keys, May was asked by the committee. No, she replied: “We are not saying to them that government wants keys to their encryption — no, absolutely not.”

However the clarity the committee was seeking on the encryption point failed to materialize, as May reiterated the government’s position that the expectation will be that a lawfully served warrant will result in unencrypted data being handed over by the company served with the warrant.

“Where we are lawfully serving a warrant on a provider so that they are required to provide certain information to the authorities, and that warrant has been gone through the proper authorization process — so it’s entirely lawful — the company should take reasonable steps to ensure that they are able to comply with the warrant that has been served on them. That is the position today and it will be the position tomorrow under the legislation,” said May.

Completely contradictory.
link to this extract


Evolving proxy detection as a global service » Netflix

If all of our content were globally available, there wouldn’t be a reason for members to use proxies or “unblockers” to fool our systems into thinking they’re in a different country than they’re actually in. We are making progress in licensing content across the world and, as of last week, now offer the Netflix service in 190 countries, but we have a ways to go before we can offer people the same films and TV series everywhere.

Over time, we anticipate being able to do so. For now, given the historic practice of licensing content by geographic territories, the TV shows and movies we offer differ, to varying degrees, by territory. In the meantime, we will continue to respect and enforce content licensing by geographic location.

Shorter version: we’re going to block your VPN.
link to this extract


Five years later, Thunderbolt is finally gaining some traction in PCs » Ars Technica UK

Andrew Cunningham:

For many years, it looked like Thunderbolt was destined to be a modern version of FireWire: faster and smarter than contemporary USB interfaces, but so rare outside of Macs that there isn’t a very wide range of accessories beyond adapters and external hard drives. Thunderbolt versions 1 and 2 are available in most Macs sold between 2011 and now, but it has been included in just a handful of PC laptops and high-end motherboards.
Thunderbolt 3 is turning that around. The port is suddenly beginning to show up in high-end offerings from just about every major PC OEM, starting with some Lenovo workstation laptops and Dell’s new XPS lineup and continuing in laptops and convertibles from HP, Acer, Intel, and others.

We’ve been talking to the PC companies at CES about this sudden turnaround, and their answers have all been in more or less the same vein. The increased speed of Thunderbolt 3 combined with all the benefits of USB Type-C (including driving displays via Alternate Mode and charging laptops via Power Delivery) has finally made Thunderbolt convenient enough to be worth the trouble.

link to this extract


David Maisel’s geometric geographies » The New Yorker

Marcia Bjornerud:

David Maisel’s aerial photographs of Toledo, Spain, and the surrounding La Mancha region, some of which will be on view at Haines Gallery, in San Francisco, through March 12th, can make Earth’s surface look more alien than terrestrial. Parts of the area that Maisel focussed on are underlain by light-colored alkaline rocks, which formed through the evaporation of an ancient body of water. The silvery soil of plowed fields almost shimmers, like a ghostly memory of that long-vanished sea.

Things like this, and more, in the gallery of images.


link to this extract


Germany launches smartphone app to help refugees integrate » The Verge

Amar Toor:

The German government has launched a new smartphone app to help asylum seekers integrate in their new country. Known as Ankommen (“Arrive”), the Android app is available for free on the Google Play Store, and will launch on iOS soon, according to its website. Ankommen was jointly developed by the Federal Office for Migration and Refugees, the Federal Employment Agency, the Goethe Institute, and Bayerischer Rundfunk, a public radio and TV broadcaster.

The app is available in Arabic, English, Farsi, French, and German, and does not require an internet connection. It includes a basic German language course, as well as information on the asylum application process and how to find jobs or vocational training. The app also provides information on German values and social customs, with tips from other non-Germans who live in the country.

Note the underlying assumption: refugees will have a smartphone. So far the app has fewer than 1,000 downloads.
link to this extract


Apple to disband iAd sales team » BuzzFeed News

John Paczkowski:

six years after launching iAd, Apple is stepping back from it. Multiple sources familiar with the company’s plans tell BuzzFeed News that Apple is getting out of the advertising-sales business and shifting to a more automated platform.

While iAd itself isn’t going anywhere, Apple’s direct involvement in the selling and creation of iAd units is ending. “It’s just not something we’re good at,” one source told BuzzFeed News. And so Apple is leaving the creation, selling, and management of iAds to the folks who do it best: the publishers.

Apple is phasing out its iAd sales force entirely and updating the iAds platform so that publishers can sell through it directly. And publishers who do so will keep 100% of the revenue they generate. It’s not clear what this means for Rubicon Project, MediaMath, and the other ad tech companies that had been overseeing programmatic, or automated, demand-side ad buying on the platform, but it doesn’t look good. Since everything can be done directly through the updated iAd platform, it’s likely that most of it will. “The big publishing groups will just fold programmatic buys into the stuff they’re selling across all their properties,” one source explained. iAd sales team members will be offered buyouts and released into the wild. The move is coming soon, perhaps as early as this week.

Advertising industry sources familiar with Apple’s new self-serve plan for iAds seem intrigued by it. “I think this is going to be great for publishers,” said one. “It gives them direct dialogue with their customers as opposed to forcing them to go through an Apple middleman. Access will be more plentiful and easier to manage — theoretically.”

How long will it be until the first malvertising via iAd? And what happens after that? I still feel iAd is a bad fit for Apple’s business model.
link to this extract


Developing for wearables: from shrunken smartphone to wearable-first and beyond » VisionMobile

Stijn Schuermans:

In a previous post, we called the Internet of Things the peace dividend of the smartphone wars, and IoT developers the baby boomers of that period. In other words, smartphone innovation made hardware technology abundant. It’s no longer the bottleneck. IoT breakthroughs will happen not by making more powerful processors or larger memories, but by identifying new applications for the sensors, devices and connectivity. This certainly seems to be the case for wearables, which arguably started with the first Fitbit in 2008 and boomed after the launch of the Pebble and Android Wear in 2013 and 2014. Those were the days of the wearables hype.

That hype has now died down. Developers in particular are getting more cautious about wearables. Between Q4 2014 and Q2 2015, the percentage of IoT developers targeting wearables dropped from 28% to 21%. Developers have not turned their back on wearables entirely – many still plan to develop for wearables in the future – but the initial enthusiasm is making way for realism, and a search for truly valuable uses for these new devices.

link to this extract


New study highlights privacy gap between consumers and tech vendors » WSJ Digits blog

Elizabeth Dwoskin:

The Pew Research Center has found in recent years that users of mobile and desktop computers are anxious about online privacy. The nonprofit’s latest study, published on Thursday, aimed to learn whether consumer anxiety waxed or waned in specific scenarios.

Conclusion: It does.

Although users often accept the implicit bargain of the online world — receiving free services in exchange for personal data — service providers can’t take users’ comfort with the arrangement for granted. Privacy concerns are more “case-by-case than driven by broad principles,” said Lee Rainie, Pew’s director of Internet, Science, and Technology Research.

The report revealed a gulf between the public and the tech industry, Mr. Rainie said, judging by the plethora of data-gathering gadgets on display at last week’s Consumer Electronics Show in Las Vegas. For instance, Nest seeks to connect items in the home–smart thermostats, light bulbs, garage doors and so on — into a system that would collect data to coordinate their operations; switching on lights, for instance, when the garage door indicates that an occupant has returned home in the evening.

The January 2016  report suggests that public attitudes could limit such plans.

Sure that Paul Graham will get right onto this and set the tech industry straight.
link to this extract


Nest thermostat glitch leaves users in the cold » The New York Times

Nick Bilton:

“Woke up to a dead nest and a very cold house,” a commenter wrote on the company’s forum. “Not good when you have a baby sleeping!”

“Mine is offline,” another customer tweeted. “Not enough battery (?) I’m traveling. Called nest. Known problem. No resolution. #nest #fail.”

Admittedly, this may strike some as a quintessential first-world problem: a thermostat that can’t connect to the web. But for some users, it posed genuine issues.

For those who are elderly or ill, or who have babies, a freezing house can have dire health consequences. Moreover, homeowners who installed a Nest in a weekend home, or who were on vacation, were also concerned that their pipes could freeze and burst, causing major damage.

Matt Rogers, the co-founder and vice president for engineering at Nest, blamed a software update from December. “We had a bug that was introduced in the software update that didn’t show up for about two weeks,” Mr. Rogers said apologetically. In January, devices went offline, and “that’s when things started to heat up.”

The question is, will we look back on events like this as just teething problems – a bit like some of the cloud outages of, say, 2007 – or will they just multiply as more systems interact with slightly jury-rigged ones?

And as Bilton also points out, the contracts these gizmos/services are provided under use “arbitration” clauses which hugely favour the company, not the consumer; one lawyer tells him that Nest’s terms of service “are inherently unfair to consumers”. Not biased; inherently unfair.
link to this extract


Google scamming consumers and screwing publishers with “Contributor” » LinkedIn

Mike Nolet is former CTO of AppNexus:

When I first heard of Google Contributor in early November I thought… this is exactly what the ad-industry should be doing, go Google! For those not familiar with the service, Contributor allows users to contribute a certain sum of money and opt-out of bandwidth hogging ads. The service “bids” on the users behalf, and if successful the user can choose to either collapse the unused space or upload their own messages – ingenious!

I immediately signed up, dialed my contribution up to$15/mo and started browsing. I configured my contributor account to show me messages from the new wellbeing starutp I’m working on and instead of ads I started seeing all sorts of positive messages. Cool!

A few months have since past and I figured it was time to review where my money was going. Boy, did my opinion change.

Looking at reports, it turns out I contributed $4.77 to remove 977 ads on websites since I signed up and Google charged me $29.67. The ~$5-CPM paid out seems generous, but I’ll accept that.  

The  $30 CPM and whopping 83% margin is downright theft. Google is keeping 83% of the money.

Who knows, maybe something is broken, but as it stands this is a service is a scam.

But he could dial down his contribution, surely? In a world though where adblockers are free, it seems somewhat worthy. Also, I calculated how much news sites (well, The Guardian) probably gets per browser per year from ads: $1.14.
link to this extract


Errata, corrigenda and ai no corrida: SATs (Standard Aptitude Tests) are very useful, apparently.

Start up: journalism v Sean Rad, the Lumia 950 zombie?, Pepsi phones, and more


Too few of these getting sold. Photo by Yuxuan.fishy.Wang on Flickr.

Alternatively, you can sign up to receive each day’s Start Up post by email. There’s a confirmation link, so no spam.

A selection of 10 links for you. Aren’t they fluffy? I’m charlesarthur on Twitter. Observations and links welcome.

An Open Letter to Tinder’s Sean Rad from Vanity Fair’s Nancy Jo Sales | Vanity Fair

Nancy Jo Sales, who wrote a fabulous piece about how dating has changed (including Tinder), which some seemed to think meant she should “seek a quote from Tinder” before publishing. Rad, in the Evening Standard, suggested he had “information” about Sales:

Sean, you and I both know that when you spoke of me as “an individual,” you were talking about me personally. And you seemed to speak from a place of emotion, admitting that you were “upset” about my piece in Vanity Fair—which wasn’t actually just about Tinder per se, but changes in the world of dating, with the introduction of dating apps overall. This was something I tried to point out in my response to an avalanche of tweets directed at me, one night in August, when someone at Tinder decided that he or she would try to besmirch my reputation as a journalist as well. Your Twitter account admonished me: “Next time reach out to us first . . . that’s what journalists typically do.”

I don’t know what you and your colleagues at Tinder think journalism is, but I don’t believe it’s the same as what most journalists think it is. Our job is to report on what real people say and do, and how this impacts our world. It’s not our job to parrot what companies would like us to know about their products. Our job is an important one, and when the heads of companies decide to go after journalists personally, then I think we’re in very dangerous territory—not only for journalists, but for the whole practice of journalism, without which we can’t have a democracy.

This last paragraph. Oh yes, oh yes. I grow so weary of publications which think that a company announcing the new model of a phone or some new tweak to their software merits a breathless single-sourced story.
link to this extract


Match Group Inc – Free Writing Prospectus » US Securities and Exchange Commission

On November 18, 2015, the Evening Standard (the “Standard”), an online and print news service, published an article based on an interview with Sean Rad, the Chief Executive Officer of Tinder, a subsidiary of the Company. The article is described in relevant part in the following paragraph and the full article is attached hereto.

The article was not approved or condoned by, and the content of the article was not reviewed by, the Company or any of its affiliates. Mr. Rad is not a director or executive officer of the Company and was not authorized to make statements on behalf of the Company for purposes of the article. The article noted that “Analysts believe the [Tinder] app, which launched in 2012, has around 80 million users worldwide and records 1.8 billion “swipes” a day.”  While these statements were not made by Mr. Rad, the Company notes that they are inaccurate and directs readers to the Preliminary Prospectus, which states that for the month of September 2015, Tinder had approximately 9.6 million daily active users, with Tinder users “swiping” through an average of more than 1.4 billion user profiles each day.

Evening Standard routinely publishes articles and is unaffiliated with the Company and all other offering participants, and, as of the date of this free writing prospectus, none of the Company, any other offering participant and any of their respective affiliates have made any payment or given any consideration to Evening Standard in connection with the article described in this free writing prospectus.

The statements by Mr. Rad were not intended to qualify any of the information, including the risk factors, set forth in the Registration Statement or the Preliminary Prospectus and are not endorsed or adopted by the Company.

I can’t actually find that 9.6 million daily active user figure in the Preliminary Prospectus in the link. Still, nice to know.
link to this extract


Edward Snowden and the Paris attacks » Business Insider

Natasha Bertrand:

some experts are skeptical that revelations regarding the NSA’s ability to access encrypted data and the encryption methods adopted by companies in the wake of the Snowden disclosures had any effect on the ways terrorists have chosen to communicate.

“There is no evidence at all that the Snowden leaks contributed or altered the kind of terrorist activity that ISIS and Al Qaeda do,” Dave Aitel, CEO of the cybersecurity firm Immunity, Inc., told Business Insider.

“Al Qaeda was using high-grade operational technology long before the leaks — and they knew the NSA was their prime enemy long before Snowden,” he added. “For Morell to say the intel gaps that facilitated the Paris attacks fall into Snowden’s lap is a fantastic work of intellectual fiction.”

Indeed, Al Qaeda and other terrorist groups have been using their own encryption software since at least 2007, beginning with a program known as “Asrar al-Mujihideen” (Secrets of the Mujahideen). They extended that program to other devices, such as cellphones and text messaging, as the technology became available.

“Nothing has changed about the encryption methodologies that they use,” Evan Kohlmann, a partner at the private security firm Flashpoint Global Partners, told NBC in 2014. “It’s difficult to reconcile that with the claim that they have dramatically improved their encryption technology since Snowden.”

Paris seems to have been organised by plain old text message.
link to this extract


Pepsi Phone P1 is official: 5.5in 1080p display, 4G LTE and fingerprint sensor for $110 » Fone Arena

Srivatsan Sridhar:

After the leaks, Pepsi Phone P1s has gone official in China. It features a 5.5-inch (1080 x 1920 pixels) 2.5D curved glass display, is powered by an Octa-Core MediaTek MT6592 processor and runs on dido OS based on Android 5.1 (Lollipop). It has a aluminum unibody design and even has a finger print sensor on the back. It has a 13-megapixel rear camera on the back and 5-megapixel front-facing camera.

It has 4G LTE connectivity and dual SIM support that lets you use the second nano SIM slot as a microSD slot when required. Pepsi is just licensing its branding, and Shenzhen Scooby Communication Equipment Co., Ltd will manufacture the phone. The standard version of the phone is called P1 and the China Unicom version with FDD-LTE support is called P1s.

Phones are now just branding exercises; those specs would have been flagship two years ago. Interesting question: why hasn’t Coca-Cola done this? Probably because it doesn’t need to – Pepsi is playing catch-up in the branding stakes.
link to this extract


Pepsi phone: can it “change the game”? » Counterpoint Technology Market Research

Neil Shah:

The smartphone space is already looking like a FMCG [fast-moving consumer goods, akin to supermarkets] space where the goods are moving faster than ever and has become highly commoditized with value shifting beyond hardware to brand, content, software, commerce and services.

This offers a perfect opportunity for Pepsi to find some synergies in leveraging its strong brand to this consumer electronics FMCG segment which is smartphone (a highly personal good) and drive its brand further.

This could turn out to be a great and disruptive move if Pepsi plays its cards right and strike key partnerships across different markets to promote Pepsi brand via phones.

As we said, smartphone is “highly personal device” and this could give unique insights about consumers and we believe its the marketing dollars well spent more than Super Bowl commercials to consistently and continuously learn about consumers’ habits on phone as most users now have almost most of their lives use-cases linked to their phones.

We see “Pepsi Phone” as a great marketing & marketing research tool for Pepsi.

Remember when pretty much every FMCG company had its own music download store? I think this will pan out like that. (Count how many FMCG companies still operate their own music download store.)
link to this extract


Chrome Extensions – aka total absence of privacy » Detectify Labs

We signed up for one of the services which provides this information gathered by the Chrome extensions. We were able to see the following:

• Common URLs used by employees on targeted companies.
• Internal network URLs, exposing internal network structure as well as completely separated websites for internal use only.
• Internal PDFs being placed on AWS S3 referencing competitors.
• Pages which only one person had visited. We tested this out. One of the guys in the office using one of the plugins created a local website, page X, which didn’t link anywhere, but while being on the site he changed the address bar to page Y. He was the only visitor of page X. Two weeks later page X ended up in the “Similar sites” of page Y with “Affinity: 0.01%”.

Technical Details – how they are doing it

• They are running the tracking scripts in a separate background instance of the extension, but can still get access to all information about your tabs. By doing this, your network traffic of a web page will not disclose that requests are being done to a third party. This bypasses all Content Security Policy-rules and Chrome extensions – such as Ghostery – that tries to prevent tracking, since the requests are being done inside the extension itself.

Plus obfuscation, subdomains for extensions and more. Isn’t the web fun?
link to this extract


China’s chip acquisitions send ripples across industry – News & Trends – EETA

Junko Yoshiba:

The technologies and IP targeted by China include disk drives, CMOS image sensors, servers, memory chips and advanced semiconductor packaging and test services.

For the moment, the biggest prize sought by a private fund such as Tsinghua Unigroup appears to be NAND memory chips. In August, the firm made an informal $23bn takeover offer for US giant Micron Technology. The Idaho-based chipmaker rejected the deal outright, conceded that it might endanger US national security.

In an interview with Reuters this week, the Tsinghua Unigroup chair, Zhao Weiguo, said his firm plans to about $47bn “over the next five years in a bid to become the world’s third-biggest chipmaker.” To put the matter into perspective, this five-year investment target roughly equals a year’s revenue at Intel. (Intel’s 2014 revenue was $55.9bn.)

Over the past two years, Tsinghua has spent more than $9.4bn on acquisitions and investments at home and abroad. These include the purchase of stakes in US data storage company Western Digital Corp. and Taiwan’s Powertech Technology Inc. Without disclosing specifics, the chair revealed that the company is about to close another investment deal, a minority stake in a US chip company, as early as the end of this month, Reuters reported.

link to this extract


Who turned my blue state red? » The New York Times

Subtitle of this article by Alec MacGillis of ProPublic is “Why poor areas vote for politicians who want to slash the safety net”; for non-US readers, “blue” states vote Democrat, and “red” ones Republican:

The people in these communities who are voting Republican in larger proportions are those who are a notch or two up the economic ladder — the sheriff’s deputy, the teacher, the highway worker, the motel clerk, the gas station owner and the coal miner. And their growing allegiance to the Republicans is, in part, a reaction against what they perceive, among those below them on the economic ladder, as a growing dependency on the safety net, the most visible manifestation of downward mobility in their declining towns.

These are voters like Pamela Dougherty, a 43-year-old nurse I encountered at a restaurant across from a Walmart in Marshalltown, Iowa, where she’d come to hear Rick Santorum, the conservative former Pennsylvania senator with a working-class pitch, just before the 2012 Iowa caucuses. In a lengthy conversation, Ms. Dougherty talked candidly about how she had benefited from government support.

Pulling the ladder up.
link to this extract


Jawbone lays off 60, 15% of staff globally, closes NY office » TechCrunch

Ingrid Lunden:

TechCrunch has learned and confirmed that the company yesterday [Thursday] laid off around 60 employees, or 15% of staff. It’s a global round of layoffs affecting all areas of the business; and as part of it Jawbone is also closing down its New York office (which was concentrated on marketing) and downsizing satellite operations in Sunnyvale and Pittsburgh.

In an emailed statement, a spokesperson said the layoffs are part of a wider “streamlining.”

“Jawbone’s success over the past 15 years has been rooted in its ability to evolve and grow dynamically in a rapidly scaling marketplace. As part of our strategy to create a more streamlined and successful company, we have made the difficult decision to reorganize the company which has had an impact on our global workforce,” he said. “We are sad to see colleagues go, but we know that these changes, while difficult for those impacted, will set us up for greater success.”

Seventh among wearable device vendors, with a market share of 2.8%; Fitbit by comparison is No.1 (ahead of Apple) with 24.3%, selling 4.4m. Can’t see a market for that many non-smartwatch vendors except the really specialist, eg athletics.
link to this extract


Microsoft Lumia 950 review: can a smartphone be your PC? » WSJ

Joanna Stern loves the hardware, though notes the mobile apps are limited or out of date (Instagram hasn’t been updated for two years), then tries the “Continuum” system, plugging it into (just) a monitor:

this made for a decent basic desktop computing experience—decent enough for me to write this entire review and not spend every minute pining for my laptop. Word, Excel, PowerPoint all look and feel like they do on a laptop, and the Edge Web browser loads desktop sites instead of mobile ones.

The problem is, despite the hexa-core processor and 3GB of RAM, the system feels out of power. Having just five or six open tabs reminded me of the dial-up modem days. Not only were sites slow to load over Wi-Fi, but the entire system and browser got bogged down. Besides, Google’s Chrome is just a far better desktop browser, feature-wise.

But that’s not the worst of it. Remember those app problems? Because this is Windows 10 Mobile and there is no Intel chip inside, Windows desktop apps don’t work. That means no downloading the desktop version of Spotify or Slack or iTunes. You can’t run mobile apps on the big screen, either. For example, I couldn’t open the Windows Phone Spotify app in the desktop PC mode, but I could run it on the phone while I did work on the computer monitor.

Ah, Windows RT is back. Or risen from its zombie grave. (Via Mike Hole.)
link to this extract


Errata, corrigenda and ai no corrida: none notified.

Start up: Google open-sources machine learning, Adele v streaming, Facebook’s Belgian problem, and more


Steve Reich’s Piano Phase, as a video, by Alexander Chen.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 9 links for you. Made without nuts. I’m charlesarthur on Twitter. Observations and links welcome.

Preserving security in Belgium » Facebook

Alex Stamos works on online security for Facebook, while a Belgian court has ruled that the “datr” cookie it uses is not legal. Stamos isn’t happy:

The reason I’m bullish on the datr cookie is because for at least the last five years we have used it every day to defend people’s accounts through the following actions:
• Preventing the creation of fake and spammy accounts
• Reducing the risk of someone’s account being taken over by someone else
• Protecting people’s content from being stolen
• Stopping DDoS attacks that could make our site inaccessible to people

If the court blocks us from using the datr cookie in Belgium, we would lose one of our best signals to demonstrate that someone is coming to our site legitimately. In practice, that means we would have to treat any visit to our service from Belgium as an untrusted login and deploy a range of other verification methods for people to prove that they are the legitimate owners of their accounts. It would also make Belgian devices more attractive to spammers and others who traffic in compromised accounts on underground forums…

The datr cookie is only associated with browsers, not individual people. It doesn’t contain any information that identifies or is tied to a particular person. At a technical level, we use the datr cookie to collect statistical information on the behavior of a browser on sites with social plugins, such as the Like button, to help us distinguish patterns that look like an attacker from patterns that look like a real person.

Tricky.
link to this extract


Why streaming doesn’t really matter for Adele » Music Industry Blog

Mark Mulligan:


Looking at mid-year 2015 consumer data from the US we can see that music buyers (i.e. CD buyers and download buyers) are still a largely distinct group from free streamers (excluding YouTube). While this may seem counter intuitive it is in fact evidence of the twin speed music consumer landscape that is emerging. This is why ‘Hello’ was both a streaming success (the 2nd fastest Vevo video to reach 100m views) and a sales success (the first ever song to sell a million downloads in one week in the US). These are two largely distinct groups of consumers.

As a reader of this blog you probably live much or most of your music life digitally, but for vast swathes of the population, including many music buyers, this is simply not the case. Given that the mainstream audience was so key to ‘21’s success we can make a sensible assumption that many of these will also fall into the 27% of consumers that buy music but do not stream.

This is also why it was so tricky for Apple to move into streaming: lots of iTunes users simply don’t. And also why Adele’s audience and prospects are very different from Taylor Swift’s.
link to this extract


Facing pressure in China, Xiaomi also stalls in India » The Information

Amir Efrati:

the domestic Chinese market has slowed, while Xiaomi has dropped to No. 2 there after Huawei Technologies in terms of market share for the third quarter of this year, according to research firm Canalys.

The results in India seem to bear out the bear thesis on Xiaomi’s expansion plans: that it will be harder to succeed outside of China because it would have to work within the bounds of Google’s version of Android, where it can’t customize the software—and run an app store—the way it does inside of China, where Google mobile apps are almost completely absent.

In India, Xiaomi is “just another low-cost phone hardware company,” says one rival executive.

One Indian e-commerce executive whose firm sells smartphones says Xiaomi has “stagnated” online and that sales of Samsung and Motorola phones were much stronger during a recent period of online promotions known as “Big Billions Days.” Xiaomi, bucking its traditional practice of selling phones only online, has been willing to sacrifice some margin and sell phones through some retail stores in India.

If you have to offer Google Mobile Services, in the end your differentiation will be whittled away.
link to this extract


Tim Cook: Apple CEO on the company’s latest venture – the iPad Pro » The Independent

David Phelan bagged an interview while the Apple chief was in London:

The iPad Pro is the most expensive tablet yet, £679 and up. At a time when iPad sales are flat, was he tempted to do as some competitors have done and released, say, a £50 tablet? “No, there are no good £50 tablets. We’ve never been about making the most, we’ve been about making the best. This was a way of making a product that people can do a lot of things with. I think it will attract a lot of PC users and people who are not currently using Apple products. And I think it will be a reason for people to upgrade who love iPad and who have been waiting for something very different and now here it is.”

Along with the Pencil, there’s a keyboard cover. Cook says it’s different from rival keyboards because with none of those would you say it “came from the same parent” as the tablet itself. “Now all of a sudden you have a keyboard that has been perfectly designed for the iPad, it’s integrated and then you’ve got the software with split view and it’s inherently very productive. I’m travelling with the iPad Pro and other than the iPhone it’s the only product I’ve got.” 

You have to love Cook’s rejection of “why did you do a stylus?” “It isn’t a stylus, it’s a Pencil.” Hear the capital. And his description of his youth as a trombone player is hilarious.
link to this extract


DTEK by BlackBerry » Android Apps on Google Play

Interesting move by BlackBerry: DTEK looks at how often and to what extent other apps have been accessing your location, contacts and so on:

In this world of interconnected apps and networks, controlling what is shared and who it’s shared with can be a challenge. BlackBerry® DTEK for Android™ allows you to view and improve your privacy level and monitor application access to your camera, microphone, location and personal information. Take control with DTEK by BlackBerry.
Key Features:

• Monitor – Know at a glance the overall security rating for your device, as well as for specific security features. You can identify whether or not you need to take any action to improve the security of your device.

And so on. For Android 5.0 and up; seems like it would be a useful app for anyone on Android. Certainly some of the folk at UTB blogs found Facebook taking amazing liberties – such as Facebook accessing the phone location 561 times in 60 hours. That’s roughly every 6 minutes. You were asking about your battery life? (Apparently there’s a version coming for iOS too.)
link to this extract


TensorFlow: smarter machine learning, for everyone » Official Google Blog

Sundar Pichai:

It’s a highly scalable machine learning system—it can run on a single smartphone or across thousands of computers in datacenters. We use TensorFlow for everything from speech recognition in the Google app, to Smart Reply in Inbox, to search in Google Photos. It allows us to build and train neural nets up to five times faster than our first-generation system, so we can use it to improve our products much more quickly.

We’ve seen firsthand what TensorFlow can do, and we think it could make an even bigger impact outside Google. So today we’re also open-sourcing TensorFlow. We hope this will let the machine learning community—everyone from academic researchers, to engineers, to hobbyists—exchange ideas much more quickly, through working code rather than just research papers. And that, in turn, will accelerate research on machine learning, in the end making technology work better for everyone. Bonus: TensorFlow is for more than just machine learning. It may be useful wherever researchers are trying to make sense of very complex data—everything from protein folding to crunching astronomy data.

No quibbles: this is excellent news. Main site is http://www.tensorflow.org. Written in Python; binaries available for Linux and Mac. I’m sure there’s another desktop OS, isn’t there?
link to this extract


RECONSIDER » Medium

David Heinermeier Hansson (he usually goes by “DHH”), who founded Basecamp which – yawn! – is just mildly and continually successful:

it’s hard to carry on a conversation with most startup people these days without getting inundated with odes to network effects and the valiance of deferring “monetization” until you find something everyone in the whole damn world wants to fixate their eyeballs on.

In this atmosphere, the term startup has been narrowed to describe the pursuit of total business domination. It’s turned into an obsession with unicorns and the properties of their “success”. A whole generation of people working with and for the internet enthralled by the prospect of being transformed into a mythical creature.

But who can blame them? This set of fairytale ideals are being reinforced at every turn.
Let’s start at the bottom: People who make lots of little bets on many potential unicorns have christened themselves angels. Angels? Really?

link to this extract


Piano Phase » Alexander Chen

This site is based on the first section from Steve Reich’s 1967 piece Piano Phase. Two pianists repeat the same twelve note sequence, but one gradually speeds up. Here, the musical patterns are visualized by drawing two lines, one following each pianist.

The sound is performed live in the browser with the Web Audio API, and drawn in HTML5 Canvas.

This is really wonderful. Chen is a creative director at Google Creative Lab – he has done lots of other visualisations of music.
link to this extract


The consumerization of the automobile supply chain » DIGITS to DOLLARS

Jonathan Greenberg:

Last week I saw an interesting post on Venture Beat about Acer Launching an Electric All-Terrain Vehicle [quad bike, for UK readers]. This struck a chord because Taiwan-based Acer is a manufacturer of PCs and other consumer electronics (CE) devices. Acer is one of the most prominent companies in Taiwan’s CE complex, which builds almost all of our consumer gadgets. They are closely tied to some of the industry’s most important ODMs, component vendors and contract manufacturers. It is not that surprising to see a consumer electronics giant diversify into higher priced devices as they move up the value chain. However, if you don’t look at Acer as an device maker, but instead view them as a flagship of the Taiwanese electronics industry, the announcement has broader implications.

You can see where this is going, can’t you?
link to this extract


Errata, corrigenda and ai no corrida: none reported.

Start up: Safe Harbour’s failure, Google Photos grows, Android Doze, Theranos redux, and more


Guess what sort of things Facebook’s “M” assistant gets asked to do. Photo by PeterThoeny on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

The collapse of the US-EU Safe Harbor: solving the new privacy Rubik’s Cube » Microsoft on the Issues

Brad Smith, Microsoft’s chief legal officer:

On Oct. 6, the Court of Justice of the European Union struck down an international legal regime that over 4,000 companies have been relying upon not just to move data across the Atlantic, but to do business and serve consumers on two continents with over 800 million people.

The decision made clear what many have been advocating for some time: Legal rules that were written at the dawn of the personal computer are no longer adequate for an era with ubiquitous mobile devices connected to the cloud. In both the United States and Europe, we need new laws adapted to a new technological world.

As lawyers and officials scurry to assess the situation, it’s apparent that both a variety of smaller steps and a more fundamental long-term change will be needed. We need to focus on both of these aspects.

Haven’t seen a blogpost from Google on this. Have I missed it?
link to this extract


Google Photos cloud storage service hits 100 million monthly users » Re/code

Mark Bergen:

Love for Google Photos inside the Googleplex overfloweth. At conferences, on earnings calls, in cocktail parties, Google execs shower praise on the cloud photo storage and sharing service it launched back in May. For good reason: It’s a simple, practical product that shows off Google’s machine learning prowess without any of the baggage of Google+, from which it was born.

And people are using it. On Tuesday, the search giant announced that Photos, in its first five months, has crossed 100 million monthly active users.

Google+: launched June 2011, claimed 100m users by September 2012. So this is faster – and surely a lot more engaging. Everyone loves their own photos, as opposed to everyone else’s opinions.
link to this extract


Facebook M assistant’s top requests include restaurant suggestions and shopping help » TechCrunch

After an early report from The Information, Facebook provided official details on its M project in August. Built into Messenger, M lets users text in almost any request, from assistance with online chores to booking real-world services or making purchases on their behalf. Requests are currently fielded by a combination of Facebook workers and artificial intelligence.

The hope is that over time, the humans will teach the AI to do more and more complicated tasks on their own. If M succeeds and can be affordably rolled out, it could make people’s lives easier while strengthening their loyalty to Facebook Messenger amid intense competition between chat apps. Though if it’s too costly to scale, Facebook could burn a lot of money on the project.

M could potentially earn revenue itself by taking a margin on top of purchases or services booked for people. But the big opportunity is for Facebook to lock users further into its ecosystem where it makes ample money on News Feed ads. One day, Facebook could even sell ads that convince you to initiate an M request that involves an advertiser’s business.

Right now, Facebook tells me the No. 1 type of request is for restaurant suggestions and reservations. People might know their desired food type, distance, price range, or some quality they’re looking for in a restaurant, and M helps find them the one that fits and gets them a table.

Not so different from what Siri or Google Now or Cortana can do – “find me Mexican restaurants within three minutes’ walk.” Baby steps. But really interesting ones.
link to this extract


Deutsche Telekom said to weigh new antitrust complaint against Google » The New York Times

Mark Scott:

Deutsche Telekom, which owns a controlling stake in T-Mobile US, the cellphone carrier, appears ready to get involved in Europe’s investigation into Google’s Android mobile software as well. Deutsche Telekom is expected to file a formal complaint with European competition authorities in the coming weeks, according to several people with direct knowledge of the discussions.

The complaint, which may be submitted by early November, focuses on whether Google uses its Android mobile operating system to unfairly promote its own products like Google Maps and online search over those of rivals, the people said. They would speak only on the condition of anonymity because they were not authorized to speak publicly.

This is separate from the search antitrust investigation (which is principally looking at desktop).
link to this extract


Google will require OEMs to include unmodified Doze Mode in Android 6.0 » Android Police

Ryan Whitwam:

For years Android has struggled with battery life due to apps running in the background when they aren’t supposed to, and Marshmallow could finally put a stop to it. To make sure device makers play ball, Google’s Android 6.0 Compatibility Definition Document (CDD) explicitly requires Marshmallow phones to include Doze, and OEMs aren’t allowed to monkey around with it.

Doze mode is Google’s answer to the sometimes terrible standby time of Android devices. If a phone or tablet hasn’t been used for a while, the system goes into Doze mode—apps remain asleep and wakelocks are ignored. Important cloud message pings still get through and the device wakes up briefly on occasion to sync, but that’s it…

If you go into the power optimization settings in Android 6.0, you can see which apps are exempt from Doze. On stock Android that’s just Play Services and device manager, but Google will require OEMs to show users anything else they choose to exempt from Doze in that list. That doesn’t necessarily mean you’ll be able to remove the exemption, but you’ll at least know what’s been given special treatment.

It was all going so well until that last sentence. But good to see Google tightening up on this stuff; user experience counts.
link to this extract


City AM becomes first UK newspaper to ban ad blocker users » The Guardian

Mark Sweney:

City AM is launching a trial from Tuesday that will blur out text of stories on cityam.com for desktop users of Firefox browsers who are detected using ad blocking software.

Readers will be encounter a message saying: “We are having trouble showing you adverts on this page, which may be a result of ad blocker software being installed on your device. As City AM relies on advertising to fund its journalism, please disable any adblockers from running on cityam.com to see the rest of this content.”

Martin Ashplant, the digital director at City AM, said about 8% of the site’s 1.2 million monthly browsers use Firefox on desktop and around 20% of those have ad blocking software installed.

The trial currently does not include any other browser types or non-desktop devices such as mobile phones and tablets.

Let’s see if we can guess: adblocker users will move to different browsers? Also, it’s doing this for 1.6% of its users – ie 19,200 people? Perhaps trying to get the thin end of the wedge in there.
link to this extract


Theranos trouble: a first-person account » Monday Note

Jean-Louis Gassée tried them because he has some skin (well, blood) in the game:

It seems a Hungarian forebear passed down an errant JAK2 gene that trips bone marrow into polycythemia vera (PCV), a fancy name for “too many blood cells” — and potential clots, especially as one’s vessels degrade with age. There’s no cure, yet, but with frequent attention the treatment is simple: Hydroxyurea, an inexpensive 19th century urea derivative, slows bone marrow output.

In homage to my ancestor, I perform a decade-old routine, a stroll to Stanford Hospital’s Hematology Lab to give blood samples that are tested for Complete Blood Count (CBC) and Metabolites. My numbers haven’t fluctuated much since my last visit and the kind hematologist pronounces me “medically boring” (Pourvu que ça dure! ). Good for me: If the hematocrit (HCT) number crosses the 45% threshold, I get to meet the vampire and “donate” 500ml of blood. (After which this perfectly good pint of blood must be tossed. Regulations. Sigh…)

On my way back to my University Avenue office, a thought pops up: Why not try Theranos for comparison?

His experience is a tad worrying; the comments below the post from people in the lab/testing industry are pretty eye-opening too. You don’t come away thinking the noise around Theranos is nonsense.
link to this extract


Some tech investors sure seem to be getting defensive lately … » Business Insider

Matt Rosoff with a well-argued counterpoint to the venture capitalists who – while lacking any detailed knowledge – complain about exposés such as the NYT’s on Amazon, or the WSJ’s on Theranos:

Journalists don’t set out to write takedowns of companies. But when a journalist begins investigating a company and finds something is amiss, and the story is well vetted and fairly reported, the venture community should welcome that reporting.

Because every faker, every charlatan, and every company whose product just isn’t good enough to win is taking money that could have been invested in other companies that have a better chance. 

(One more thing. Journalists are happy to hear companies defend themselves. But when a company refuses to share any data that could bolster its case, and refuses to let anything they say privately be used publicly — that’s “off the record” in journalism-speak — it’s awfully hard to take these defenses seriously.)

If you’re a journalist, you’ve surely had the latter experience. Rosoff’s piece really does need to be read in full.
link to this extract


Intel has 1,000 people working on a chip for iPhone? Of course they do » DIGITS to DOLLARS

Jonathan Greenberg (who has a lot of valuable experience in the chip industry):

I would argue that Intel has a lot of levers they can pull to win Apple as a wireless customer. They can offer a bundled deal which includes processors for the MacBook, and even cut Apple a deal to serve as their foundry for future versions of Apple’s A-Series of processors. I have no idea if any of these will ever happen, but I want to point out that this is a complex negotiation environment.
And, of course, there is Apple itself to reckon with. The post makes a big deal about the fact that Apple hired a big team of people from Infineon, but that started years ago, and that team has been using Qualcomm modems for a long time. More intriguing is the idea that Apple just wants to license the modem software from Intel and then design their own chip. That rumor has been circling for a long time. And I think it is important to remember that. Apple wants to manage their suppliers for its own ends. They now have two foundry partners to fight over iPhone share. For the past few years Apple has had little choice but to use Qualcomm for modems, so it is only natural for them to want a second source. When (if?) Intel finally gets its LTE modem working, Apple will have that second source. My guess is that Apple really does not want to design its own modems. That requires a lot of labor intensive software work to keep up with those standards mentioned above.

link to this extract


Tim Cook gets passionate about privacy at “The Wall Street Journal” tech conference » Fast Company

Harry McCracken:

The conversation was more fun when Cook spoke about the new Apple TV. He pushed back on Baker’s contention that the streaming box wasn’t much of a disruptor, and went on an entertaining rant against TV as it’s existed for decades. (“Why does a channel even exist? Think about it. My nephew asked me once, and I couldn’t even answer.”)

But the liveliest portion of the session by far involved privacy. It’s been a big talking point for Cook for a while now. And onstage, he got worked up talking about it in a way that was strikingly different from his normal, preternaturally calm, on-point manner.

“Privacy is a key value of our company,” Cook began, in a manner similar to his previous statements on the topic. “We think it will become increasingly important to more and more people over time as they realize that intimate parts of their lives are in the open and being used for all kinds of things.” He explained that Apple encrypts personal information and keeps it on your phone, drawing an unstated contrast with Google, whose fundamental business model involves storing personal data in the cloud where the company can slice it, dice it, and monetize it with advertising.

But when the discussion turned to government monitoring of the digital world—National Security Agency director Michael Rogers having preceded Cook onstage—Baker said there were basic tradeoffs between privacy and national security. And Cook didn’t buy it. “I don’t agree,” he said. “I think that’s a copout.”

Cook also objected to Baker’s what-if scenario involving a back door that would have let government agents override encrypted data and foil the 9/11 plot before it was carried out: “No one should have to decide, privacy or security. We should be smart enough to do both.”

That point about channels should have been in Cook’s introduction of the new Apple TV in September – except the answer is easy: it’s to give you a predictable experience, just as a newspaper does. Apple lacks a good storyteller at present. (You can read the liveblog on the WSJ Digits blog.)
link to this extract