Start up: Ashley Madison’s vanishing women, PC and tablet gloom, taxing sugar, and more


Swiss watch exports – especially to China – fell in July. Why?

A selection of 8 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Almost none of the women in the Ashley Madison database ever used the site » Gizmodo

Annalee Newitz:

I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were.

What I discovered was that the world of Ashley Madison was a far more dystopian place than anyone had realized. This isn’t a debauched wonderland of men cheating on their wives. It isn’t even a sadscape of 31 million men competing to attract those 5.5 million women in the database. Instead, it’s like a science fictional future where every woman on Earth is dead, and some Dilbert-like engineer has replaced them with badly-designed robots.

Those millions of Ashley Madison men were paying to hook up with women who appeared to have created profiles and then simply disappeared. Were they cobbled together by bots and bored admins, or just user debris? Whatever the answer, the more I examined those 5.5 million female profiles, the more obvious it became that none of them had ever talked to men on the site, or even used the site at all after creating a profile. Actually, scratch that. As I’ll explain below, there’s a good chance that about 12,000 of the profiles out of millions belonged to actual, real women who were active users of Ashley Madison…

…About two-thirds of the men, or 20.2 million of them, had checked the messages in their accounts at least once. But only 1,492 women had ever checked their messages. It was a serious anomaly.

Top-class data journalism by Newitz. This is how you do it: get facts and hammer them into the ground. Ashley Madison increasingly looks like a game of three-card monte. CEO Noel Biderman previously trumpeted in the media that Ashley Madison had an overall 70/30 gender split — with a 1:1 male/female ratio among the under-30 set. Seems like he was flat-out lying. (Teddy Wayne, who wrote that linked GQ story, now works for the New Yorker; he clearly did well to get five women who apparently used AM to talk to him in 2013.)

link to this extract


Swiss watch exports fall in July » Business Insider

Ben Moshinsky:

The Swiss-watch bubble may be about to unravel.

After years of stunning growth, in which exports more than doubled from 2000 to 2014, Swiss watchmakers had a terrible month.

China led the fall, according to export figures from the Federation of the Swiss Watch Industry.

Overall exports were 9.3% lower than a year earlier, at 1.9 billion Swiss francs (£1.3 billion, $1.97 billion) with the Chinese market segment dropping by more than 39%. Sales to the United Arab Emirates also tanked 29.8%.

Biggest fall? Those costing between CHF200-500 and CHF500-€3,000. (1 CHF = US$1.05.) Anyone know any watch-like products released recently around that price not coming out of Switzerland?
link to this extract


Google has a secret interview process… and it landed me a job » The Hustle

Max Rosett:

Three months ago, I thought I wasn’t ready to apply for a job at Google. Google disagreed.

I was in the midst of a career transition. I had spent three years working as a management consultant and then at a startup, but I wanted to become a computer engineer. I was earning a Master’s in computer science through Georgia Tech’s online program. I knew that I was slowly developing the skills that I would need in an engineering role, but I still lacked the confidence to apply for a full-time software role.

One morning, while working on a project, I Googled “python lambda function list comprehension.” The familiar blue links appeared, and I started to look for the most relevant one.

But then something unusual happened.

The search results split and folded back to reveal a box that said “You’re speaking our language. Up for a challenge?”

I would find that intensely scary. I’d worry I’d either been hacked or taken hallucinogenics.
link to this extract


Worldwide tablet shipments expected to decline -8.0% in 2015 while 2-in-1 devices pick up momentum, growing 86.5% » IDC

According to a new forecast from the International Data Corporation (IDC) Worldwide Quarterly Tablet Tracker, tablet shipments, inclusive of 2-in-1 devices, are expected to decline -8.0% in 2015, representing a notable slowdown from IDC’s previous forecast of -3.8%. Shipments are now expected to reach 212 million with the vast majority being pure slate tablets.

The overall trajectory of the tablet market has not changed significantly over the past year and a half, but the 2-in-1 segment, also referred to as detachables, is starting to gain traction. While the 2-in-1 form factor is not new, OEMs are getting more serious about this market and as a result IDC expects the 2-in-1 segment to grow 86.5% year over year in 2015 with 14.7 million units shipped. Although this volume is far below that of the more affordable slate tablet segment, IDC believes these devices appeal to an audience seeking an alternative to pure tablets with smaller screens.

Basically, Windows picks up from interest in 2-in-1 devices. But it remains niche. (Gartner rolls 2-in-1s into its PC category; IDC calls them “tablets”.) IDC expects an “iPad Pro” and that Apple will still be the largest vendor in 2019.
link to this extract


PC shipments expected to shrink through 2016 as currency devaluations and inventory constraints worsens outlook » IDC

Worldwide PC shipments are expected to fall by -8.7% in 2015 and not stabilize until 2017, according to the International Data Corporation (IDC) Worldwide Quarterly PC Tracker. The latest forecast has growth declining through 2016 – which will make five years of declining shipments. Growth should resume in 2017, led by the commercial market, while consumer volume continues a small decline through the end of the forecast in 2019.

Although IDC had expected the second quarter of 2015 to be a transition period as vendors prepare for Windows 10 systems in the second half of the year, final results nonetheless shrank even more than expected due to a stubbornly large inventory of notebooks from prior quarters and severe constraints posed by the decline of major currencies relative to the US Dollar.

Hey ho. This is really going to put the squeeze on the smaller players.
link to this extract


Taxing soda, saving lives » Al Jazeera America

Kate Kilpatrick:

Mexico consumes more soda per capita than any other country, and research links sugary drinks to obesity and diabetes, a leading cause of death in Mexico.

And blindness.

More than 14 million Mexicans have diabetic retinopathy, which impairs vision.

That could explain why Mexico became the first country to impose a national soda tax, which went into effect on the first day of 2014.

“It was a really big deal. A really, really big deal,” said Marion Nestle, a professor of nutrition, food studies and public health at New York University and the author of the forthcoming book “Soda Politics: Taking On Big Soda (and Winning).”

“Generally, the taxes are considered the most radical things you can do about obesity,” said obesity expert Kelly Brownell, the dean of the Sanford School of Public Policy at Duke University.

The tax is an excise tax (meaning it’s paid at the point of purchase) that tacks on a peso (about 6 cents) per liter to sales of sugar- or syrup-sweetened sodas, juices, energy drinks and bottled tea and coffee. It also applies to drink powders and concentrates but excludes flavored milks, diet sodas and bottled waters.

“Soda” is such an innocuous word for a useless drink whose health effects are entirely negative. Sugar taxes are long overdue. As Chris Mims says: “Soda companies are the new tobacco companies, full stop.” When will the UK and US follow suit?
link to this extract


AT&T Wi-Fi hotspots: now with advertising injection » Web Policy

Jonathan Mayer found some unexpected – and unwanted – ads while at the airport:

Curious, and waiting on a delayed flight, I started poking through web source. It took little time to spot the culprit: AT&T’s wifi hotspot was tampering with HTTP traffic.

The ad injection platform appears to be a service from RaGaPa, a small startup. Their video pitch features “MONETIZE YOUR NETWORK” over cascading dollar signs. (Seriously.)

When an HTML page loads over HTTP, the hotspot makes three edits. (HTTPS traffic is immune, since it’s end-to-end secure.)

First, the hotspot adds an advertising stylesheet.

Next, it injects a backup advertisement, in case a browser doesn’t support JavaScript. It appears that the hotspot intercepts /ragapa URLs and resolves them to advertising images.

Finally, the hotspot adds a pair of scripts for controlling advertisement loading and display.

Those scripts, in turn, import advertising content from additional third-party providers.

Mayer is the person who spotted Google hacking Safari to add Doubleclick cookies back in 2012 (a case that led to a $22.5m FTC fine for Google, and ongoing court cases in the UK).

Strangely enough, when quizzed about this, AT&T said it was a test that it had just finished. What an amazing coincidence that (a) Mayer tried it, last week, just near the end of the trial (b) AT&T stopped it just after Mayer’s post was published. (Bonus: iOS 9 – coming next month – mandates HTTPS for pretty much all connections. So that’s a benefit.)
link to this extract


Who are Twitter’s verified users? » Medium

Haje Jan Kamps:

The biggest proportion of Verified users are journalists and assorted media folks (news producers, anchors, TV meteorologists etc) representing almost a quarter of the verified accounts.

They’re followed by sports clubs and athletes with about 18% of the accounts, and actors & entertainers representing another 13%. Given how comprehensively musicians are represented in the top 10 lists, it was surprising to me that only about 12% of the verified accounts were musicians and music industry people.

Not that surprising, really. Also notable: verified journalists tend to have lower follower:following ratio (ie, they discuss, rather than broadcast). HMU!
link to this extract


Start up: after Windows Everywhere, what?, flying Twitter’s nest, Happy Uncopyrightday, and more


Lots of cabs, in theory. But in reality too? Photo by UrbanPaul on Flickr.

A selection of 8 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Microsoft, capitulation and the end of Windows Everywhere » Benedict Evans

Benedict Evans:

A new CEO is acknowledging the end of ‘Windows Everywhere’ as the driving strategic engine for Microsoft, and also acknowledging the decline of Microsoft Office as the monolithic, universal experience for productivity. Microsoft is also suggesting that Xbox is not strategically core either, reflecting the reality that it will be the smartphone, not the TV or a box plugged into it, that will be the hub of the digital experience for most people. The smartphone is the sun and everything else orbits it. 

This is a little like Google’s transition away from the plain-text web search as the centre of everything, and indeed Facebook’s tentative shifts away from the Newsfeed. Microsoft has two huge, profitable businesses in Windows and Office: they will slowly go away, so how do you use them to create something new? Instead of every new project having in some way to support Office and Windows, how do you use Office and Windows to support the future? You must distinguish between things that prop up the legacy Office and Windows businesses (and Microsoft is doing plenty to do that), while using them to drive the new things.

But you also need to work out was that ‘new’ would look like.

link to this extract


More than 450 staff fly Twitter’s nest – FT.com

Hannah Kuchler, Aimee Keane, Leaf Arbuthnot:

An FT analysis of LinkedIn profiles suggests about 12% of Twitter’s staff have left in the last year, including senior staff in corporate development and partnerships, and executives from its MoPub acquisition.

The figure is likely to underestimate the true number of departures as not every employee has a profile on the professional social network or keeps it up to date. Despite the staff turnover, the group’s total headcount has increased 18% in the last year.

Robert Peck, a SunTrust Robinson Humphreys analyst, wrote in a note that while “brain drain” is always a risk in the highly competitive technology industry, he was concerned that the large sums of capital raised by start-ups “increases the risk for Twitter during the chief executive transition” as employees could be lured to private rivals by valuable pre-initial public offering stock.

“While some key talent may leave the company while it is in flux, it may also be difficult to hire new key talent without a permanent chief executive being in place,” he wrote.

link to this extract


Apple HomeKit requires ID chip » EE Times

Rick Merritt:

Apple requires anyone making a device compatible with its HomeKit environment to buy and use a special identity chip. The revelation was one of many from a session on platforms for the Internet of Things at last week’s ESC SV event here.

“I know a lot of people who have been surprised by this requirement and had to re-spin boards for the chip,” said Michael Anderson, chief scientist of PTR Group in his talk. “A lot of manufacturers are up in arms [about the] Apple silicon [that makes their] device more expensive,” he said.

“There’s no clear story what the chip does but I expect it is involved with access to the cloud and may have triggers for geo location,” Anderson said. Overall, “there’s not a lot known about HomeKit since it was first launched in iOS 8 because Apple’s got it under wraps,” he added.

Good way to add cost, but also a good way to be sure of security. Or.. a good way for everything to be susceptible to the same security flaw.
link to this extract


Windows 10 or OS X? A Mac user falls for the PC again » WSJ

Joanna Stern really loves Windows 10, but finds the hardware lacking:

Ironically, I found my MacBook Air to be the best Windows 10 laptop. It may not have a touchscreen, but it was snappier, and beat the Dell and Surface for normal scrolling and navigating. (The three-finger swipe wasn’t enabled during my tests, however.) Windows 10 is in desperate need of a worthy PC laptop.

Another thing that’s made me a master Windows 10 multitasker is the ability to easily snap email to one side of the screen and a Web browser to the other. Microsoft included app-snapping in previous Windows versions, but now it suggests other open apps or windows to place next to it. It also lets you tile up to four windows on the screen. It’s a huge time saver, especially when helping herd the stray windows on my external monitor.

The feature is so great, Apple put it in its next version of OS X and iOS for the iPad. But Microsoft’s implementation is better, in part because it has addictive keyboard shortcuts.

link to this extract


Filmmakers fighting “Happy Birthday” copyright find their “smoking gun” » Ars Technica

Joe Mullin:

The “smoking gun” is a 1927 version of the “Happy Birthday” lyrics, predating Warner/Chappell’s 1935 copyright by eight years. That 1927 songbook, along with other versions located through the plaintiffs’ investigations, “conclusively prove that any copyright that may have existed for the song itself… expired decades ago.”

If the filmmakers’ lawyers are right, it could mean a quick route to victory in a lawsuit that’s been both slow-moving and closely watched by copyright reform advocates. Warner/Chappell has built a licensing empire based on “Happy Birthday,” which in 1996 was pulling in more than $2m per year.
Plaintiff Jennifer Nelson’s movie is actually called Happy Birthday, and it’s about the song. She had to pay Warner/Chappell $1,500 to use the song in her movie, and that didn’t sit well with the documentarian. She’s seeking to get that money back and also represent a class of plaintiffs who have paid similar licensing fees to Warner/Chappell on a copyright she and her lawyers say is illegitimate.

The 1927 songbook referenced above was found in a batch of 500 documents provided by Warner/Chappell earlier this month. That cache included “approximately 200 pages of documents [Warner/Chappell] claim were ‘mistakenly’ not produced during discovery, which ended on July 11, 2014, more than one year earlier,” Nelson’s lawyers write.

This has been a thorn in peoples’ sides for years. It would be great for it to be wiped out.
link to this extract


Your car won’t be driving itself anytime soon » Forbes

Thejo Kote, co-founder and CEO of Automatic, which makes connectors for cars:

There is also the legal elephant in the room: liability. Car makers have always made sure that liability for the operation of a vehicle rests solely on the driver. The shift of liability to the manufacturer of the self-driving car is a huge change. Evaluating and understanding the risk they’re signing up for in a way that satisfies lawyers, legislators, and society at large is going to take a long time.

Auto insurance as we know it can’t be applied to self-driving cars; brand new insurance models will have to be developed. I work closely with senior executives at some of the largest insurers in the world, and while they’re actively preparing for the transition, even their most aggressive projections indicate that there won’t be any meaningful changes in the market for well over a decade.

link to this extract


OnePlus 2 vs Moto X Play: what’s the difference? » Pocket-lint

Elyse Betters:

Based on white sheet specs, the OnePlus 2 seems to beat the Moto X Play in terms of internal specs (like processor speed and RAM). It also completely beat the Moto X Play when it came to design and build, whereas the Moto X Play dominated in the camera department. And both devices had comparable displays and software experiences.

Moto X Play also makes improvements over its predecessor and naturally blows the Moto G out of the water, but as we said, it costs £299. Moto X Play also supports microSD, which the OnePlus 2 doesn’t, but the OnePlus 2 does have a fingerprint sensor and USB Type-C. And the 64GB version with 4GB of RAM only costs $389 (convers to £249).

Specs of course don’t tell everything. But she comes down on the side of the OnePlus (though it doesn’t have NFC).
link to this extract


Uber’s phantom cabs » Motherboard

Alex Rosenblat:

There are two versions of Uber’s app: one for drivers to use to find passengers, and one for passengers to use to hail a ride. Frequently, drivers login to the passenger app to see where other drivers are so they don’t sit unknowingly in the same one-mile stretch as the competition.

What the passenger app shows can be deceptive, however. The discrepancy Heather noticed wouldn’t have been obvious in a busy location with a shorter wait time. But in more remote areas, the app clearly shows drivers where there are none.

Over a six month period, my colleague Luke Stark and I have been studying how Uber drivers interact with the Uber app as part of a research project funded by Microsoft FUSE Labs. Our research was conducted primarily in Uber driver forums, and through interviews with Uber drivers. We’ve observed that drivers across multiple forums discuss the fake cars they see on their own residential streets.

Ooh, this article is fascinating all the way through.
link to this extract


Start up: adblocking animus, Amazon’s aims, Ubuntu phone reviewed, the iPod Watch, and more


“They say this replacement can’t be hacked remotely!” Photo by Hugo90 on Flickr.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

New iPhone apps will include ad blockers for the mobile web » MIT Technology Review

Tom Simonite:

Some [iOS developers] are now testing ad blocking apps they intend to release when iOS9 becomes available. Their results suggest these apps could be popular. For example, when Dean Murphy, an app developer based in the U.K., hacked together an ad blocker in about an hour earlier this month, he found it slashed the time taken to load the popular Apple blog iMore from 11 seconds to just two seconds.

He is now working to release a fully polished ad blocker called Crystal, and expects there will be many others when iOS9 launches. “Apple has laid a solid foundation for quality ad blocking applications,” he says.

One of Murphy’s competitors will be an app called Purify, created by Chris Aljoudi, who leads development of the desktop ad blocker uBlock, which he says has over one million active users. A video of Purify in action shows how it makes a news site load faster and strips pre-roll video ads from YouTube. Aljoudi says his tests have showed that Purify cuts Web browsing data usage by about a quarter—which could cut some people’s data bills and extend battery life. Both Aljoudi and Murphy intend to make their apps cheap, but not free.

I think they’re going to make good money. Advertisers (and sites) have a problem coming their way. Here’s Purify at work:

link to this extract


The Verge’s web sucks » blog.lmorchard.com

Les Orchard tried examining The Verge’s desktop site, and found it linked him to 47 third-party trackers:

I feel like someone just set up the entire vendor hall from an awful tech conference in my living room. Seriously, could you folks just not pick one or two or ten? Did you hit every booth and say “Yeah, cool, sign us up!” I feel thoroughly spindled & folded & researched, here.

As a webdev at Mozilla, I’ve been in hour-long meetings where we’ve agonized over whether it’s copacetic to include just one little Google Analytics snippet without notifying users and updating the privacy policy. But, I know we’re crazy in our own very special ways.

In former lives, I’ve worked at ad agencies and digital marketing companies. I’m no stranger to conversations that revolve around partners & bizdev & analytics & media buys. I can only imagine things have intensified & evolved since I’ve been out of those trenches.

Still – and maybe this is the Mozilla brain-damage talking – I can’t imagine a sane conversation that resulted in The Verge extending an invitation to over 20 companies to set up shop on my computer with every page visit.

The reckoning is moving just that bit closer each day. Once a significant number of people start getting faster, better experiences from using adblockers (or tracker-blockers), they won’t care that the ads aren’t targeted. Newspaper and magazine ads didn’t use to follow you around the room, and they were quite a good business.
link to this extract


I got my music back. At least most of it » Loop Insight

Jim Dalrymple, after the debacle of last week:

So now I have the iTunes Match service that I pay for separately, and Apple Music, both of which use iCloud Music Library. There is really no way to get away from them if you want to use the latest and greatest from Apple.

I’ll admit, I’m still trying to get my head around how this works.

Some of the songs I own were incorrectly tagged as Apple Music, but that’s been fixed too, which means they show up correctly in iTunes. That is great news.

However, I’m still missing a couple of hundred songs. Apple’s theory is that I deleted them—that when I was trying to fix Apple Music, I mistakenly deleted my own files. While I concede that it is within the realm of possibility that I deleted my own files, it doesn’t make sense to me.

Apple is clearly struggling with Apple Music – a colossal effort launched in a huge number of territories – which is why my advice would be not to get worked up about precisely what seems to be working or not at present. And especially not to delete anything that you think you might own.
link to this extract


Ubuntu Phone review: years in the making, but still not consumer-ready » Engadget

Jamie Rigg:

I get the idea of Scopes [which are like Live Tiles in Windows], kind of. They are supposed to give the user a personal experience, remove their reliance on walled apps and bring content to the forefront. I just don’t think Scopes deliver, or maybe I’m just so used to the app-first experience that I’m having trouble adapting to the Scope way of doing things. And if that’s the case, then most people will be in the same boat. My main problem with Scopes is that I feel I’m being bombarded with content. If I want to check out upcoming concerts on an iOS/Android device, I’d load up the Songkick app. But when that’s not what I’m looking for, I don’t really want to see Songkick listings permanently displayed on my phone, like I’m being advertised to. You could argue the solution is to remove the Songkick feed from the Scopes it populates. But, if I was constantly adding and removing sources from Scopes when they are or aren’t relevant, I don’t see how that’s preferable to having dedicated apps that offer a better experience.

It seems like there’s just no way to create a new user interface at present, certainly on a mobile screen. The gigantic gravitational field of the app-driven iOS/Android system precludes it.

Also, this sounds like crap.
link to this extract


Toshiba’s woes show how PC sales slump is squeezing big tech firms » The Guardian

I wrote about the Others:

It is whispered among some analysts that only the preinstallation of third-party antivirus programs – which try to get users to sign up to subscriptions – keeps some PC makers afloat at all, owing to the fees they receive from antivirus software firms.

It was the PC business that triggered the current turmoil at the Japanese giant [Toshiba], after an internal auditor asked in late January to look at the accounts for the company’s laptop business. That eventually concluded with an examination by an external panel, whose 294-page report noted “inappropriate accounting” in various business segments, including those “relating to component transactions” in the PC business.

In a statement on 21 July it said that 111bn yen (£580m) of assets in the PC business in the past six financial years were “under consideration” for re-evaluation. That could affect its financial results, which will be finalised by 31 August. But even in its most recent quarterly report, before any restatement, Toshiba said that its PC business recorded restructuring costs of 46bn yen in the previous three quarters, and that otherwise it “would have recorded positive operating income over three consecutive quarters”.

46bn yen is $370m. Is Toshiba really saying it made an average operating profit of $123m per quarter in the PC business? That’s as much as Asus, which is one of the biggest makers. Seems unlikely.
link to this extract


Twitter is deleting stolen jokes on copyright grounds » The Verge

Dante D’Orazio:

some people just copy good tweets from other people and act like they came up with the 140-character witticism on their own. This has been going on since the beginning of Twitter.

It now appears Twitter is using its legal authority to crack down on these tweet-stealers. A number of tweets have been deleted on copyright grounds for apparently stealing a bad joke.

As first spotted by @PlagiarismBad, at least five separate tweets have been deleted by Twitter for copying this joke:

saw someone spill their high end juice cleanse all over the sidewalk and now I know god is on my side
— uh (@runolgarun) July 9, 2015
Olga Lexell, who, according to her Twitter bio, is a freelance writer in LA, appears to be the first person to publish the joke on Twitter. In a tweet posted this afternoon, she confirmed that she did file a request to have the tweets removed.

I simply explained to Twitter that as a freelance writer I make my living writing jokes (and I use some of my tweets to test out jokes in my other writing). I then explained that as such, the jokes are my intellectual property, and that the users in question did not have my permission to repost them without giving me credit.

She added that most of the accounts that were reusing her tweets without accreditation were “spam accounts that repost tons of other people’s jokes every day.” This also isn’t the first time Twitter has complied with a request like this: Lexell tells The Verge that she’s filed similar requests for other jokes. Twitter staffers typically remove the offending tweets “within a few days” without asking Lexell any follow-up questions.

Couldn’t she, you know, just not tweet them but try them on other people? Or try them from a protected account? This is quite weird.
link to this extract


Pakistan to shut down BlackBerry services by December for “security reasons” » Reuters

Syed Raza Hassan:

Pakistan, a nuclear-armed nation of 180 million people, is plagued by militancy, criminal gangs and drug traffickers.

“PTA has issued directions to local mobile phone operators to close BlackBerry Enterprise Services from Nov. 30 on security reasons,” an official with the Pakistan Telecommunications Authority said in a text message.

He asked not to be named due to the sensitivity of discussing communications and intelligence.

BlackBerry was not immediately available to comment.

A report released this week by British-based watchdog Privacy International said Pakistan’s powerful military intelligence agency, the Inter-Services Intelligence (ISI), was seeking to dramatically expand its ability to intercept communications.

BlackBerry encrypts data such as emails and its BlackBerry Messenger messages sent between a user’s phone and public networks, ensuring greater privacy for users but making life harder for police and intelligence agencies.

link to this extract


Fiat Chrysler recalls 1.4 million vehicles to defend against hacks » Bloomberg Business

Mark Clothier:

Fiat Chrysler Automobiles NV is recalling about 1.4 million cars and trucks equipped with radios that are vulnerable to hacking.

The company was already distributing software to insulate connected vehicles from illegal remote manipulation after Wired magazine published a story about software programmers who were able to take over a Jeep Cherokee being driven on a Missouri highway. Fiat Chrysler reiterated that it’s not aware of any real-world unauthorized remote hack into any of its vehicles.

It stressed that no defect was found and that it’s conducting the campaign out of “an abundance of caution.”

Fiat Chrysler said it has blocked unauthorized remote access to certain vehicles systems via an over-the-air update on Thursday.

link to this extract


Amazon and the “profitless business model” fallacy » Remains of the Day

Eugene Wei (who used to work at Amazon):

There are very few people in technology and business who are what I’d call apex predators. Jeff [Bezos] is one of them, the most patient and intelligent one I’ve met in my life. An apex predator doesn’t wake up one day and decide it is done hunting. Right now I envision only one throttle to Jeff’s ambitions and it is human mortality, but I would not be surprised if one day he announced he’d started another side project with Peter Thiel to work on a method of achieving immortality.

One popular thesis among Amazon profitability skeptics is that Amazon can’t “flip a switch” and become profitable. The most common guess as to how Amazon flips the switch is that it will wait until it is the last retailer standing and then raise prices across the board, so Amazon skeptics argue against that narrative possibility.

But “flipping a switch” is the wrong analogy because Amazon’s core business model does generate a profit with most every transaction at its current price level.

In that light, it’s wrong to look at the AWS “profits” as a proportion of revenue and say “wow”. The profit number is meaningless. Amazon can make any part of the business look as profitable or unprofitable as it likes.
link to this extract


The future of Apple Watch will be more like the iPod’s than the iPhone’s » Beyond Devices

Aaron Miller (in a guest post on Jan Dawson’s site):

First, and most importantly, the Apple Watch is an ecosystem product. Right now, the Watch only works as an extension of the iPhone. Its upper boundary is the total number of iPhones in the world.

This makes the Watch much more like the iPod than the iPhone. From the time the iPod first launched, it was a product tied to a computer, first to Macs then eventually to Windows computers as well. (Remember the Digital Hub strategy?) Just as the iPod existed to enhance the Personal Computer + iTunes ecosystem, the Watch exists to enhance the iPhone ecosystem. The iPhone, even if tied to iTunes early on, was never merely an ecosystem enhancement—nor designed to be one, like the iPod or Apple Watch have been.

Naturally, we expect the Watch’s reliance on iPhones to change over time. LTE and GPS seem like inevitable Apple Watch additions, for example, as does a Watch-native App Store. With true third-party apps coming soon, reliance on the iPhone will diminish even more. But there’s one limitation that may always tie Apple Watches to iPhones: the screen…

…the Apple Watch category is not just smartwatches. The correct category is wearables, and wearables right now, at the birth of the Apple Watch, are very similar to the early MP3-player market. Some are huge and multi-functional. Some are svelte and limited. Some are banking on unique features trying to find a niche.

Wonder what other wearables Apple might have in mind. What’s the iPod shuffle version of a Watch?
link to this extract


Start up: drone questions, Baidu barred in AI comp, why Apple shunned HERE, and more


This is what it looks like when you’re upset, Google. Photo by donnierayjones on Flickr.

A selection of 7 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

The UX of Commercial Drones » UX Magazine

Dan Saffer:

Let’s examine the customer experience as demonstrated by Amazon: The drone flies in and lands on the back patio. The customer leaves the house. The drone releases the package and flies away. The customer grabs the package and heads back inside. This is all well and good, but a lot of important detail still needs to be addressed. For starters, how does the customer know when the drone is arriving? People aren’t going to want their packages sitting outside unattended, especially in inclement weather (assuming drones will even be able to fly when it’s raining or snowing). And people won’t want to sit around looking out their window for half an hour. But what might work is something like what the car service Uber does: showing you via an app where your drone is and how long until it arrives, as well as alerting you via SMS when it does arrive. This would provide a level of assurance, especially at the onset when the idea of a drone carrying an emergency last-minute birthday gift will seem the height of novelty. When the drone does appear, it’s going to be really tempting to race out and grab the package, especially for kids—and perhaps for dogs and excitable adults as well. One problem: between the person and the package are several spinning, knife-like blades that form the rotors of the drone. Being accidentally hit in the face by one would be a great way to lose an eye or obtain a nasty cut.

“We included plasters in case you get hurt!”


Computer scientists are astir after Baidu team is barred from AI competition » NYTimes.com

John Markoff:

The competition, which is known as the “Large Scale Visual Recognition Challenge,” is organized annually by computer scientists at Stanford University, the University of North Carolina at Chapel Hill and the University of Michigan. It requires that computer systems created by the teams classify the objects in a set of digital images into 1,000 different categories. The rules of the contest permit each team to run test versions of their programs twice weekly ahead of a final submission as they train their programs to “learn” what they are seeing. However, on Tuesday, the contest organizers posted a public statement noting that between November and May 30, different accounts had been used by the Baidu team to submit more than 200 times to the contest server, “far exceeding the specified limit of two submissions per week.”

Previously reported here, before the multiple entries were spotted. Baidu’s team calls their multiple entries “a mistake”.


The new Google Photos app is disturbingly good at data-mining your photos » Fusion

Daniela Hernandez:

What’s particularly incredible is the facial recognition. The app sees individuals in photos even if they are barely in the picture, far in the background, or featured in a photo within a photo. When I did a search for my adult sister’s face, it recognized her in a photo I took of a 20-year-old elementary school picture of her. When I searched for my father’s face, it included a photo I took of a decorative tile-wall in Mexico. I thought it had messed up, because I didn’t see any people in the photo, but when I looked closely, there was a tiny version of my dad at the bottom. Facial recognition has gotten very powerful. Google also seems to know how to flatter its users. When I typed in “skinny,” the search unearthed pictures of me, friends, my sister and my mother, as if it was trying to compliment us. But when I searched for other adjectives, particularly negative ones — fat, sad, upset, angry — Google Photos came up empty. (Some of my colleagues got similar results.) The technology to help computers decipher emotions is out there already, so there’s no technical reason why Google isn’t turning up results for those searches. It gave us results for “love,” but not for “hate.” Whether it’s that we don’t take photos of ugly things, or that Google is shielding us, is something we’d really like to ask the search giant.

You could pick up the phone and ask them…


Eric Schmidt on why Google won’t fail » Business Insider

Jillian D’Onfro:

Shareholders understand Google’s search and ad business, [Schmidt said at the AGM], but they don’t necessarily understand the other projects that the company invests in, like self-driving cars or smart contact lenses. On past earnings calls, analysts and investors have sounded impatient when questioning how those businesses are going to ultimately pay off. But Schmidt assured shareholders Wednesday that ambitious goals like cutting down on car crashes or measuring a diabetic’s blood sugar through their tears are the kinds of things that will ultimately make Google a long-lasting, successful company. “Most companies ultimately fail because they do one thing very well but they don’t think of the next thing, they don’t broaden their mission, they don’t challenge themselves, they don’t continually build on that platform in one way or another,” he says. “They become incrementalists. And Google is very committed to not doing that. We understand the technological change is essentially revolutionary, not evolutionary.”

Are there any lessons from technology companies that have lasted more than a century, such as Nintendo, IBM and Nokia?


Here’s why Apple didn’t want to buy Nokia’s mapping unit HERE » Forbes

Parmy Olson:

Apple appears intent on fixing the problems that cropped up from relying on third-party map providers. One of the reasons Apple Maps was so buggy from when it was launched in June 2012 is the fact that its data percolated in from multiple sources like TomTom, Acxiom, Waze and Yelp By building its own geography dataset, Apple can pare down its reliance on sources like TomTom’s TeleAtlas. Apple’s likely vision is that years from now, we’ll have forgotten about how bad Apple Maps was, because Apple will have taken complete control of its mapping infrastructure and made it watertight.


There’s still plenty of money in dumb phones » Quartz

Leo Mirani:

there’s little doubt that dumb phones and feature phones are a shrinking market. Between the first quarter of 2013 and the first quarter of 2014, the market for non-smartphones shrunk by a 14%, according to CCS Insight (pdf), a research firm. This year, some 590 million non-smartphones will be sold. By 2019, that number will shrink to 350m. But 350m phones in one calendar year is still a lot of phones. And it is, as Microsoft’s Pekka Haverinen of Microsoft’s feature phone division tells Quartz, a predictable market with high volumes and a high market share for Microsoft. It’s not just device-makers who stand to profit from cheap, basic phones. Ericsson reckons (pdf) that by 2020, there will 9.2bn mobile subscriptions, of which 1.4bn will be non-3G subscriptions. This huge market is hungry for services.

Well, sorta. Microsoft’s featurephone segment is shrinking really rapidly; this is a market which is being eaten up by cheap Chinese players for whom, as they say, “your [profit] margin is my opportunity”.


Twitter just killed Politwoops » Gawker

JK Trotter:

A Twitter spokesperson just provided the following statement to Gawker regarding the apparent suspension of Politwoops’ access to Twitter’s developer API, which enabled the Sunlight Foundation-funded site to track tweets deleted by hundreds of politicians. Summarized: Politwoops is no more.

Earlier today we spoke to the Sunlight Foundation, to tell them we will not restore Twitter API access for their Politwoops site. We strongly support Sunlight’s mission of increasing transparency in politics and using civic tech and open data to hold government accountable to constituents, but preserving deleted Tweets violates our developer agreement. Honoring the expectation of user privacy for all accounts is a priority for us, whether the user is anonymous or a member of Congress.

The post also says that Twitter was considering a “quiet reversal” but found itself snookered on the question of “why them and not others”. But if someone tweets something publicly, haven’t they yielded their expectation of “privacy”? In the print days, the UK Ministry of Defence could demand back documents about cruise missile sitings from The Guardian on the basis of copyright. That seems to be what Twitter is imposing here.


Start up: Lenovo, Superfish and its implications; identifying Jackson Pollocks, tech v fashion, and more


Currently unfashionable inside Lenovo “consumer laptops”. Photo by sinosplice on Flickr.

A selection of 8 links for you. Makes a lovely salad when added to salad. I’m charlesarthur on Twitter. Observations and links welcome.

How Lenovo’s Superfish ‘malware’ works and what you can do to kill it » Forbes

Thomas Fox-Brewster:

Lenovo might have made one of the biggest mistakes in its history. By pre-installing software called ‘Superfish ’ to get ads on screens it’s peeved the entire privacy community, which has been aghast this morning on Twitter. There are serious security concerns about Lenovo’s move too as attackers could take Superfish and use it to ensnare some unwitting web users.

Here’s what you need to know about Superfish and what you can do to stop it chucking irksome ads on your browser and leaving you open to hackers.

This is probably the most comprehensive piece on the problems around this, though Lenovo suggests it has only installed it since September 2014. On Thursday night it issued instructions on how to remove it. And here’s a site you can use to check whether it’s affecting you. Read on for more of the implications.


AVAST 2015 Release Candidate 1 (10.0.2202) » Avast forums

Avast is a well-known antivirus program:

Features already introduced in previous AVAST 2015 betas:

• GrimeFighter Free
GrimeFighter will offer free cleaning of junk files and tuning of system settings. These tasks are performed by our Zilch and Torque minions. Other minion functions remain as paid-for features.

• HTTPS scanning
Now, we are able to detect and decrypt TLS/SSL protected traffic in our Web-content filtering component. We are using our own generated certificates that are added into the Root Certificate store in Windows and also into major browsers. This feature will protect you against viruses coming through HTTPs traffic as well as adding compatibility for SPDY+HTTPS/ HTTP 2.0 traffic. You can tune/disable this feature in the settings section.

That “https scanning” is exactly the thing that people are worried about with the Lenovo-installed Superfish. The reason why it’s used is because a lot of malware uses https: to connect to command-and-control servers. Superfish used it because connections to Google are https: and it wanted to insert its own adverts into the Google results stream.

Somehow, the Avast reason seems much preferable. (Link via Jon Honeyball.)


Extracting the SuperFish certificate » Errata Security

Robert Graham:

I extracted the certificate from the SuperFish adware and cracked the password (“komodia”) that encrypted it. I discuss how down below. The consequence is that I can intercept the encrypted communications of SuperFish’s victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot. Note: this is probably trafficking in illegal access devices under the proposed revisions to the CFAA, so get it now before they change the law.

I used simple reversing to find the certificate. As reported by others, program is packed and self-encrypted (like typical adware/malware). The proper way to reverse engineer this is to run the software in a debugger (or IDApro), setting break point right after it decrypts itself. The goal is to set the right break point before it actually infects your machine – reversers have been known to infect themselves this way.

This is one of the concerning things about Lenovo’s actions: vulnerabilities like this.


Lenovo CTO: we’re working to wipe Superfish app off PCs » WSJ Digits blog

Shira Ovide:

Lenovo is working quickly to wipe all traces of an app it had pre-installed on some consumer laptops, responding to security researchers’ warnings that the app could give attackers a way to steal people’s encrypted Web data or online passwords.

In an interview Thursday, Lenovo’s chief technology officer, Peter Hortensius, acknowledged that “we didn’t do enough” due diligence before installing Superfish, but that the company doesn’t believe laptop owners were harmed by the app. He said the company realized it needs to do more to respond to consumers’ concerns.

Lenovo, the world’s biggest seller of PCs, is working to write software that will delete any data from the Superfish software off laptops on which it had been installed. Hortensius also said the company should have done more due diligence on the security of the Superfish shopping-search app, which was installed from September to December on Lenovo consumer laptops.

Choice quote from Hortensius: “we agree that this was not something that we want to have on the system”. So how did it get there?


Report: 2014 was a bad year for lyrics sites in Google » Search Engine Land

Barry Schmwartz:

Only one lyrics site saw an increase in visibility from Google’s search results, that is azlyrics.com with a 24% lift.

We saw at the end of December 2013, Rap Genius was penalized for link schemes but then saw themselves back in the search results ten days later. Maybe that manual action had Google’s engineers take a deeper look at the lyrics niche.

One thing, you’d probably see a deeper impact on these lyrics sites in 2015. Google in late December 2014 began showing full lyrics in the search results, which can directly impact the traffic and visibility of these lyrics sites in the Google search results.


How Twitter CEO Dick Costolo keeps his focus » Inc.com

Jeff Bercovici:

A typical week for Costolo involves 12 to 15 standing meetings, so he has a few rules for efficiency’s sake. First, no cancelling. Freeing up that time may be tempting, but it’s how small problems become big ones. “I’m the connective tissue between all these groups,” he says. “It’s important for me to have context for the issues and challenges everyone’s dealing with.”

Second, no sidebars, ever. Nothing irks Costolo more than someone approaching him in private and saying, “I didn’t want to bring this up in front of everyone, but…” That rewards politics over process, he says: “Everyone on my team knows that that’s not a valid way to start a conversation with me.”

Finally, no PowerPoint. Meetings are for communicating, not wasting time on pretty slides. Instead, Costolo asks managers to type briefings. “If that sounds straight out of the Jeff Bezos playbook, it’s because it is,” he says. “I totally agree with that.”

These seem really good ideas. And there are more; the article isn’t so much about what happens, but how Costolo functions.


What the tech world doesn’t understand about fashion » Racked

Leslie Price:

at the biggest fashion houses in Europe, there is a general disdain for the connected future that the tech world fetishizes.

“We don’t like [e-commerce]. I don’t care,” Miuccia Prada said in 2013. “We think that, for luxury, it’s not right. Personally, I’m not interested.” As Bloomberg details, this is the case for many luxury brands. Some fashion OGs, like Valentino, don’t even use computers. Anna Wintour famously carries a flip phone. “The problem with technology is it’s a bit cold. It’s a bit sharp,” said Carine Roitfeld, CR Fashion Book EIC and former French Vogue chief.

This aversion actually makes perfect sense. Fashion is, by its very nature, exclusive. It’s about creating an identity, a brand, that is so cool that people will spend thousands and thousands of dollars to acquire a tiny piece of it. If you make that identity widely available, you risk diluting it. This delicate balance is something that the oldest fashion stalwarts have spent a hundred or more years perfecting.

Terrific piece which neatly illustrates (with examples) the gulf between tech and fashion: quite a lot of it is in the language that attaches to things.


A computer can tell real Jackson Pollocks from fakes » Smithsonian

Laura Clark:

according to many connoisseurs, critics and fakers don’t give the painter enough credit. There are indeed complexities to Pollock’s drip art that show it to be the genuine article. And now there’s a computer program helping to make a science out of the deciphering.

The software uses “computational methods to characterize the low-level numerical differences between original Pollock drip paintings and drip paintings done by others attempting to mimic this signature style,” says Inderscience Publishers. You give it a scan of the possible Pollock, and the program goes to work extracting 4024 numerical image descriptors that the human eye would have trouble deciphering as accurately.

I guess we have to add “art authenticator” to the list of white-collar jobs that computers will wipe out in time.


Start up: Apple Pay in the UK?, 10m Chromecasts, the hacker whose cat betrayed him, and more


OK, definitely seen harder than that. Photo by health_bar on Flickr.

A selection of 9 links for you. Do not plant in acidic soil. I’m charlesarthur on Twitter. Observations and links welcome.

Due to me screwing up, the headline yesterday about finding Waldo referred to an article that’s in today’s list. Hope you didn’t spend too long looking for it.

Is there a battle looming in the UK between Apple Pay and Zapp? » Mobile Payments Today

Will Hernandez:

While Apple has yet to reveal a hard date for Apple Pay’s launch in the UK, pundits speculate that it could happen in April. This also happens to be about the same time Zapp is supposed to make its debut in the U.K.

Zapp relies on banks building it into their mobile apps, although as those banks own Zapp’s parent company, this shouldn’t be too much of a problem. The system is intended to provide real-time payments between consumers and merchants — both online and at the point of sale — without the need for a digital wallet. Zapp will generate digital tokens that will hide customer bank account details from merchants, and it is intended to work with different technologies such as NFC, Bluetooth, QR codes and PIN-entry point-of-sale terminals.

Zapp, however, has faced launch delays since at least the third quarter of 2014. Meantime, it announced in October retail partnerships that will go into effect this year. Asda, Sainsbury’s, House of Fraser and Shop Direct are among some of the major High Street retailers that will support Zapp. Earlier in the year, HSBC, first direct, Nationwide, Santander and Metro Bank announced their support for the system.

I’d never heard of Zapp either. Apparently it’s “a mobile payments system from Vocalink, which created the Faster Payments Service and is owned by all the major UK banks.”

Zapp has lots of benefits (cost, data sharing with retailers) and so could have a UK advantage – this is a good article for getting an idea of the competitive landscape in the UK as Apple prepares to land.


Android Wear’s newest trick, playing a full-length movie » Android Community

John Hoff:

Apparently, your Android Wear smartwatch can be taught to do cooler tricks – cooler than, say, playing Minecraft or Doom, or even running Windows 95. Once again, smart hacker Corbin Davenport has shown us that there’s a lot of stuff – not necessarily important world-changing stuff – just a lot of stuff that can be done to your Android Wear smartwatch when you have a lot of time on your hands.

“You haven’t watched a movie—until you’ve watched it on your watch,” Davenport proudly proclaims of his newest wild idea, which he shows via YouTube. The demo shows Davenport playing Star Trek: Into Darkness on his Android Wear, which is probably a delightful coincidence as he shows us that Android Wear devices can really go where no smartwatch has gone before (excuse the pun, we couldn’t help it).

Davenport has done some weird, weird stuff there.


Big three mobile phone markets beyond China » Counterpoint Technology Market Research

According to the latest research from [the] Market Monitor program for Q4 2014 (Oct-Dec), total mobile phone shipments for India, Indonesia and Bangladesh stood at 89m as smartphone demand skyrocketed and the total smartphone shipments contributed to more than a third of all mobile phones shipped during the quarter. These three markets combined offers an opportunity for mobile phone industry players looking to grow beyond the saturating China mobile phone market.

“Smartphone growth in these regions touches almost all the price segments with regional brands being prominent in the entry level smartphone segment. Apart from this we have seen Chinese vendors entering these geographies for the first time in CY 2014 and enjoyed a significant success rate. However it will be important to keep an eye on  Online only players on how they capture the smartphone growth in rural areas in these regions” says Tina Lu Sr. Consultant at Counterpoint research

Mobile phones, not just smartphones – note. By comparison, Japan bought about 25.7m smartphones in 2014 and that is expected to rise to 27m in 2015. (About half of that total would be iPhones, judging by Kantar’s figure.)


The utterly crazy story of the death threat hacker » We Live Security

Graham Cluley on a Japanese hacker who caused lots of problems via trojan-infected PCs in Japan in 2012:

the police arrested four separate people, and allegedly managed to “extract” confessions from some of those whose computers had posted death threats to a popular messageboard.

However, the confessions were clearly unreliable (one wonders how the confessors were “encouraged” to make them), as the suspects had in fact had their computers infected by the hacker’s malware, which had posted the death threats without their knowing.

It became clear to the police that they had made a colossal blunder, when the hacker – who went by the alias Oni Koroshi (Demon Killer) – continued to send taunting emails to the police force and local newspapers.

You can just imagine how embarrassing that must have been for the Japanese police, in what was becoming a high profile case.

Er.. yeah. But then it gets utterly weird, when the hacker sends a series of clues to the police, and it all ends up with a showdown involving a cat, an island and a sikrit chip worn on the cat. If Ian Fleming were alive today and writing this stuff you’d call it too far-fetched.

(Also, stupid hacker. Should have stopped when the people confessed.)


License plate scanners also taking photos of drivers and passengers » American Civil Liberties Union

The Drug Enforcement Agency is using its license plate reader program not only to track drivers’ locations, but also to photograph these drivers and their passengers, according to newly disclosed records obtained by the ACLU via a Freedom of Information Act request.

One internal 2009 DEA communication stated clearly that the license plate program can provide “the requester” with images that “may include vehicle license plate numbers (front and/or rear), photos of visible vehicle occupants [redacted] and a front and rear overall view of the vehicle.” Clearly showing that occupant photos are not an occasional, accidental byproduct of the technology, but one that is intentionally being cultivated, a 2011 email states that the DEA’s system has the ability to store “up to 10 photos per vehicle transaction including 4 occupant photos.”…

…Some law enforcement agencies that employ ALPRs recognize that the technology should not be used to capture photos of vehicle occupants. We obtained an ALPR policy from Tiburon, California that speaks to our privacy concerns. The policy states that “cameras will be directed only to capture the rear of vehicles and not into any place where a ‘reasonable expectation of privacy’ might exist.”

Tricky argument. You can see that it would be useful for law enforcement to know who’s driving a car. And do you have “a reasonable expectation of privacy” when you’re driving a car on a public road where people can take pictures of you and your car – as happens here?

(By the way, in the UK we call it an “Automatic Number Plate Reader”. Even though it now has letters and numbers.)


Twitter cuts off employee access to its metrics » Re/code

Kurt Wagner:

There’s no metric more important to the social network than the number of people that use the service — more specifically, its monthly active users, or MAUs. Recent events inside the company show how sensitive Twitter’s top brass can be about this number, which also partly explains the company’s push to use other metrics to showcase Twitter’s reach.

The company used to grant all employees access to its MAU figure through an internal intranet, but that access was revoked a few weeks ago, according to multiple sources familiar with change. Now, the MAU metric is only available on a need-to-know basis.

There has been so much noise ahead of Twitter’s results (which came out after I added this) that one has to feel there’s something weird going on there. A culture clash? Internal political struggle? Whatever, this will be the year it plays out.


Xiaomi has a San Francisco press event scheduled for 12 February… but it’s still not entering the US market » Android Police

Any tech journalist worth his silicon would probably assume that Xiaomi intends to finally push into the US market to take on the likes of Apple and Samsung, possibly even with new mobile hardware. But apparently that’s not the case. We specifically asked Xiaomi’s PR representative about the possibility of a North American expansion, and this is the response that we were given:

We can also confirm that Xiaomi will not be launching in the US or entering the US market this time, but this is an opportunity to get to know the company and leadership a bit more.​

Any tech journalist worth her or his silicon would know that Xiaomi would face insuperable IP issues in trying to enter the US market, and also that it’s simply the wrong sort of market to try to get in to just now for Xiaomi.

At least they called Xiaomi to have their castles in the air shot down.


Google sold 10 million Chromecasts last year » Korea Times

Google has sold about 10 million Chromecast, a streaming-media dongle for high-definition (HD) TVs, globally in 2014, Google Korea said Wednesday.

Chromecast, which made its debut in July 2013, now supports more than 350 apps and services, including YouTube, Tving and Hoppin in Korea.

It started selling the device in Korea in May 2014, the first marketing debut in the Asian market.

This number sounds entirely feasible; it also sounds like the sort of thing that Google Korea might blurt out, when its corporate headquarters has only ever said “millions”.

Ten million is pretty impressive. Now, of course, we can divide all the numbers it has put out to get average use, such as its “used for one billion ‘casts’” stat in the January earnings call: that works out to an average of about 100 “casts” per device over the whole of 2014 (but of course not all were in use all through 2014).

So probably double that 100 figure (or even treble it) for those bought early in the year; halve it, or one-third, for those bought later. Sound good?


Here’s Waldo: computing the optimal search strategy for finding Waldo » Randal S. Olson

I decided to approach this problem as a traveling salesman problem: We need to check every possible location that Waldo could be at while taking as little time as possible. That means we need to cover as much ground as possible without any backtracking.

In computer terms, that means we’re making a list of all 68 points that Waldo could be at, then sorting them based on the order that we’re going to visit them. So now we just need to try every possible arrangement of the points and find the one with the shortest distance traveled. Easy, right? Wrong.

Those 68 points can be arranged in ~2.48 x 1096 possible ways. To provide some context, that’s more possible arrangements than the number of atoms in the universe. That’s so many possible arrangements that even if finding Waldo became an international priority and the world banded together to dedicate the 8.25 million computing cores from the world’s 10 largest supercomputers to the job, it would still take ~9.53 x 1077 years — about 6.35 x 1067x longer than the universe has existed — to exhaustively evaluate all possible combinations. (Generously assuming that each core could perform 10,000 evaluations per second.) In other words: if we don’t have a smarter solution, Waldo is as gone as Carmen Sandiego.

I admit I was disappointed that he didn’t do it by image recognition. And anyhow, his solution (probable regions) doesn’t help you at all with Wizard Whitebeard, Wenda, Wilma, Odlaw, Woof or the Waldo Watchers.


Start up: web design for 2015, Nexus 6’s long slipway, hacking journalism under threat?, Zoë Keating v YouTube redux, and more


In 2012 the Nexus 6 designers were expecting to deal with these to unlock the phone. Photo by kevin dooley on Flickr.

A selection of 7 links for you. Refrigerate before use. I’m charlesarthur on Twitter. Observations and links welcome.

The challenge for web designers in 2015 (or how to cheat at the future) » Memespring

Richard Pope:

The 7 years of the Apple App Store and the android equivalents have, in effect, been mass, micro funded experiments in UI design for small, touch sensitive devices with lots of sensors and outputs. They have generated winning patterns like:

Checkboxes replaced by switches
Check-ins
Edit without save button
Everything can be contextual, any bit of UI can disappear between pages
Everything has it’s own settings page
Floating buttons
Keeping primary navigation off canvas (hidden behind the page)
Minimal or zero page header (the context an old school page header / nav gives seems less important when you are holding the app in your hand.)
Multiple, focused apps for the same service
Offline by default
Overscroll to refresh
Reserving dropdown menus for actions on the current context
Search scoped to their current context (the app)
These are patterns that people use day in day out on facebook, Gmail and WhatsApp. These are the new normal, what people expect.

But with a few notable exceptions – eg the mobile versions of Wikipedia and Forecast – these are not patterns that are making their way on to the web.

So, here is the challenge for anyone designing and building for the web in 2015.

He also points out what you can do with HTML5 browsers now too. Worth considering.


Dennis Woodside on Motorola, Google and the future of Dropbox » Telegraph

Matt Warman spoke to Woodside, formerly chief executive at Motorola, and now chief operating officer at Dropbox:

the 6-inch Nexus 6, he can now admit, was stymied by just one of those big players [which he previously criticised for keeping prices high]. A dimple on the back that helps users hold the device should, in fact, have been rather more sophisticated. “The secret behind that is that it was supposed to be fingerprint recognition, and Apple bought the best supplier. So the second best supplier was the only one available to everyone else in the industry and they weren’t there yet,” says Woodside. Nonetheless, he adds, the addition of fingerprint recognition, “wouldn’t have made that big a difference.”

Here’s what’s interesting about this. Apple bought Authentec in mid-2012 (for $356m). The Nexus 6 was released in September 2014. Motorola’s development of that smartphone was so far in train that it didn’t have time to change the design of the back fascia from dimpled to flat.

Smartphones take two or more years to design and implement. Consider that: what comes out now was being worked on in early 2013.

Kudos to Woodside for admitting fingerprint recognition wouldn’t have made much difference. As it wasn’t being tied into a payment system, it would have been a gimmick – and those don’t add lasting value.


We should all step back from security journalism » Medium

Quinn Norton:

Part of Barrett Brown’s 63 month sentence, issued yesterday, is a 12 month sentence for a count of Accessory After the Fact, of the crime of hacking Stratfor. This sentence was enhanced by Brown’s posting a link in chat and possessing credit card data. This, and a broad pattern of misunderstanding and criminalizing normal behavior online, has lead me to feel that the situation for journalists and security researchers is murky and dangerous.

I am stepping back from reporting on hacking/databreach stories, and restricting my assistance to other journalists to advice. (But please, journalists, absolutely feel free to ask me for advice!) I can’t look at the specific data another journalist has, and I can’t pass it along to a security expert, without feeling like there’s risk to the journalists I work with, the security experts, and myself.

Brown’s sentence wasn’t quite as simple as “linking to stolen stuff”, but Norton’s concern is understandable – especially given the tendency of US law enforcement to go like a runaway train after hackers, and those defined as hackers, of all stripes.


Zoe Keating’s experience shows us why YouTube’s attitudes to its creators must change » Music Industry Blog

Mark Mulligan weighs in on the Zoë Keating row linked here on Monday:

it is the Content ID clause that is most nefarious. Content UD is not an added value service YouTube provides to content owners, it is the obligation of a responsible partner designed to help content creators protect their intellectual property. YouTube implemented Content ID in response to rights owners, labels in particular, who were unhappy about their content being uploaded by users without their permission. YouTube’s willingness to use Content ID as a contractual lever betrays a blatant disregard for copyright.

Ben Thompson is much more straightforward: on Stratechery.com he analyses Keating’s position, and suggests – for her particular situation, as a niche player seeking the most eager fans – that she should tell YouTube to take a hike. Especially when you look at her income breakdown: 60,000 tracks (roughly) sold on iTunes generated $38,195, while 1.9m YouTube views (mostly of her music on other peoples’ videos) earned $1,248.

Would the iTunes sales have happened without the YouTube views? Quite possibly not – but using ContentID as a lever, as Mulligan says, is to aggressively deny her copyright.


Digital music sales on iTunes and beyond are now fading as fast as CDs. – The Atlantic

Derek Thompson has some shudder-making figures:

how about the hits? The top 1% of bands and solo artists now earn about 80% of all revenue from recorded music, as I wrote in “The Shazam Effect.”

But the market for streamed music is not so concentrated. The ten most-popular songs accounted for just shy of 2% of all streams in 2013 and 2014. That sounds crazy low. But there are 35m songs on Spotify and many more remixes and covers on SoundCloud and YouTube, and one in every 50 or 60 online plays is going to a top-ten song. With the entire universe of music available on virtual jukeboxes, the typical 3.5-hour listening session still includes at least one song selected from a top-ten playlist that accounts for .00003% of that universe. The long tail of digital music is the longest of tails. Still, there is a fat head at the front.


China buying more iPhones than US » FT.com

Analysts at UBS estimate that China accounted for 36% of iPhone shipments in the most recent quarter, compared with 24% for the US. During the same period last year, 29% of units were sold in the US and 22% were in China, UBS said.

Predictable enough, given the size of China, and the fact that the US is essentially saturated. The fact that two markets probably account for 60% of all iPhone shipments – around 36m phones in the quarter – is perhaps a concern for Apple. It’s much the same for Samsung: losing its lead in China has hurt it and left the US as its key market.

However, this rather gives the lie to those stories from September which said that Apple was washed up in China when smugglers had to cut prices of the iPhone 6 – ignoring the fact that the devices were going to go on sale officially in a few weeks. Nope, then the problem was that

Four years ago, the iPhone 4 was a status symbol, with the black market booming before the product was officially introduced. Today, the iPhone is simply one option among many, as local companies like Xiaomi and Meizu Technology rival Apple in terms of coolness while charging less than half the price.


Demographics of key social networking platforms » Pew Research Center’s Internet & American Life Project

Tons of demographic data (including age, ethnicity, gender, education, income and location) about the online over-18s in the US:
• 71% use Facebook (more women than men, strong in 18-29);
• 23% use Twitter (men strongly growing, skews towards degree-qualified);
• 26% use Instagram (53% of 18-29s; also strong among Hispanics and African-Americans);
• 28% use Pinterest (up from 21% in August 2013; 3:1 women:men, strongly skewed to white)
• 28% use LinkedIn, strongly up among women since 2013, but now equal across sexes; skews strongly to university education

The whole study is fascinating: Facebook growth is slowing down, but it’s still “home base”, and used most daily.


Start up: Samsung ChatON going off, USB apps for iPad, the ‘uncanny valley’ for algorithms, Sony hack history, and more


Bitcoin mining: significantly lower health and safety risk than other forms.

A selection of 10 links for you. Wipe off excess. I’m charlesarthur on Twitter. Observations and links welcome.

Apple, is USB allowed now? >> Medium

Matt Ronge, pointing to Duet Display, which lets you use an iPad (via Lightning) as an extra screen for a Mac running 10.9 or better:

For the past year, we’ve been working on an app (launching early 2015) that turns your iPad into a graphic tablet for your Mac (like a Wacom tablet). Our app at its core also streams video content from the Mac to the iPad, so we were very interested in USB connectivity early on in our project.

We knew that using USB instead of Wifi was a decision we had to make early on, as it would completely change our direction of development. USB offers a reliable, low latency connection which is 100x better than any wireless technology (especially with Yosemite experiencing serious Wifi reliability issues).

We were also very hesitant to build a business around a decision Apple may change on a whim. So we submitted an app to test the waters, would Apple allow an app that requires USB? An Apple representative called us and informed us USB connectivity was not allowed.

Duet Display looks like it could be fun, though one usually wants a bigger display – but if you had an 11in Macbook Air, a full-size iPad would almost double your screen size, and improve the resolution a lot.


Our tactics for Gamergate are outdated >> Space Channel 6

Brianna Wu:

For me, personally, I intend to keep lessening the amount I’m posting and writing about Gamergate. Everyone knows they are very sexist, very unhealthy individuals. Thanks to my Patreon, GSX’s full time staffer will document this behavior for law enforcement leaving me free to speak out for change in the industry and make inclusive games.

My suggestion to people rightly outraged about this movement, is to ask yourself what you currently want to accomplish. It’s my suggestion that it would be most helpful to shift the conversation back to representation in the industry. I think the gains in raising awareness of Gamergate have diminished, while the threat of giving the lunatic fringe the attention they desire has stayed the same.

To be blunt, I’m not sure endlessly talking about Gamergate does anything anymore.

I’m not sure it did past the second month. Idiots enjoy being idiots, and won’t be dissuaded from that track.

Topsy suggests a gradual dimunition in the number of tweets on this topic from 50,000 to 20,000 over the past month (and bear in mind that the obsessives tweet many, many times per day).


BuildZoom office burglary – $5000 reward – update!! >> BuildZoom

David Petersen of BuildZoom, from which equipment was stolen:

After our story was covered on ABC 7 News, we were contacted by a nearby startup that was burglarized on July 6th and July 13th. Comparing footage, it’s clear that the same person broke into both offices.

Update 2: It appears that this woman is breaking into SF startups with a Doorking / DKS code entry system. She has obtained a master key and is able to enter any office with this system.

Update 3: We believe we have identified the burglar. It’s a local San Francisco woman who has been convicted of similar crimes in the past. An acquaintance of hers emailed with photographs and additional information. It certainly looks like her.

Someone with a master key for office doors in SF? That’s a problem.


Facebook’s popularity among teens dips again >> Bloomberg

A report yesterday by Frank N. Magid Associates Inc. found that the portion of 13- to 17-year-old social-media users in the U.S. on Facebook slipped to 88% this year from 94% in 2013 and 95% in 2012. In the same period, Twitter and messaging applications rose in popularity in that age group, the study showed.

The Menlo Park, California-based company first warned a year ago that teens weren’t using its website as often as before. Facebook stopped discussing teen usage on its earnings calls after last year’s disclosure alarmed investors. While the issue was all but forgotten as the company’s advertising revenue reached new highs, it’s a bigger concern now, according to Tero Kuittinen, a managing director at Magid in New York.

“You look at Facebook and you say, ‘Wow, something really changed in 2014,’” Kuittinen said. “If kids are starting to use so much of their daily time on messaging apps, surely it’s going to hurt somebody.”

Among 13- to 17 year-olds, Twitter usage climbed 2 percentage points to 48%, according to the report. While more people use Facebook and its messaging app than any competitor, its user base tends to be older, with 55% of Facebook Messenger users being 37 or younger. By the same measure, 86% of Snapchat Inc.’s users and 83% of Kik Interactive Inc.’s users are under 37.

Seems reasonable to think that messaging apps are pulling teens away from Facebook.


2015: the year we get creeped out by algorithms >> Nieman Journalism Lab

Zeynep Tufekci:

It turns out computers have a built-in “uncanny valley” (that creepy feeling android robots generate when they kind of look human). Just like we don’t want robots too human-shaped — we want them to know their place — it turns out we aren’t too happy when our computers go from “smart” (as in automating things and connecting us to each other or information) to “smart” (as in “let me make that decision for you”).

Algorithmic judgment is the uncanny valley of computing.

Algorithms (basically computer programs, but here I’m talking about the complex subset that is being used to calculate results of some consequence, which then shape our experience) have become more visible in 2014, and it turns out we’re creeped out.

Tufekci is super-smart, and always ahead of the curve.


htmlwidgets: JavaScript data visualization for R >> RStudio Blog

Today we’re excited to announce htmlwidgets, a new framework that brings the best of JavaScript data visualization libraries to R. There are already several packages that take advantage of the framework (leaflet, dygraphs, networkD3, DataTables, and rthreejs) with hopefully many more to come.

An htmlwidget works just like an R plot except it produces an interactive web visualization. A line or two of R code is all it takes to produce a D3 graphic or Leaflet map. Widgets can be used at the R console as well as embedded in R Markdown reports and Shiny web applications.

This looks terrific (if you’re into R.)


Bitcoin’s collapse is worse than the ruble’s >> Quartz

Matt Phillips & Melvin Backman:

Why the collapse in bitcoin?  One of the clearest answers seems to be that it’s gotten harder to use bitcoin for some of its less savory uses, such as dodging taxes and buying drugs. Governments increasingly are trying to clamp down on the “dark web” sites where bitcoin quickly was the cryptocurrency of choice. Collapses of large, unregulated bitcoin exchanges — such as Mt. Gox — have done little to instill confidence in the currency either.

Mt Gox was a key reason for the start of the collapse. Yet the nearer Bitcoin gets to its 2011/12 levels, and the more people are using it (thus ironing out the speculative element), the more it looks like a really useful product. The implications of the blockchain are fascinating.


Absolute Sownage >> Attrition.org

Over the last two months, the multi-national Sony Corporation has come under a wide range of attacks from an even wider range of attackers. The backstory about what event prompted who to attack and why will make a mediocre made-for-TV movie someday. This article is not going to cover the brief history of hacks; readers can find details elsewhere. Instead, the following only serves to create an accurate and comprehensive timeline regarding the recent breaches, a cliff notes summary for easy reference.

Starts in April 2011, by the end of which we were up to 21. Current count: 24.


Why the sharing economy could be the internet’s most divisive revolution yet >> The Guardian

By me, on the “sharing economy” companies such as Uber and AirBnB:

what would happen if an Airbnb guest was harmed by fire, or a carbon monoxide leak – a constant concern for hotels. Airbnb’s site says owners “should” make sure they have a functioning CO detector and are following gas safety regulations. But although the money for any stay is paid via Airbnb, Robinson says he doesn’t know who would be responsible if someone were injured that way.

“I’m not a lawyer,” says [Patrick] Robinson [AirBnbB’s public policy director in Europe]. It seems surprising that the eventuality hasn’t come up in business meetings, but Robinson declines to discuss it.

It’s a scenario that has exercised insurance companies, which are wrestling with the question of who is liable in a collision involving a car being driven on an Uber journey, or one of the other car rental services, or a complaint involving Airbnb clients. Premiums might rise, or need extra tweaking.

I still find it surprising if AirBnB hasn’t discussed – and even worked out a plan – for the eventuality of poisoning or death at one of its lets, given that it receives the payments for them.


Samsung says ‘cya’ to ChatON smartphone messaging app >> WSJ

Samsung is closing ChatON, for which it claims a “user base” of over 200m users. To which everyone else says: O RLY? And they used it so much you’re closing it?

“Samsung’s failure in messaging apps is endemic of a broader struggle for the company in software and services,” said Rajeev Chand, managing director at Rutberg & Co., a San Francisco-based investment bank that focuses on the mobile industry.

Mr. Chand said he was puzzled by Samsung’s inability to parlay its massive handset sales into at least some traction in software and services, calling it “the defining issue for the company’s long-term success.”

“If they don’t succeed in apps and software, Samsung has a very large risk of being relegated to an increasingly shrinking-margin company,” he said, referring to the recent gains that low-cost Chinese and Indian competitors have made in handset sales in recent months.

Add in this from April:

Strategy Analytics, a Newton, Mass.-based research firm, said in a report Tuesday that U.S. users of Samsung’s devices spend little time on its own messaging, music and voice-activated applications including apps like ChatON, the South Korean company’s answer to services like WhatsApp, Line and Viber.

The report said that U.S. users of Samsung’s Galaxy S3 and S4 smartphones logged an average of six seconds per month using ChatON, compared to more than 11 hours per month on Facebook and about two hours per month on Instagram.

Six. Seconds. This is Samsung’s problem, writ large (or small). By contrast, Apple failed with Ping – but that was a social media app built on top of iTunes, itself a successful Apple-owned platform; iTunes remained. Samsung is left with nothing.

And it was always reluctant to give any hard numbers about ChatON. The irony is that ChatON is going to remain open for slightly longer in the US – apparently that’s one of the busier places.

Even more fun: at the end of November, Samsung categorically denied that it was going to close ChatON. Denials, eh?


Corrected: the author of the Gamergate post is Brianna Wu, not Anita Sarkeesian. Apologies, and thanks to Ron Hayter.

Start up: Twitter’s app suck, Share That Economy!, Uber’s permissions overreach, solar panel boost and more

A selection of 8 links for you. Do not deploy near naked flame.

What is app graph on Twitter? >> Twitter Help Center

To help build a more personal Twitter experience for you, we are collecting and occasionally updating the list of apps installed on your mobile device so we can deliver tailored content that you might be interested in. If you’re not interested in a tailored experience you can adjust your preferences at any time (read below). Additionally, if you have previously opted out of interest-based ads by turning on “Limit Ad Tracking” on your iOS device or by adjusting your Android device settings to “Opt out of interest-based ads,” we will not collect your apps unless you adjust your device settings.

Sure, that’s–– pardon? What do Twitter’s engineers think they can extract from this? If you have Uber, Lyft and Hailo installed, will they suggest you follow taxi drivers? Or just the accounts for those apps? If you look at it askance, the idea half makes sense. The other half doesn’t.


Bah Humbug: Microsoft’s affordable smartphone strategy dashes hopes for a real flagship >> ZDNet

There is also no flagship currently available to match the latest iPhone 6 or Android models. The last high-end Windows Phone device was the Nokia Lumia Icon, available only on Verizon and powered by a 2013 processor. It was released in February 2014 while AT&T’s exclusive Lumia 1520 was released in October 2013.

ZDNet’s Ed Bott questioned whether it was too late for Windows Phone back in September and even though I have been an advocate for the platform for years, I am extremely disappointed that Microsoft continues to ignore the high-end smartphone buyer with a focus on the affordable phone market. Those just concerned about pricing are not vocal advocates for the platform and if Microsoft ever wants to gain more than 3% of the smartphone market they need to throw a bone to the smartphone enthusiast.

Seriously, what? The top end is saturated: Apple and Samsung have it mapped out, with a little room for Sony, LG and HTC. Nokia tried and dismally failed at the “high-end flagship” game, and Stephen Elop has the scars to remind him of it.

“Affordable” smartphones are where the volume is. China is the world’s largest smartphone market; India will join it soon. Ignoring the saturated American market is pretty wise if you’re trying to attract new buyers.


UK urged to back ‘sharing economy’ >> Yahoo News UK

The UK should do more to support “sharing economy” platforms like Airbnb, TaskRabbit and Zipcar, according to a government-commissioned review.

The Unlocking The Sharing Economy review was commissioned in September by the Department for Business, Innovation and Skills and led by Debbie Wosskow, the chief executive of the start-up Love Home Swap.

It makes more than 30 recommendations to help people make the most of their homes, cars and other assets to “build a nation of everyday entrepreneurs”.

The review calls for a start-up incubator and innovation lab for British companies in this field, suggests that Jobcentre staff promote sharing economy platforms to jobseekers and suggests more car-pooling lanes in high congestion areas.

It calls for “fair terms of entry to the accommodation market” and suggests that “someone renting out a spare room is not subject to the same level of regulation as a business renting out 100 rooms all year round”.

How surprising that a review written by someone working in the “sharing economy” should conclude that the sharing economy shouldn’t be troubled by those “regulation” things. Will the sentiment be the same when (it’s surely when) someone dies from a faulty storage heater pumping out carbon monoxide in a “sharing economy” rental?

Notable too that none of the stories writing this up quoted opposing voices such as the British Hospitality Association – which complained of “targeted favouritism” that benefited “a select few multibillion pound foreign corporations over local small businesses” – the latter make most of the BHA’s members.


Permissions asked for by Uber Android app >> Hacker News

Discussion around the discovery of quite how much the Android version of Uber sends back to the mothership:

TLDR: Uber’s Android app is literally malware.

Since the website is currently down, this person reverse-engineered Uber’s Android app and discovered it has code that will “call home” aka send data back to Uber with your:
– SMS list [edit: see other comments re SMSLog, SMS permission is not currently requested] – call history – wifi connections – GPS location – every type of device fingerprint possible (device IDs)
It also checks if you’re phone is rooted/jailbroken and if it’s vulnerable to Heartbleed… which it also calls home.

From my understanding, which the author somehow missed, is that it is using http://www.inauth.com SDK which provides ‘malware detection’. This SDK is popular in the ‘mobile finance industry’ and the banking sector. Also notably one of the founders is former DHS/FBI.
Two possible theories: it is being used for fraud detection and/or an intelligence gathering tool.

“Malware” seems overstated, but it certainly goes as far as it possibly can – so, like its owner company.


The only way to save Google Glass is to kill it >> WIRED

Marcus Wohlsen:

“Why not license it out and get out of the hardware business altogether?” asks J.P. Gownder, who covers the wearable device market for Forrester Research.

Gownder himself believes it’s too early to sound the death knell for Glass as a consumer product, though he does say Google has a tough job ahead if it hopes to get consumers to embrace something so unfamiliar. “People don’t know what to do with these devices,” he says.

Apple, meanwhile, has a powerful channel for introducing the gadget-consuming public to new products in the form of its stores. If people are skeptical of what an Apple watch can do, for instance, they will be able to go into an Apple store and try one on. Not so with Google, which has reportedly even closed the few physical locations it had set up to introduce people to Glass.

Gownder is convinced that Glass and other heads-up displays have a strong future in the world of work, where everyone from surgeons to petroleum engineers will find them incredibly useful for specific tasks. As a general-purpose device, however, a kind of smartphone for the face, the advantages aren’t so clear.

There’s a similar piece at MIT Technology Review. Google’s introduction of Glass – make a super-happy video showing someone using it to buy ukelele songs – was clearly wrong. It’s a tool for commerce, not users.


FTC shuts down massive “PC cleaner” scam >> Gigaom

Jeff John Roberts:

On Wednesday, the FTC and the State of Florida announced court complaints against dozens of individuals and companies that reportedly swindled over $120m from consumers, many of them seniors.

While these type of scams have been around for years, the court documents provide an especially clear picture of how the scams work.

According to the FTC, the crooks typically try to hook the victims with an internet ad that promises a free scan for virus or malware. That scan inevitably detects a “problem”…

It’s depressing how impossible this scam is to root out. It’s a modern form of the penny stock pump’n’dump.


Floating feasts >> New Yorker

This, from David Owen, is about the challenge of keeping the passengers on the second-largest cruise ship in the world, with 8,100 people aboard:

One of the few exceptions to Royal Caribbean’s made-fresh policy is French fries. “If we made them ourselves, we’d need four or five guys doing nothing but pushing potatoes through a cutter all day,” Dearie said. Handmade fries, furthermore, droop quickly; the frozen fries the ship uses, like the ones served in many fast-food restaurants, have a coating that keeps them crisp and hot for longer. (The coating on Oasis fries is made from rice flour and modified starch.) We watched a cook tending a large deep fryer. Piled on a counter to his left were a dozen bags the size of pillows. “That’s about five minutes’ worth,” Dearie said.

Guests in Opus consume roughly six hundred pounds of fries in an evening, Dearie said, and fry consumption rises with the number of Americans on board and the number of children—as does pizza consumption.

Now consider the challenge of putting together smartphones (say) from components sourced from multiple places in time for the fourth-quarter rush. (The article is fantastic. Set aside some time.)


Australian engineers have boosted solar cell efficiency by five times more than ever before >> ScienceAlert

We could soon be able to convert more of the Sun’s energy into power using fewer solar panels, thanks to a new breakthrough by Swinburne University of Technology researchers in Australia.

Working with researchers from Nankai University in China, the team has managed to enhance the efficiency of silicon solar cells by 3.8% – almost five times more than the current record.

“One of the critical challenges the solar cell faces is low energy conversion efficiency due to insufficient absorption from the thin silicon layer,” said micro-photonics expert Min Gu at Swinburne University of Technology, who worked on the project.

To achieve the impressive upgrade, the engineers synthesised one-dimensional graphenised carbon nanofibre, and used it to help solar cells capture sunlight more efficiently.

I was speaking the other day to someone who installs solar panels for a living, who said that in the past five years efficiencies of the panels he installs has improved by 25%. That’s about 4.5% compound per year. So this doesn’t look like a giant leap. Sorry.