The SoftBank Corporate and IR page provides information about SoftBank Mobile and Aldebaran Unveil “Pepper” – the World’s First Personal Robot That Reads Emotions
Links
Why Facebook Spent a Year Learning to Listen in on Your TV Shows | Business | WIRED
Why Facebook Spent a Year Learning to Listen in on Your TV Shows | Business | WIRED
According to the company, the accuracy is high enough that Facebook will sometimes make suggestions even before you’ve told it what kind of media you’re looking for. “What we ended up doing is providing this flow where it works from the top level,” says Facebook software engineer Ryan Case. “You could be just typing about what you’re watching and we give an indication we have a suggestion for you, and you can step into the suggestion.”
The system also grabs more detailed information about what you’re doing. When people were inputing TV shows manually, Facebook didn’t ask them which season and episode they were viewing. That would be too much of a burden. Now, that data is included automatically. Previously, music data was limited to a particular band. Now, Facebook shows the specific track and album and includes a 30-second clip.
Gitchain
Decentralized, peer-to-peer Git repositories aka “Git meets Bitcoin”
Blinding light: The US crackdown on not-so-harmless laser strikes
Blinding light: The US crackdown on not-so-harmless laser strikes
Federal criminal charges were brought against both of them in March 2013, with a three-day trial concluding in December 2013. Despite his lawyer’s best efforts, in March 2014, Rodriguez was sentenced to 14 years in prison. His punishment is believed to be the harshest such sentence for firing a laser at an aircraft anywhere in the United States, possibly even the world.
Curbing Online Abuse Isn’t Impossible. Here’s Where We Start | Game|Life | WIRED
Curbing Online Abuse Isn’t Impossible. Here’s Where We Start | Game|Life | WIRED
Think about how social networks might improve if—as on the gaming sites and in real life—users had more power to reject abusive behavior. Of course, different online spaces will require different solutions, but the outlines are roughly the same: Involve users in the moderation process, set defaults that create hurdles to abuse, give clearer feedback for people who misbehave, and—above all—create a norm in which harassment simply isn’t tolerated.
Ultimately, online abuse isn’t a technological problem; it’s a social problem that just happens to be powered by technology. The best solutions are going to be those that not only defuse the Internet’s power to amplify abuse but also encourage crucial shifts in social norms, placing bad behavior beyond the pale. When people speak up about online harassment, one of the most common responses is “Well, what did you expect from the Internet?” If we truly want to change our online spaces, the answer from all of us has got to be: more.
Tinder singles spammed by game bots
The story of Cortana, Microsoft’s Siri killer
Nitesh Dhanjani: Cursory Evaluation of the Tesla Model S: We Can’t Protect Our Cars Like We Protect Our Workstations
A fantastic article exploring significant security concerns with the Tesla Model S automobile, while also touching upon the need to consider security and privacy with regard to the rise of the Internet of Things.
Given the fantastic future of IoT (Internet of Things) devices ahead of us, it is the responsibility of the security community and device manufacturers to do our best to enable these devices securely. The IoT devices in scope include remotely controllable thermostats, baby monitors, light bulbs, door locks, cars, and many more. The impact of security vulnerabilities targeting such devices can lead be physical in nature in addition to contributing to loss of privacy.
The purpose of this document is to outline the mechanisms by which the Tesla Model S communicates with car owners and the Tesla infrastructure using a variety of TCP/IP mechanisms. The goal of this document is to advise the owners on security issues they should be aware of as well as to kick off a dialogue between security researchers and Tesla Motors that will ultimately drive deeper analysis and assurance.
Steve Mann’s Justice 2.0
A steel cable from the iron collar around the condemned man’s neck runs up to a pulley and back down to a spool connected to the back of an old bubblegum machine.
His cell, open to the city’s elements and bustling streets, sits next to the coin-operated spool.
A quarter [dollar] turns [the spool] a quarter [of a] turn. But istead of dispensing bubblegum, it dispenses justice by winding up the wire like a winch.
A half dollar for a half turn. A dollar a turn.
One good turn deserves another, so people line up at the machine to take turns buying turns.
This is the old model. Gallows 2.0, out next quarter, accepts Visa, Mastercard, and Bitcoin, and you can buy forward OR BACKWARD turns (to loosen the noose) while viewing through the cell’s webcam over the Internet.
Welcome to Justice 2.0
April 1, 2014
Leveling Up Your Reputation: Notifications Coming Soon
Leveling Up Your Reputation: Notifications Coming Soon
Micheal Dunn, Program Manager on Xbox Live, reviews details of the Xbox One reputation system.