Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

February 18 2014

February 04 2014

Four short links: 4 February 2014

  1. UX Fundamentals, Crash Course — 31 posts introducing the fundamental practices and mindsets of UX.
  2. Why We Love Persona And You Should Too — Mozilla’s identity system is an interesting offering. Fancy that, you might have single-sign on without Single Pwn-On.
  3. Raspberry Pi As Test Harness — Pi accessory maker uses Pis to automate the testing of his … it’s Pis all the way down.
  4. The Holodeck Begins to Take Shape — displays, computation, and interesting input devices, are coming together in various guises.

November 01 2013

Four short links: 1 November 2013

  1. Analogy as the Core of Cognition (YouTube) — a Douglas Hofstadter lecture at Stanford.
  2. Why Isn’t Programming Futuristic? (Ian Bicking) — delicious provocations for the future of programming languages.
  3. Border Check — visualisation of where your packet go, and the laws they pass through to get there.
  4. Pi Noir — infrared Raspberry Pi camera board. (via DIY Drones)

October 11 2013

Safe-Harbour-Verstöße, Tracking bei Mailprovidern, Cloudspeicher im Selbstbau

Datenschutzverstöße bei „Safe Harbour“, Tracking bei Mailprovidern, Streaming aus Musikerperspektive, Gauck zum Datenschutz, Datenleck bei Adobe und Cloudspeicher im Selbstbau. Die Cloud-Links der Woche:

Safe Harbour: Viele Verstöße gegen Datenschutz-Selbstregulierung

Viele US-Unternehmen verstoßen gegen die selbstauferlegten Verpflichtungen der Safe-Harbour-Vereinbarung, die den Export von Nutzerdaten aus Europa in die USA regelt. Das ist das Fazit eines Berichts (PDF) von Christopher Connoly, Chef der Datenschutzberatung Galexia, im Rahmen einer Anhörung im Innenausschuss des EU-Parlaments. So nennt der Bericht unter anderem 427 Verstöße im laufenden Jahr bei den US-Unternehmen, ein knappes Drittel mehr als 2010. Gänzlich neu ist der Befund Connolys nicht, die Safe-Harbour-Vereinbarung geriet zuletzt jedoch verstärkt in die Kritik. Worum es bei „Safe Harbour” geht, erläutert Jan Schallaböck bei iRights hier genauer.

Deutsche Mail-Provider lassen Tracking zu

Das Magazin c’t hat untersucht, bei welchen Mailprovidern Nutzer vom Absender beim Lesen beobachtet werden können. Technisch gesprochen: welche Anbieter Trackingpixel zulassen. Mit den vor allem von gewerblichen Absendern eingesetzten kleinen Bilddateien können diese nachprüfen, wann, womit und wo eine Mail gelesen wird. Demnach ist die Option bei T-Online, GMX, Web.de, Freenet und 1und1 standardmäßig aktiviert, zumindest beim Webmailer von 1und1 lässt sie sich aber abstellen. Positiv kommen in diesem Fall Yahoo und Google weg, bei denen die Option als Standard abgeschaltet ist. Ebenfalls untersucht wurden gängige Mailprogramme. Heise Security fasst die Ergebnisse zusammen.

Streamingdienste und die Künstler: Anbieter bleiben auf Daten sitzen

Der Musikwirtschaftsforscher Peter Tschmuck hat Streamingdienste wie Spotify, Amazon Cloud Drive oder Rhapsody als Einnahmequelle für Künstler untersucht und Statistiken ausgewertet. Sein Fazit: „Realistischerweise können Musikschaffende Streaming nicht als relevante Einkommensquelle ansehen. Nichtsdestotrotz sollten diese Plattformen als wichtiges Promotionstool für die Verbreitung der eigenen Werke angesehen werden.” Perspektivisch würden aber vor allem die von Streamingdiensten gesammelten Daten für Musikschaffende wichtig. Diese behalten jedoch in aller Regel die Plattformen.

Bundespräsident Gauck: Datenschutz so wichtig wie Umweltschutz

In einer Rede zum Tag der deutschen Einheit hat Bundespräsident Joachim Gauck auch das Thema Datenschutz behandelt. „So sollte der Datenschutz für den Erhalt der Privatsphäre so wichtig werden wie der Umweltschutz für den Erhalt der Lebensgrundlagen”, sagte Gauck. Dabei bezog sich der ehemalige Beauftragte für die Stasi-Unterlagen auch auf die Überwachungs- und Spionageaffäre und forderte „Gesetze, Konventionen und gesellschaftliche Verabredungen”, die dem digitalen Wandel Rechnung tragen.

Adobe: Datenleck bei Kundendaten und Sourcecode

Wie zuerst vom Sicherheitsforscher Brian Krebs berichtet, haben sich Angreifer bei einem Einbruch in das Unternehmensnetzwerk von Adobe Nutzerdaten wie Login-Information, Kreditkartendaten, verschlüsselte Passwörter und Programmcode beschafft. Betroffen sind offenbar Nutzer des Programms Coldfusion sowie Konten für Revel und Creative Cloud. Adobe erklärte, für Nutzer bestehe kein erhöhtes Risiko, betroffene Anwender würden benachrichtigt.

Podcast: Wozu Cloud im Selbstbau?

Marcus Richter hat sich mit dem Mikrorechner Raspberry Pi und der Owncloud-Software einen Cloudspeicher im Selbstbau-Modus zugelegt und eine Anleitung kompiliert. Mit erdgeist vom Chaos Computer Club unterhält er sich gut eine Stunde im Monoxyd-Podcast über die Gründe und Erfahrungen dabei. Hintergründe zum Cloud-im-Selbstbau-Trend auch hier bei iRights.

September 19 2013

Four short links: 20 September 2013

  1. Researchers Can Slip an Undetectable Trojan into Intel’s Ivy Bridge CPUs (Ars Technica) — The exploit works by severely reducing the amount of entropy the RNG normally uses, from 128 bits to 32 bits. The hack is similar to stacking a deck of cards during a game of Bridge. Keys generated with an altered chip would be so predictable an adversary could guess them with little time or effort required. The severely weakened RNG isn’t detected by any of the “Built-In Self-Tests” required for the P800-90 and FIPS 140-2 compliance certifications mandated by the National Institute of Standards and Technology.
  2. rethinkdbopen-source distributed JSON document database with a pleasant and powerful query language.
  3. Teach Kids Programming — a collection of resources. I start on Scratch much sooner, and 12+ definitely need the Arduino, but generally I agree with the things I recognise, and have a few to research …
  4. Raspberry Pi as Ad-Blocking Access Point (AdaFruit) — functionality sadly lacking from my off-the-shelf AP.

September 13 2013

Four short links: 13 September 2013

  1. Fog Creek’s Remote Work PolicyIn the absence of new information, the assumption is that you’re producing. When you step outside the HQ work environment, you should flip that burden of proof. The burden is on you to show that you’re being productive. Is that because we don’t trust you? No. It’s because a few normal ways of staying involved (face time, informal chats, lunch) have been removed.
  2. Coder (GitHub) — a free, open source project that turns a Raspberry Pi into a simple platform that educators and parents can use to teach the basics of building for the web. New coders can craft small projects in HTML, CSS, and Javascript, right from the web browser.
  3. MillWheel (PDF) — a framework for building low-latency data-processing applications that is widely used at Google. Users specify a directed computation graph and application code for individual nodes, and the system manages persistent state and the continuous ���ow of records, all within the envelope of the framework’s fault-tolerance guarantees. From Google Research.
  4. Probabilistic Scraping of Plain Text Tablesthe method leverages topological understanding of tables, encodes it declaratively into a mixed integer/linear program, and integrates weak probabilistic signals to classify the whole table in one go (at sub second speeds). This method can be used for any kind of classification where you have strong logical constraints but noisy data.

June 18 2013

„Onion Pi”: Anonymes Internet zum Mitnehmen

Man nehme: Einen Raspberry-Pi-Mikrocomputer, ein paar Adapter, Stecker und Kabel, eine Antenne und die Software Tor. Das Ergebnis: ein tragbarer WLAN-Router, der anonymen Internetzugang für alle Teilnehmer verspricht, die sich darüber einwählen.

Eine Anleitung zum Selberbauen hat jetzt das Lernportal der Open-Source-Firma Adafruit veröffentlicht:

Who is this good for? If you want to browse anonymously on a netbook, tablet, phone, or other mobile or console device that cannot run Tor and does not have an Ethernet connection. If you do not want to or cannot install Tor on your work laptop or loan computer. If you have a guest or friend who wants to use Tor but doesn’t have the ability or time to run Tor on their computer, this gift will make the first step much easier.

Sicherheit gegen Abhörprogramme wie Prism kann die Tor-Software allerdings nicht versprechen – sie anonymisiert nur die Internetverbindungen. Die Entwickler schreiben in einem Beitrag zum Thema im Tor-Blog:

By itself, Tor does not protect the actual communications content once it leaves the Tor network. This can make it useful against some forms of metadata analysis, but this also means Tor is best used in combination with other tools.

Allerdings: Wer den Onion Pi oder ähnliches nachbaut, kann viel über deren Funktionsweise lernen – das beste Mittel gegen digitale Unmündigkeit.

June 13 2013

Four short links: 13 June 2013

  1. The Unengageables (Dan Meyer) — They signed their “didactic contract” years and years ago. They signed it. Their math teachers signed it. The agreement says that the teacher comes into class, tells them what they’re going to learn, and shows them three examples of it. In return, the students take what their teacher showed them and reproduce it twenty times before leaving class. Then they go home with an assignment to reproduce it twenty more times. Then here you come, Ms. I-Just-Got-Back-From-A-Workshop, and you want to change the agreement? Yeah, you’ll hear from their attorney. Applies to management as much as to teaching.
  2. Fixing SigninThe general principle can be stated simply, in two parts: first, give users a trust-worthy way to identify themselves. Second, do so with as little information as possible, because users don’t want to (and simply can’t) remember things like passwords in a secure way. (via Tim Bray)
  3. Retro Gaming with Raspberry Pi (Adafruit) — finally, a clear incentive for kids to work through the frustration of setting up their own Linux box.
  4. Mieko Haire — Apple’s fictious demo lady. Or is she fictitious? This is a new aesthetic-esque glitch, but while most glitches are glitches because you see something that doesn’t exist, this is glitchy because the fictions are actual people. Ok, maybe I need to lay off the peyote.

May 28 2013

Four short links: 28 May 2013

  1. My Little Geek — children’s primer with a geeky bent. A is for Android, B is for Binary, C is for Caffeine …. They have a Kickstarter for two sequels: numbers and shapes.
  2. Visible CSS RulesEnter a url to see how the css rules interact with that page.
  3. How to Work Remotely — none of this is rocket science, it’s all true and things we had to learn the hard way.
  4. Raspberry Pi Twitter Sentiment Server — step-by-step guide, and github repo for the lazy. (via Jason Bell)

May 07 2013

Four Short Links: 7 May 2013

  1. Raspberry Pi Wireless Attack ToolkitA collection of pre-configured or automatically-configured tools that automate and ease the process of creating robust Man-in-the-middle attacks. The toolkit allows your to easily select between several attack modes and is specifically designed to be easily extendable with custom payloads, tools, and attacks. The cornerstone of this project is the ability to inject Browser Exploitation Framework Hooks into a web browser without any warnings, alarms, or alerts to the user. We accomplish this objective mainly through wireless attacks, but also have a limpet mine mode with ettercap and a few other tricks.
  2. Industrial Robot with SDK For Researchers (IEEE Spectrum) — $22,000 industrial robot with 7 degrees-of-freedom arms, integrated cameras, sonar, and torque sensors on every joint. [...] The Baxter research version is still running a core software system that is proprietary, not open. But on top of that the company built the SDK layer, based on ROS (Robot Operation System), and this layer is open source. In addition, there are also some libraries of low level tasks (such as joint control and positioning) that Rethink made open.
  3. OtherMill (Kickstarter) — An easy to use, affordable, computer controlled mill. Take all your DIY projects further with custom circuits and precision machining. (via Mike Loukides)
  4. go-raft (GitHub) — open source implementation of the Raft distributed consensus protocol, in Go. (via Ian Davis)

April 16 2013

Four short links: 16 April 2013

  1. Triage — iPhone app to quickly triage your email in your downtime. See also the backstory. Awesome UI.
  2. Webcam Pulse Detector — I was wondering how long it would take someone to do the Eulerian video magnification in real code. Now I’m wondering how long it will take the patent-inspired takedown…
  3. How Microsoft Quietly Built the City of the FutureThe team now collects 500 million data transactions every 24 hours, and the smart buildings software presents engineers with prioritized lists of misbehaving equipment. Algorithms can balance out the cost of a fix in terms of money and energy being wasted with other factors such as how much impact fixing it will have on employees who work in that building. Because of that kind of analysis, a lower-cost problem in a research lab with critical operations may rank higher priority-wise than a higher-cost fix that directly affects few. Almost half of the issues the system identifies can be corrected in under a minute, Smith says.
  4. UDOO (Kickstarter) — mini PC that could run either Android or Linux, with an Arduino-compatible board embedded. Like faster Raspberry Pi but with Arduino Due-compatible I/O.

January 17 2013

Four short links: 17 January 2013

  1. Free Book Sifter — lists all the free books on Amazon, has RSS feeds and newsletters. (via BoingBoing)
  2. Whom the Gods Would Destroy, They First Give Realtime Analytics — a few key reasons why truly real-time analytics can open the door to a new type of (realtime!) bad decision making. [U]ser demographics could be different day over day. Or very likely, you could see a major difference in user behavior immediately upon releasing a change, only to watch it evaporate as users learn to use new functionality. Given all of these concerns, the conservative and reasonable stance is to only consider tests that last a few days or more.
  3. Web Book Boilerplate (Github) — uses plain old markdown and generates a well structured HTML version of your written words. Since it’s sitting on top of Pandoc and Grunt, you can easily make your books available for every platform. MIT-style license.
  4. Raspberry Pi Education Manual (PDF) — from Scratch to Python and HCI all via the Raspberry Pi. Intended to be informative and a series of lessons for teachers and students learning coding with the Raspberry Pi as their first device.
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl