That stab is Wake, a piece of software coming out of beta today that attempts to change how designers share work in progress. The desktop software and iOS app allow designers to make screenshots of their work and upload them directly from their design tools (think Sketch, Photoshop or Illustrator) into a gridded timeline. Wake is home to rough sketches and halfway-there frameworks, a journal of a project’s many iterations. Designers can leave comments and follow along as work progresses. Kalani’s underlying idea is increasing transparency in the sometimes messy design process ultimately will lead to a better product. In many ways, Wake is a more mature Pixelcloud. The software is still simple—the goal is to be as lightweight as possible—but it has some handy features like integrations with design creation tools and Slack, and the ability to upload shots directly from your iPhone.
Tech visionaries may tantalize us with visions of instant gratification via drone delivery, but Silicon Valley has yet to deliver on such promises. Meanwhile, halfway around the globe in an African country barely the size of Maryland, drone deliveries have already taken flight—with more serious cargo than burritos.
The next day, Stone halted the trial to tell journalists that if coverage persisted he’d restrict courtroom access.
But late last year, Wilson and Defense Distributed reemerged. In October 2014 Wilson revealed his biggest project to date: the Ghost Gunner, a miniaturized CNC milling machine small enough to sit on a desktop. It’s thousands of dollars cheaper than big CNC mills—computer-programmable industrial tools for cutting away material—and capable of producing aluminum lower receivers compatible with the AR-15 rifle. Some gun owners buy “80 percent lowers,” inexpensive, solid pieces of incomplete receivers that fall just below the threshold of what the federal government considers a legit firearm. Wilson’s machine allows novice machinists to mill an aluminum receiver to completion. U.S. law doesn’t prohibit making your own receiver for personal use.
YouTube also announced that humans would soon begin screening every video from creators who participate in Google Preferred, a special premium advertising program that guarantees revenue for the top five percent or so of creators. YouTube removed Paul—who has over 15 million subscribers—from the program in the aftermath of the suicide video.
Charter’s own opt-out page is careful not to claim that opted-out users won’t be monitored, saying only that if a user “would like to opt-out of this process” an opt-out cookie means they “will no longer receive ads that are tailored to your web preferences, usage patterns and commercial interests.”
HeyPix’s free service offers 50 MB of storage and bandwidth. Its premium plans cost between $5 and $8 a month, and offer up to 3 GB of storage and up to 5 GB of bandwidth. HeyPix does not offer printing services.
The intelligence community has been interested in social media for years. In-Q-Tel has sunk money into companies like Attensity, which recently announced its own web 2.0-monitoring service. The agencies have their own, password-protected blogs and wikis – even a MySpace for spooks. The Office of the Director of National Intelligence maintains an Open Source Center, which combs publicly available information, including web 2.0 sites. Doug Naquin, the Center’s Director, told an audience of intelligence professionals in October 2007 that “we’re looking now at YouTube, which carries some unique and honest-to-goodness intelligence…. We have groups looking at what they call ‘citizens media’: people taking pictures with their cell phones and posting them on the internet. Then there’s social media, phenomena like MySpace and blogs.”
In the last few months, hackers have figured out clever ways to store not only names and addresses on the iPod but calendar items, song lyrics and even phrases in foreign languages.
Computer security is hard. Software, computer and network security are all ongoing battles between attacker and defender. And in many cases the attacker has an inherent advantage: He only has to find one network flaw, while the defender has to find and fix every flaw.
In March 2006, inspectors asked him for information on a carder named “Jilsi,” whom Jackson traced to a money exchanger in the United Kingdom. The exchanger gave him a real name – Renu Subramaniam – a 2-year-old confirmed phone number and the time and location of deposits Subramaniam had made to two London banks. Jackson passed the information to inspectors who told him that the phone number, if correct, would be “the break in the case we have been waiting for, for quite a long time.”
I’ve read Kurzweil’s latest book, called The Singularity is Near, which I mean to write a review of at some point. This talk is a very condensed version of the ideas he puts forth in his book.