Tuesday, September 30, 2014

Instapaper Goes Freemium With Big iOS Redesign

Instapaper, bringing bookmarks into the future, has just launched a big redesign of the iOS version of the app with loads of new features and a brand new business model.

betaworks’-owned Instapaper has always been a paid product, going for between $3 and $4 dollars on mobile and costing approximately $1/month as a subscription. Today, the company is pivoting to entirely free apps and services, with an option to get unlimited access to a host of new features.

With the launch of Instapaper 6, iOS users will now be able to save any article with a single tap thanks to the open System Share Sheet in iOS 8. Before, users had to copy and paste the link and save it in the Instapaper app, or email the link to their personal Instapaper email to cue it up in the app. The one-click save also hooks into notifications to keep a list of your latest saved articles in the iOS Notifications center.

iOS was the last of Instapaper’s products (such as the Android app and the web version) to not include a single save button, so this marks a big step forward for the app.

gif

Instapaper is also introducing text-to-speech with the help of Apple’s text-to-speech synthesizer, letting users listen to their saved articles at times when reading isn’t an option.

All of the above features are free, but premium users will have access to text-to-speech playlists as well as unlimited highlighting (free users are limited to five highlights per month). This will let users listen to their own curated podcast of articles while they drive or go for a job without switching manually.

Instapaper 6 also introduces profiles so that users can follow their friends’ reads, as well as a unified search for any text within the app.

Instapaper was acquired by betaworks in 2013, and General Manager Brian Donohue has since been trying to get Instapaper to a place where it can go freemium. When it was first launched as a consumer product, Instapaper had little to no competition.

“When Pocket launched with a great, free product, it became harder to justify a paid product when we had a solid free competitor,” said Donohue. “With Premium, we want to let free users have most of the same features while giving premium users special or unlimited access to them.”

New pricing takes the apps to a free download and asks for $2.99/month or $29.99/year. To learn more, head over to the website here.


This post was made using the
Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

NASA Taps Boeing, SpaceX to Transport Astronauts to Space Station

Boeing's Crew Space Transportation-100. Boeing’s Crew Space Transportation-100. Boeing

In the latest step toward commercial human space flight, Boeing and SpaceX have been chosen to carry the next NASA astronauts into space, the agency announced today.

NASA awarded $4.2 billion to Boeing and $2.6 billion to SpaceX to send astronauts to the International Space Station and return them safely home, with the goal of meeting all of NASA’s safety and performance requirements by 2017.

Despite the discrepancy in contract amounts, both companies must meet the same standards, showing that they can safely ferry crew and cargo between Earth and the space station. The spacecraft must also be able to serve as a lifeboat that can evacuate the space station in an emergency.

The certification process includes a test flight to send at least one NASA astronaut to the space station. Once the companies are certified, they will conduct two to six service missions to the space station with a crew of four astronauts. Because these missions will increase the number of crew at the space station, the amount of scientific research done on the space station will double, said Kathy Lueders, manager of NASA’s Commercial Crew program.

Both companies use capsule spacecraft designs: Boeing with its CST-100 and SpaceX with its Dragon V2 spacecraft. Sierra Nevada Corp., whose Dream Chaser shuttle-like spacecraft was considered a major contender, lost out on its bid. Still, Lueders said, NASA is committed to its previously established agreements to continue working with Sierra Nevada and other companies such as Blue Origin, which was founded by Amazon founder Jeff Bezos.

As part of its Commercial Crew Program, NASA has already invested tens of millions of dollars over the past few years to help companies develop their own human spaceflight designs.

Since the space shuttle was retired in 2011, NASA has relied on Russia and its Soyuz spacecraft to get to and from the space station. The newly announced partnerships with Boeing and SpaceX will enable the U.S. to end its dependence on Russia by 2017, said NASA Administrator Charlie Bolden.

SpaceX's Dragon V2. SpaceX’s Dragon V2. SpaceX


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

How to Make Your Business More Secure

Every company needs electricity, but that doesn’t require building a power plant. Many organizations have reached the same conclusion about computing and storage needs. Why build out data centers if it’s not your core business? Plus it can be a costly proposition.

That’s basically the premise of cloud computing: turn to trusted partners for your computing needs so you can focus on the business. But when deciding on a cloud strategy, organizations should be careful not to simply focus on saving money.

To be sure, moving to the cloud is economical and brings greater efficiencies, but it’s also an opportunity to re-examine everything from finance systems to enterprise resource planning and even the helpdesk. It can be a means of improving business efficiency over every operation that runs on software. Adding redundancy and automating backup are two functions most cloud providers offer, with more or less sophistication.

A cloud strategy, whether it’s for a public, private or hybrid cloud platform, is also an excellent place to rethink security and continuity strategy and options across the board.

Companies in highly regulated industries — such as finance, pharmaceuticals, defense or transportation, to name a few — have unique security and compliance concerns. Government contractors, for example, may be prohibited from sharing data with a foreign enterprise. What happens if a cloud provider uses offshore resources to maintain the infrastructure? How is data protected?

With a device in the pocket of nearly every employee and customer, many of them connecting through the cloud, simply adding layers of security would mean a missed opportunity. The username/password system, for instance, may have worked well enough when data and software resided in a stationary device or a company-owned server. With greater mobility, device certification or user certification may be a better option. Security can also be added with analytics around anomaly detection and correlation — beyond what most smaller enterprises could accomplish on their own.

What is the best way to remove friction while adding security and resiliency? For most organizations, the answer will be in the cloud. They can use services, which allow businesses to experience the true promises of the cloud by providing the assurances that no threat, whether it’s a natural disaster or a hacker, will affect business performance, customer loyalty, revenues or the reputation of their brand.

Laurence Guihard-Joly is General Manager of IBM’s Business Continuity & Resiliency Services (BCRS) worldwide. She is responsible for the strategy, portfolio, sales, alliances and delivery of BCRS, professional and managed outsourcing and cloud services to help clients worldwide manage their risks and achieve their business goals. Laurence earned the Scientific Graduation and her MBA from Lille Business University. She joined a consulting organization in 1983, before joining IBM in Paris in 1984.

A version of this story appeared on IBM’s A Smarter Planet blog on April 14. 


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Two Comedians (And Totally Unqualified Critics) Preview the New TV Season

Two totally unqualified critics preview the new fall season. Emily Shur

Each fall, a new crop of shows hits the air—and we're forced to gamble on which ones will be worth watching. After all, for every Arrow, there's a Dracula. Hoping to get a bead on this season's prospects, we asked Jonah Ray and Kumail Nanjiani, cohosts of the Comedy Central stand-up series The Meltdown With Jonah and Kumail, to review a few. They've only seen the shows' trailers, but when has that ever stopped a nerd from passing judgment?

Prequel alert! Fox gets in on the comic-book fun by imagining the future Commissioner Gordon as a rookie detective investigating the murders of young Bruce Wayne's parents.

Ray: There are younger versions of every future villain and superhero. It's basically Batman Babies.

Nanjiani: There's a skinny Penguin. Is there a lot of emotional eating coming up?

Ray: I can't wait for someone to punch Gordon in the face and go, “Welcome to Gotham City. That's the G.C., bitch!” That's a reference to the television show The O.C.

In this Facebook-era sitcom version of My Fair Lady, Doctor Who's Karen Gillan plays the Eliza Doolittle role (in this case Eliza Dooley).

Nanjiani: I thought the whole show was gonna be shot on front-facing iPhone cameras.

Ray: I'm hoping that all the social media references will be a gateway for shitty people to watch it and then learn how shitty they are.

Nanjiani: In the trailer she says, “We can do anything. But no backdoor stuff.” I would love if that's the hashtag they're trying to get out there for the pilot. #backdoorstuff

Based on DC Comics' Hellblazer, this supernatural-detective drama hews closer to the source material than the 2005 Keanu Reeves film version—which would normally give us hope, except for one of the things they apparently changed.

Nanjiani: In the comics, John Constantine is a chain smoker who gets lung cancer. They took that out. Now he's just a really bummed-out British guy who can commune with the dead.

Ray: They should have got Morissey to play him.

Nanjiani: But even the ghosts would be like, “You're really bumming me out, dude—and I'm dead.”

A team of ultragenius hackers (and Katharine McPhee as an everywoman waitress, because why not?) use their l33t skills to avert global crises.

Nanjiani: In the trailer, the software update messes up all the plane systems. Whenever a computer software update comes up on my computer, I'm like, “What's the worst that can happen if I don't do this?” Oh, 80 planes will crash.

Ray: I don't think anyone's gotten hacker culture right since the movie Hackers.

Nanjiani: Or the TV show Silicon Valley that's on HBO. That show really nails it.


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

BuySellAds Acquires Ad Startup LaunchBit

LaunchBit, an ad startup focused on helping software-as-a-service businesses find new customers, is announcing that it has been acquired by ad platform BuySellAds.com.

The financial terms of the deal are not being disclosed. LaunchBit co-founder and CEO Elizabeth Yin told me via email that the LaunchBit ad network will continue to operate, “business as usual,” while it’s “too early” to say what will happen to the LaunchBit team.

The startup first launched as an email ad network in 2012, raising a seed round of a little under $1 million from 500 Startups (where LaunchBit was incubated), Zappos CEO Tony Hsieh’s VegasTech Fund, TriplePoint Capital, and others later that year. More recently, it shifted focus to lead generation (though it included email ads as part of that mission) — a shift that involved partnering with BuySellAds.

Asked how she feels about the deal, Yin said, “Honestly, we would’ve liked to have gone all the way to become the next Google, and I wish we could’ve gone IPO! But, as a small ad network (with just a couple hundred customers and a few thousand publishers), teaming up with a larger company with a lot more resources made a lot of sense, and it’s a solid outcome.”

BuySellAds has acquired a number of other ad networks in the past, including Carbon Ads, Fusion Ads and Beacon Ads.

“We really like how LaunchBit is performance driven for advertisers, while also helping publishers monetize a medium that’s pretty tricky to monetize (email),” BuySellAds founder Todd Garland said in an email. “To high-quality content creators, BSA is the monetization solution that drives independence and sustainability through scalable, innovate ad products. To marketers, BSA is the on-demand solution for reaching relevant audiences at scale via creative ad products. So, for us, adding LaunchBit into the mix makes perfect sense.”

submit to reddit window.TechCrunch.loader.on( 'gravity-beacon', function(){ window.tc_loadGravityScript( 'recirculation' ); } );if (!ads.isMobile()) {(function(window,$){jQuery('body').append('');}(this,this.jQuery));}//initialize and attach hovercards to all gravatarsjQuery( document ).ready( function( $ ) {if ( typeof Gravatar.init !== "function" ) {return;}Gravatar.profile_cb = function( hash, id ) {WPGroHo.syncProfileData( hash, id );};Gravatar.my_hash = WPGroHo.my_hash;Gravatar.init( 'body', '#wp-admin-bar-my-account' );});if ( 'object' === typeof wpcom_mobile_user_agent_info ) {wpcom_mobile_user_agent_info.init();var mobileStatsQueryString = "";if( false !== wpcom_mobile_user_agent_info.matchedPlatformName )mobileStatsQueryString += "&x_" + 'mobile_platforms' + '=' + wpcom_mobile_user_agent_info.matchedPlatformName;if( false !== wpcom_mobile_user_agent_info.matchedUserAgentName )mobileStatsQueryString += "&x_" + 'mobile_devices' + '=' + wpcom_mobile_user_agent_info.matchedUserAgentName;if( wpcom_mobile_user_agent_info.isIPad() )mobileStatsQueryString += "&x_" + 'ipad_views' + '=' + 'views';if( "" != mobileStatsQueryString ) {new Image().src = document.location.protocol + '//pixel.wp.com/g.gif?v=wpcom-no-pv' + mobileStatsQueryString + '&baba=' + Math.random();}}(function (window, $, undefined) {var document = window.document;function loadChartbeat() {window._sf_endpt = (new Date()).getTime();var e = document.createElement('script'),url = ("https:" === document.location.protocol) ? "https://s3.amazonaws.com/" : "http://";url += "static.chartbeat.com/js/chartbeat.js";e.setAttribute('language', 'javascript');e.setAttribute('type', 'text/javascript');e.async = true;e.setAttribute('src', url);document.body.appendChild(e);}$(loadChartbeat);}(this, this.jQuery));
This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Hampton Creek In A Management Pickle As It Seeks To Raise $50 Million In Funding

It hasn’t even been a full two weeks since Ali Partovi switched from an advisor role to chief strategy officer at Hampton Creek. However, the plant-based mayo startup has confirmed that Partovi is out. This leaves the company in a bit of a management pickle. In an odd move, Partovi switched from simply advisor to second in command to CEO and co-founder Josh Tetrick at the beginning of September.

The company has also been seeking new funding over the last few months. Hampton Creek is in the middle of raising a $50 million round with a $300 million valuation at the moment. This is right on the heels of a $23 million series B in February, bringing the total amount to $30 million thus far. Partovi, who was also an early investor in Facebook and Dropbox, had contributed to the latest round. Tetrick says no deal has been inked just yet but it is coming up soon. We’ll keep you posted on that bit of news.

He also says Partovi will still stay on as an advisor to the company but that the role as chief strategy officer just wasn’t a fit. “He is an incredible person and we wish him the best,” Tetrick said on the phone, “We have lots of people who come through our doors and sometimes for whatever reason they just don’t work out, but we still think highly of him and hope he thinks the same of us.”

Both Hampton Creek and Partovi have declined to talk about the inner details of what happened. However, the WSJ reports that Partovi wrote an email to friends in which he says, “This will surely come as a surprise to you, and I’m sorry for waiting so many days to share the news… We parted ways with mutual respect. The people at Hampton Creek are incredible, and we’ll continue to wish each other well.”

Hampton Creek has been on somewhat of a hiring spree over the summer, bringing on a former Google data engineer to build out the world’s most thorough plant database, as well as several food scientists. Just Mayo products have made distribution inroads in Whole Foods, Walmart, Dollar Tree and various other places throughout the country this year and the company is close to releasing it’s eggless cookie dough product commercially within the month. It’s been busy working on a new office space in in downtown San Francisco as well. Partovi’s sudden departure seems odd at a time of such momentum for the company.

IMAGE BY Flickr USER John Liu
This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Monday, September 29, 2014

Big Data-Driven Innovation: Disruption vs. Optimization

innovation_660 thinkpublic/photopin cc

The recipe for successful innovation: begin with a good measure of disruption. Add a heaping helping of talent, and don’t forget to mix in plenty of creativity. Finally, a pinch of intuition. Stir and bake.

Recipe for innovation? Perhaps. But successful innovation? That’s another story. After all, whether an innovation will actually succeed — that is, meet or exceed its business goals — seems to require some unknown, missing ingredient to the mix. The recipe above may include necessary elements, but taken together, they are still not sufficient to guarantee success.

How’s a Digital Transformation professional to determine that secret element, that je ne sais quoi that leads to successful innovations, every time — or at least, most of the time? Simple. Let’s get out our Big Data analytics tools and crunch some data. Surely, boiling down Big Data to a syrup of innovation to that rare sprinkling of insightwill provide that missing ingredient. Magnifique!

At my company we consider innovativeness to be the most important, strategic aspect of business agility. Also along for the ride: responsiveness and resilience. Put these core business drivers together and you have a multifaceted picture of how and why businesses deal with change.

Analyzing the information at our disposal, of course, can help any organization deal better with change through a straightforward optimization process. Gather data on anything you’re doing, crunch the numbers, and make recommendations on what to adjust to make the process better. After all, such analysis has been the primary purpose of business information since early managers crawled out from their cave and held the first punch card up to the wan light of morning.

Data analytics in support of human decision making, however, has one flaw — the human. This weak link in the data-driven agility chain becomes apparent as we move to Big Data: as the data grow so too do the results of the analyses, and yet people have a limited attention span and with it, the ability to process information. It doesn’t matter how wonderful the reports your newfangled Big Data tool generate if no one has the time or predilection to read them — or even worse, understand them.

The answer to each human’s exasperating lack of attention, of course, is to say goodbye to the weakest link, and establish fully automated feedback loops. Here’s an example: any business with equipment to maintain, from airlines to factories to data centers, knows that various widgets will eventually fail. Gather enough data to determine each part’s mean time between failures (MBTF), a statistical measure that predicts when a particular doodad will give up the ghost. Consider this statistical analysis Level 1 on our road to Big Data nirvana.

Based upon the MBTF, then, we schedule a replacement before each whatzit is expected to break. However, no one really knows when it’s gonna go, so we now have to balance the prospect of replacing it too early (thus wasting money on a part that still has some useful life to it), and waiting too long, thus increasing the odds it’ll break in production — an even more expensive headache.

The traditional approach to this kind of problem is to generate a bunch of reports, feed the data from those reports into various mathematical formulas, and adjust our maintenance schedule accordingly. Such mathematical machinations would constitute analysis at Level 2.

We’ll get much better results, however, if we automate this feedback loop, thus accelerating our ability to respond to changes in the environment, as well as taking error-prone, lazy humans out of the equation. Now we’ve reached Level 3: feeding back our analysis to improve results automatically over time. In other words, we’re now more responsive to change in the business environment — an essential aspect to business agility.

As you might expect, such automated feedback has been a staple in the equipment maintenance world for a while now. However, there are many other business areas that have yet to take a page out of the broken whatzit playbook. Does your organization, say, optimize its salaries based upon business outcomes — in real-time? Do your security policies balance the cost of security with the corresponding risk of loss, again in real-time? In general, how many of the processes in your organization are subject to continual optimization based upon automated, data-driven improvements?

Such business-centric automated feedback is perhaps one of the largest potential Big Data benefits in the enterprise today — although adoption of this approach is spotty at best. Let’s say, however, that you’re one of the progressive early adopters in the automated Big Data-driven feedback world. Does this streamlined ability to optimize all aspects of your business improve your ability to innovate?

Perhaps, but not in a straightforward fashion. As I explained in an earlier Cortex newsletter, optimization activities in the absence of disruption will lead to local optima, but only disruption-driven innovation will lead to the most strategic outcomes. Does that mean innovation is always a crap shoot? Or is there some way we can improve our odds of successful innovation, perhaps by leveraging feedback-driven Big Data optimization techniques?

Time for a hypothetical example. Let’s say a leading consumer electronics manufacturer, perhaps named after a fruit, decides to create their first ever wrist-mounted Internet-of-Things device: the Banana Watch. Such devices are a new market for the Banana Company, and in fact, their device is so innovative that it’s essentially creating an entirely new market segment on its own (much as the Banana Pad did a few years ago).

So, is Banana Inc. taking a complete flyer on the Banana Watch? Or do they have data to suggest the Watch will be successful? And furthermore, how do those data help them to optimize their innovation process itself?

One the one hand, entering a new market, especially when you’re creating that market as you go, is always risky. But on the other hand, they do have extensive data about customer buying behavior, price points, design metrics, related markets, and a plethora of other information that feeds an internal analytics algorithm that is indubitably second-to-none.

The reason Banana is so successful in the broader consumer electronics market — and in fact, has been so successful over and over again — is they optimize what they can optimize and they disrupt what they must disrupt. They never make the mistake of trying to optimize what they should disrupt, as that approach would stifle innovation. But they also avoid the mistake of disrupting what they should optimize.

The lack of useful optimization, either because of lack of data, insufficient analytics, or a simple dearth of management will is actually a risk factor for innovation, just as excessive or misapplied optimization is. In other words, it’s a gigantic mistake to believe that you can innovate your way out of a lack of insight — insight into your market, your customers, or your business. Sure, people try it all the time — but most of the time they fall flat on their face. The few people that manage to succeed at such innovation-in-the-dark are simply the lucky ones.

For companies that understand how to balance optimization and disruption, luck is still a factor in how successful any particular innovation will be — just as luck is a factor in whether a particular widget will outlive its MTBF. Taking Big Data-driven optimization to the highest level is how companies make the most of their breakage-prone widgets, just as it is the secret to any organization who wishes to establish innovation as a core competency. Know when to optimize, and know when to disrupt — and above all, know how to tell the difference.

Jason Bloomberg is President of Intellyx. Jim Scott at Intellyx subscriber MapR and Raj Dalal at BigInsights provided ideas for this post. 


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Relationships 2.0: The New Role of the Web in Offline Relationships

handshake_660 Richard.Asia/Flickr

Today, almost three-quarters of U.S. adults on the internet use social media. Take a moment to let that sink in. In just over a decade, social networks have sprung from nonexistence to the point where 74 percent of American adults with an internet connection have a social media profile. If three-quarters seems low to you, remember that this statistic is for adults on the internet; it includes grandmothers who use the internet solely to check email, but not their high school grandchildren who constantly Instagram their selfies.

However, for something so prevalent in our society, there is surprisingly little conclusive research on how social media affects our offline relationships. Yes, there have been articles proclaiming the downfall of personal relationships because of social media, but there have also been studies arguing that social networking leads to greater amounts of personal interaction.

So which is it? Unfortunately, I don’t have the definitive answer, and I doubt we’ll get it anytime soon. What I can say, though, is that I disagree with the notion that social media is negatively affects our personal relationships and the way we interact with people offline. Instead, I view social media as a supplement: an online way to enhance our offline relationships.

A common argument against social media is that we “like” and “retweet” instead of picking up the phone and calling. Sure, social media helps us keep in contact with our friend or family member who is thousands of miles away. But what if they’re right around the corner? This is where social media seems to get a bad rap and is blamed for hurting relationships.

Let’s be clear: It’s up to each individual to decide whether or not they’ll make the effort to meet with someone in person, and then whether they’ll choose to engage or just spend time on their phone. But social networks don’t have to be the bad guy. Aside from facilitating contact prior to the meeting, social networks and the information hosted there provide an all-important touch point during a meeting, even a casual one.

When meeting a friend for a quick drink, for example, a good part of the conversation is dedicated to catching up: what’s new, where have you been, how are your friends, etc. Between Facebook, Twitter, LinkedIn and other social networks, though, you might have already seen the basics and want to get down to the specifics, like asking about a specific trip or how the new baby is doing. Because people populate their profiles with just such information, social media provides a bridge between online and offline and helps you find common ground faster.

After all, you don’t really remember the small talk after meeting someone: you remember the common ground you discovered, like shared interests, mutual friends and common experiences. Small talk — the weather, the basic catch up questions — was the bridge before social media. Now, social media can give you insight into that common ground before you even get to the meeting, saving the initial awkwardness of not knowing what to say and preparing you to make more meaningful and immediate connections.

The case for using social media as a supplement to real-life social situations extends from quick get-togethers to professional contexts. Finding shared interests and making meaningful connections are the reason that deals are signed on the golf course, not just the boardroom.

A scenario: A sales professional takes a potential client out for a round of golf. On the third hole, they find out they went to the same high school, hit it off, and by the eighteenth hole they’re negotiating a contract. It was always a stroke of luck when you discovered that common ground and were able to make that connection. These moments don’t have to be based on luck anymore. Their Facebook page can give you all the insights you need for a few good conversation starters — like discovering you’re both fans of the same football team.

All this being said, there’s still a chance that someone will choose to connect via Facebook Messenger instead of talking in person — and that’s OK. The popularity of social media is not an indication that the era of face-to-face contact is coming to an end. It simply provides another tool to get to know each other, and can even make that in-person meeting all the more meaningful.

Just remember to put down the phone once you get there.

Bhavin Shah is the CEO and co-founder of Refresh.


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

If You Want An Android Smartwatch, Get The Moto 360

Like the serfs on the anarcho-syndicalist commune in Monty Python And The Holy Grail, fans of Android Wear and the $249 Moto 360 have been moaning under the oppressive noise regarding the yet-to-be-released Apple Watch. “You’re biased,” they scream as they swipe desperately at their Google Now cards. “You never cover the real winners.” Well here I am, covering the real winner (for now). I’ve had an opportunity to wear their pet product for a few weeks now and, with all of our Disrupt frippery out of the way, I wanted to address the good and the bad of Motorola’s latest addition to the smartwatch parade.

The Moto 360 is a very simple thing. The device is the first round of Android Wear watch, and it looks, when not active, like a big black disk. It has a 1.56-inch display and leather straps and features a powder-coated steel case and Gorilla Glass screen. At its core the watch does very little any other smartwatch on the market can’t do. It is focused on notifications. You can see new calls, messages and a brief selection of email subjects. It brings in weather and stock quotes through Google Now as well as directions. It has a small haptic motor inside for silent feedback, and it can listen to your voice and return directions, information or even send messages and texts.

Does it work? Yes. When it works well it’s a quiet partner in crime, notifying you of messages and important information and, most importantly, offering walking and biking directions like a trusty AAA Road Atlas. While there is some jitter thanks to an older processor, the watch responds quite quickly to spoken requests in a quiet room but has to churn a bit to figure things out at a party or in a noisy area. However, when it works it works as expected: like a little bit of magic.

And when it fails? That’s a different story. The watch is only as smart as the phone it’s paired with and many times the watch would disconnect from the Moto X I was using it with and go into “No Cloud” mode. This essentially turned the watch into a glorified Basis Band, measuring heart rate using a small LED sensor and steps using an internal accelerometer. You access the speech-recognition features by tapping on the screen or the button on the side and, when the watch disconnected, this resulted in a bit of spinning and then a half-hearted recommendation to try a few things that didn’t require Internet connectivity. Sadly I saw the “No Cloud” icon more than I’d have liked and was often stuck while demoing the watch to people because it just wouldn’t work. This didn’t happen all the time nor was it normal behavior, but it was just annoying enough to be maddening.

The Culture We Obsessed Over This Month, From Tintin to Tabletop Games

Dominique Maricq, Hergé and the Treasures of Tintin
If you had even a touch of "indoor kid" about you as a youngster, then you know that the Tintin graphic novels were the best thing Belgium ever produced. Dive through the panels and into the legend with this insane coffee-table stew of biography, exegesis, and behind-the-scenes material. (Expand the gallery for more details.) —Peter Rubin Josh Valcarcel/WIRED

Dominique Maricq, Hergé and the Treasures of Tintin
If you had even a touch of "indoor kid" about you as a youngster, then you know that the Tintin graphic novels were the best thing Belgium ever produced. Whether it was the cowlicked kid's globe-trotting adventures that reeled you in or the indelible cast of characters (Captain Haddock! Professor Calculus! Thomson and Thompson!), you spent many a rainy afternoon with Hergé's staple-bound volumes. Now, a new coffee-table book blends biography, lore, and more archival sketches and unpublished panels than you ever thought possible. Title by title, Maricq unpacks the plot, context, and artwork of each adventure—the book even includes replicas of Hergé's notebook pages. I've been reliving so many favorite moments that I've almost been able to forget the racist-ass hideousness that was Tintin in the Congo. Almost. ($38, Amazon —Peter Rubin Josh Valcarcel/WIRED Isaiah Toothtaker, That's Not Relevant
There's something blessedly simple about iOS and Android's stock emoji—faces, buildings, farm animals, etc.—but Isaiah Toothtaker's are far more complex. The MC/tattoo artist/graphic designer's book is filled with the kind of emoji you wish you had for very specific texts. Hey, Tim Cook, any chance you can get these into iOS 8? —Angela Watercutter Josh Valcarcel/WIRED

Isaiah Toothtaker, That's Not Relevant
Emoji are the hippest form of communication around, mostly because they're not really hip. The joy comes in turning the little pixel smiley faces and barnyard animals into actual reactions. Isaiah Toothtaker's emojis, on the otherhand, are far more literal. The MC/tattoo artist/graphic designer's book That's Not Relevant is filled with the kind of emoji designs you wish were real, if only for very, very specific texts. A Playboy bunny wearing a "Play on Player" t-shirt, for example, or an image of Drake the inscription "No Basics Zone." There's even an illustration of a flat tire that says "I Woke Up Like This." They say the Apple Watch will have animated emoji, but I'm betting none of them will be as cool as these. ($20, Spork Press) —Angela Watercutter Josh Valcarcel/WIRED Jungle, Jungle
I've been checking for this group since early this year, but their self-titled debut in July and current world tour has kept them top of mind lately. Their global-soul sensibility sounds warm and full on vinyl, and the crisp beats inspire some serious living room dance parties. —Katie Davies XL Records

Jungle, Jungle
I can't say this is a new obsession, as I've been hungrily listening to and watching this group since early this year, but their self-titled debut in July and current world tour has kept them top of mind lately. Their global-soul sensibility sounds warm and full on vinyl, and the crisp beats inspire some serious living room dance parties (and if you need inspiration, check the the four videos they've released from the album so far). My favorite track is still their first single, "Platoon", released last year—and as many times as I’ve watched the video featuring an amazing 6-year-old B-Girl, it still doesn’t get old. Head over to their website to watch the videos, to see if they’re coming to a town near you, and purchase the album yourself. Pro tip: click on those glittery gold icons at the top to navigate and prepare those shoulders for shaking. (LP/CD/FLAC formats available at XL Records, MP3 album $6.99 at Amazon)—Katie Davies XL Records Edgar R. Murrow, Reporting World War II
Before Pearl Harbor happened, the only exposure many Americans had to the war was CBS' Edward R. Murrow, the London-based correspondent. Today, his smooth-voiced broadcasts are as much poetry as time capsule, and Murrow's verbal artistry makes this collection of dispatches as enjoyable as any new album on Spotify. —Joe Brown

Edgar R. Murrow, Reporting World War II
Before Pearl Harbor, America was largely unaware of the war raging in Europe. The only way many Americans heard about it was through the radio broadcasts of CBS' Edward R. Murrow, the London-based correspondent who lived through the 57-day Blitz alongside the city’s residents. His smooth-voiced reports were more like NPR audio postcards than the barked-out style we know from old-timey newsreels: quick stories of everyday heroes and victims, more apt to quote Marcus Aurelius than a living world leader. Today, the clips are as much poetry as time capsule, and Murrow's verbal artistry makes this collection of dispatches as enjoyable as any hot new album on Spotify. (Yes, it streams.) Murrow’s reports were among the first embedded broadcast journalism, and yet almost not journalism at all. How can you be objective if you’re a potential casualty? Pour a drink and ponder that—or just listen to a message from another time and be thankful that it exists. —Joe Brown J.P. Dunleavy, The Ginger Man
J.P. Dunleavy’s criminally underrated debut centers on Sebastian Dangerfield, a young American studying law (and alcoholism and infidelity) at Dublin’s prestigious Trinity College. Nearly 60 nears later, it remains a funny, shocking read—as fun, and boozy, as a pint of Guinness. Or ten. —Max Ufberg Josh Valcarcel/WIRED

J.P. Dunleavy, The Ginger Man
First published in 1955, J.P. Dunleavy’s tale of beer, sex and public indecency takes us inside the mind (and loins) of Sebastian Dangerfield, an American who comes to Ireland, wife and newborn in tow, to study law at Trinity College. “Study” is in this case a slight misrepresentation; most of the novel’s 338 pages are devoted to our lowly protagonist’s drunken exploits and escapades. There’s sex, beer, more sex, more beer, and a few fights. To call Dangerfield a protagonist doesn’t quite suit the character, as the only things he seems passionate about can be found either in a pint glass or a skirt. But what’s even more remarkable than Dunleavy’s knack for humor is his ability to make you care about a guy who amounts to little more than a monster. When Sebastian Dangerfield lulls you into some false sense of understanding, pulling a fast one on you just like he does to his growing list of landlords and lovers, you’re left questioning your own judgment and self-worth. ($11.98, Amazon) —Max Ufberg Josh Valcarcel/WIRED Edan, Beauty and the Beat
This 34-minute masterpiece from 2005 sounds old, new, and futuristic at the same time. It might as well be called “If ‘60s Was ‘90s”: Pink Floyd synths, Manzarek organ breaks, and monster riffs blend together under a lyrical flow that echoes the golden age of hip-hop. —Tim Moynihan Lewis Recordings

Edan, Beauty and the Beat
Let’s say you’ve got a time machine that’s also a spaceship. (Bear with me here.) Your launch point is Earth in 1994, and your destination is Mercury in 1968. Go ahead and super-glue this album into your vehicle’s 8-track deck, because it’s the ultimate soundtrack for that trip. Edan’s self-produced 2005 masterpiece—which shares a name with a Go-Go’s album—layers classic hip-hop on top of ‘60s psychedelic rock, and the tight production makes it sound old, new, and futuristic at the same time. Pink Floyd synths (“Torture Chamber”) transition into what sounds like Ray Manzarek organ breaks (“Making Planets”), and ultimately evolve into dinosaur riffs and Small Faces samples (“Rock and Roll”). The lyrical flow is equally diverse, with Beasties-like back-and-forths over wah-wah effects (“The Science of the Two”) and doubled-up rhymes over Hebrew crooning and strings (“Promised Land”). Just stop reading this and listen to the whole thing. It’ll only take you 34 minutes. ($8.99, Amazon) —Tim Moynihan Lewis Recordings
This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Xpire’s App Makes All Your Social Media “Ephemeral”

Dallas-based computer science college student Jesse Stauffer wants to make social media more private. With help from his brother and financial backing from Mark Cuban, he recently released an iOS application called Xpire that lets users share “self-destructing” posts on Facebook, Twitter and, now Tumblr, as well as use a variety of tools to better manage and shrink their digital footprints.

The app, which first launched earlier this summer, has now been updated to include a feature that lets you rank your own Twitter account based on the amount of inappropriate content it contains, as well as new tools to help you manage and remove unwanted followers. It has also expanded support beyond Facebook and Twitter to also include “self-destructing” Tumblr blog posts and more.

It’s effectively a way for a user to regain some privacy on the more popular social media platforms around today. And it’s a pretty decent Twitter management tool, as well, allowing you to view and delete up to 3,200 of your most recent tweets, erasing them with a tap of a button, or even surface old tweets by keyword(s).

However, its larger selling point is the ability to share social networking posts that will disappear in the time frame you specify in the app, whether that’s minutes or days.

screen568x568Stauffer said he was originally inspired to create the service after seeing his peers post questionable content on social media, and realizing how that could impact them in the future when it came to applying for jobs and more. Plus, he explains, sometimes users would post long rants or “small and meaningless” content that they may not want to have stick around forever. Time-sensitive content, too, like “I’m at the mall. Who wants to hang out?” also doesn’t require a lengthy shelf life, he says.

Initially, he and his brother were working on a similar private sharing app called Bitzy which, much like Snapchat, let users share self-destructing photos and text. He then reached out blindly to Cuban via email to tell him about the idea, and Mark actually responded. After some discussion, Cuban suggested that instead of growing his own social network, he integrate with pre-existing ones.

Of course, Cuban has his own investment to protect in this area. His latest company CyberDust — which he recently spoke about at TechCrunch Disrupt SF 2014 –  is a private messaging app, too.

And Cuban’s advice to Stauffer could be risky; there’s danger in building your own company on top of others’ platforms, as we’ve seen time and time again, including, most recently, with the failure of BranchOut, a “LinkedIn on Facebook.”

But while the big social networks and their APIs play nice with Xpire, Stauffer could generate a decent bit of revenue by selling premium features via in-app purchases, as he intends to do. Stauffer has given Cuban the co-founder title, but from the sounds of things, he’s more an investor/advisor than involved in day-to-day operations. (Stauffer reaches out to him via CyberDust, in fact.)

Stauffer himself coded 100 percent of the Xpire app, he says, and his brother aided with the design. Cuban’s Radical Ventures is the sole investor in the three-month old application.

Currently, Xpire is a free download here on iTunes.


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Sunday, September 28, 2014

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

us-spy Getty

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropout in his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowden’s revelations about the government’s intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

John Brooks is now among them.

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the “to” and “from” headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he’d made Ricochet’s code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

“Ricochet is idiot-proof and anonymous.”

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists’s sources and others. It’s not just these kind of people whose privacy is harmed by metadata, however; in 2012 it was telltale email metadata that helped unmask former CIA director and war commander General David Petraeus and unravel his affair with Paula Broadwall.

With metadata suddenly in the spotlight, Brooks decided earlier this year to dust off his Ricochet program and tweak it to make it more elegant—he knew he’d still have a problem, however, getting anyone to adopt it. He wasn’t a known name in the security world and there was no reason anyone should trust him or his program.

Enter Invisible.im, a group formed by Australian security journalist Patrick Gray. Last July, Gray announced that he was working with HD Moore, developer of the Metasploit Framework tool used by security researchers to pen-test systems, and with another respected security professional who goes by his hacker handle The Grugq, to craft a secure, open-source encrypted chat program cobbled together from parts of existing anonymity and messaging systems—such as Prosody, Pidgin and Tor. They wanted a system that was highly secure, user friendly and metadata-free. Gray says his primary motivation was to protect the anonymity of sources who contact journalists.

“At the moment, when sources contact a journalist, they’re going to leave a metadata trail, whether it’s a phone call record or instant message or email record [regardless of whether or not the content of their communication is encrypted],” he says. “And that data is currently accessible to authorities without a warrant.”

When Brooks wrote to say he’d already designed a chat program that eliminated metadata, Gray and his group took a look at the code and quickly dropped their plan to develop their own tool, in favor of working with Brooks to develop his.

“He writes incredible code,” Gray says, “and really thinks like a hacker, even though he doesn’t have a security background.”

Brooks, who moves around a lot but currently resides with his parents in Utah, has been working as a contract software engineer developing a Linux-based smartphone for the Finnish firm Jolla.

Although a number of encrypted communications solutions already exist for email and chats, many are not entirely secure or are difficult to use. What’s more, few solutions purport to eliminate the metadata problem. Ricochet’s absence of metadata, and its ease of use, means it has a good chance of going mainstream in a way others have not.

Wickr, for example, is a competing encrypted chat program that doesn’t preserve the communication or metadata of users, so there’s nothing recorded by default for spy agencies or law enforcement to collect from Wickr with a court order. But unlike Ricochet, it uses central servers to transmit the communication, which Brooks says make users vulnerable to timing attacks. Anyone tapping the connections to Wickr’s servers could conceivably map the parties who are communicating and establish relationships between them.

Ricochet’s absence of metadata, and its ease of use, means it has a good chance of going mainstream in a way others have not.

“[I]ntel agencies can watch the traffic going in and out, and just the timing of those messages will probably be enough to tell you which IP address is talking to this IP address,” Brooks notes.

Wickr CEO Nico Sell says the company has implemented a number of solutions, including proprietary ones that she declined to identify, that prevent timing attacks from occurring. So far, however, Wickr is only available for the mobile platform, though Sell says they’re expanding to other platforms soon.

Tox is another solution that isn’t ideal in its current state. A protocol developed by members of the 4Chan forum, it uses peer-to-peer technology to securely transmit files, text, and voice communication. But it has at least one problem.

“Tox pushes [secure communication] forward in that there’s not really a central server…but as it’s currently designed, it allows a direct IP-to-IP connection [that can be tracked],” says Gray. “That’s the problem with this whole anonymous space. Nine out of ten people who are trying to do it don’t really know what the problem is. The problem is metadata.”

Brooks says he’s surprised it has taken this long to address the metadata problem; though given that user-friendly email encryption is still something developers have yet to perfect, it perhaps shouldn’t be a surprise.

“We should have had [content encryption] figured out fifteen years ago,” he says. “It’s embarrassing as a securing industry that…we’re scrambling to [get it right] now. But the metadata is something fairly new and very challenging and something we’re only figuring out now.”

To build Ricochet, Brooks patterned his program on something that already existed—TorChat, a peer-to-peer instant messaging program released in 2007 that used Tor hidden services to transmit communications. TorChat had a number of implementation problems when it came out, however, and has largely been abandoned by users and its developers. Brooks vastly improved the concept.

Ricochet doesn’t communicate with central servers like Wickr and doesn’t allow direct connections like Tox. Instead, each desktop client operates as a Tor hidden service and uses the Tor network to transmit encrypted and anonymous communication. The client generates a random 16-character public key or ID to authenticate the user and establish the channel for secure communication in a simple way that doesn’t require users to install Tor separately. Generating the public key occurs with a single click, and the key is stored on the user’s machine, or on a USB drive so a user can communicate with Ricochet from different machines.

“It is idiot-proof and anonymous,” says Gray.

When someone wants to communicate with another Ricochet user, their client reaches out through the Tor network to arrange a rendezvous point. The client first connects anonymously via three hops to a Tor relay, which doesn’t know where the connection originated. That relay looks up the other person’s Ricochet client ID—published by the person in their Twitter profile or email signature—and obtains a list of other Tor relays that can be used to reach out to the other party’s Ricochet client—a list that changes every 24 hours. When the message reaches the other Ricochet client indicating a neutral relay for the rendezvous, the two clients meet there to exchange communication. But at any time, there are at least six relays between the two users, three on each side.

“At no point do you ever contact anyone directly,” Brooks says. “There is no way you could find my IP address or anything about who I am or where I am. [A]nd the rendezvous point in the middle can’t find out anything about either of us.”

The first relay is the only one that knows your IP address, but it doesn’t know the ID of your Ricochet client and can’t match your IP address to that ID. It also doesn’t know the Ricochet ID of the person you’re trying to contact. That only gets revealed to the relay three hops down the line from you, which peels off a layer of the Tor encryption to reveal the ID.

“If you have two people communicating and someone is [passively] monitoring one or the other party, this will protect them,” Moore says. “Unless someone is [directly] monitoring that person and you at the same time, it will be very hard to identify the communication.”

“At no point do you ever contact anyone directly,” Brooks says. “There is no way you could find my IP address or anything about who I am or where I am.”

Ricochet is already available for download as a binary. But Brooks has been revamping the custom protocol Ricochet uses to make it more secure before they release a new version in November. Invisible.im recently got $10,000 from Blueprint for Free Speech, an Australian non-profit, to fund Brooks’ development costs and with that group as a fiscal sponsor now, Invisible.im can also apply for grants as an NGO.

The new version of Ricochet they plan to release in November will use the revamped protocol and have a file-transfer feature. Although the code hasn’t undergone a proper security audit yet, the group is negotiating with a code-review firm to run a scan on the completed program, and they plan to conduct a full security audit once the revamped protocol is done. They don’t anticipate any surprises, though.

“John writes good code, so we’re not expecting a horror show,” Gray says.

They also eventually want to add another layer of encryption on top of the existing Tor encryption—given that the NSA has reportedly been trying for years to crack Tor—as well as more features to authenticate users.

When it’s all done, Gray says Ricochet will have “meaningfully” advanced the state of communications privacy.

He notes that their aim, however, isn’t to stop the NSA from tracking legitimate national security threats but to simply prevent people “from leaving vast trails” of what should be considered private data.

“It’s a matter of being able to have some confidence that a conversation you’re having is private. If the NSA is already targeting you, you’re screwed,” he says, because the NSA likely already knows who you are and has compromised your computer. “But this is about stopping the wholesale violation of privacy and making it harder for people who shouldn’t have access to this information from having access to it.”


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Out in the Open: A Blogging Tool That Lets You Actually Own What You Post on Facebook

Blogging Ariel Zambelich / WIRED

All that stuff you post to Facebook and Twitter and so many other social media sites? Ben Werdmuller and Erin Richey want put it back in your hands.

Werdmuller and Richey are part of the Indie Web movement, a loose knit group of hackers and designers reclaiming control over their online lives, grabbing them back from the big name web companies. They run a company called Known, and its first product plays right into this ethic. It’s an open source publishing tool designed to provide a way of more easily publishing status updates, blog posts, and photos to a wide range of social media services, including Facebook, Flickr, and Twitter. But it comes with a twist: it lets you keep a copy of whatever you publish and post on your own site.

The idea is that you can more easily organize all your digital info in one place, and more easily show it to others.

Ben Werdmuller and Erin Richey Ben Werdmuller and Erin Richey Known

Although Known can be used with almost any kind of website, the company is targeting tools offered by higher education—at least initially. The tool integrates with the “learning management systems” used by many universities—tools such as Blackboard or Moodle. In this way, it lets students post assignments, questions, and ideas on their own websites. But since Known also dovetails with popular social media services, it can act as a central hub where students can manage all of their online content, from homework to photos from last night’s party.

Part of the pitch is that the tool offers fine-grained privacy controls, so that you can reclaim some of the privacy stolen away by the giants of the web. And once the students graduate, Known can act as a complete portfolio of their work and life, while continuing to double as a way of handling status updates and photos on social networks.

Richey says the Known team is also aiming to provide a blogging service that’s much easier to use than other typical open source tools. Part of that involved designing the tool for mobile devices as well as the web, but the team also built it from the ground up to work with social networks. Most other tools handle cross-posting with third party plugins that could break at any time.

At the very least, the tool is an improvement over most of the learning management systems used by universities. These are a nightmare, says Jim Groom, director of learning technology at the University of Mary Washington in Virginia, which is running one of the first Known pilots. “No one actually wants to use Blackboard,” he says. “Known is an elegant solution.”

But building a slick user interface is only half the battle for Known. One of the big problems with the indie web movement is that it typically produces tools that are difficult for less technically minded people to setup and configure. It’s dead simple to sign-up for a Twitter account, but getting an open source alternative running on your own server, and registering your own domain name, requires more work. That’s one of the reasons Known is partnering with universities.

In a way, people like Groom and and his assistant, Timothy Owens, can then help push Known into the larger world. They run a digital literacy initiative aimed at helping Mary Washington students better understand life on the web. “There’s been this brutal narrative of the digital native,” says Owens. “People think they already supposed to know this stuff, but they don’t.” But Known and other tools can help change that.

In addition to providing web space where students can automatically install open source software such as WordPress, MediaWiki, and Known, the school buys every student their own internet domain name. The school even became an official reseller of domain names in order to facilitate the process. It’s an idea that Groom is so passionate about, he co-founded Reclaim Your Domain to promote the idea outside of the university as well.

By giving students their own domain, Groom and Owens hope to help students maintain their own web presence after graduating. Once their content has been migrated from the campus servers to a new hosting service—or Known’s hosting service—all students will need to do is point their domains to the new location.

That’s all months, or years, down the road. University of Mary Washington has only just begun its Known pilot program. Owens is using it as part of a class he teaches on digital storytelling, and a few students have already started playing around with it. But it could be another small step forward for the indie web.


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

A Stretchable, Light-Up Surface Inspired by Squid Skin

Squid and other cephalopods control their skin displays by contracting color-filled cells. A team of engineers attempted the same using elastomer and electrical pulses. Squid and other cephalopods control their skin displays by contracting color-filled cells. A team of engineers attempted the same using elastomer and electrical pulses (right). Qiming Wang et al./Nature Communications

Displays are becoming flatter and flexible, so why not stretchable as well? A study published today in Nature Communications describes a paper-thin, elastic film that lights up when stimulated by an electric pulse. It’s a technology that could some day be used to make fold-up light sources, on-demand camouflage, or possibly even the Tron jumpsuit you’ve always wanted.

The engineers of the film were inspired by the skin of octopuses, squid, and cuttlefish, which can change color using tiny, ring-shaped structures called chromatophores. Each chromatophore is pigment-filled and ringed with tiny muscles. By contracting or expanding the chromatophores in different patterns, the cephalopods can create dazzling displays, or camouflage themselves from sight.

The new soft, stretchable elastomer is chemically combined with artificial, fluorescent-color versions of chromatophores, called mechanophores. Electrical pulses activate the mechanophores and create flourescant patterns. Different pulse strengths change the colors, and once the pulse is shut off the pattern instantly clears.

The sample developed for the study was tiny (smaller than a square inch), the color control was unsophisticated, and it was limited to crude patterns. In other words, it’s not quite ready for watching “Monday Night Football” on a stretching widescreen. But this is just the first attempt at a stretchable film with this kind of reversible color control (previous stretchable displays had non-reversible light up patterns), and there is plenty of room for improvement.

Under different electrical pulse strengths, the elastomer contracted into tiny bumps, creating different fluorescent patterns. Under different electrical pulse strengths, the elastomer contracted into tiny bumps, creating different fluorescent patterns. Qiming Wang et al./Nature Communications

Home Page Photo: Robert Young | CC BY­ND


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Sailor Zombie Lets You Shoot Undead Japanese Pop Stars

akb48_660_2 Bandai Namco/Screenshot: WIRED

TOKYO—How much do you love the members of Japan’s pop idol group AKB48? Enough to shoot them?

The new arcade game Sailor Zombie is another iteration of the ubiquitous transmedia empire known as AKB48, a group of 48 young women singing pop songs in schoolgirl outfits. Its members are ubiquitous in Japanese advertising, appear on television programs every day of the week, and star in their own videogames. AKB48 games traditionally have been dating simulators marketed toward male fans or music games aimed at children, but Sailor Zombie is a shooter in which the girls are your targets.

It’s about as disturbing as it sounds.

After dropping a few coins into a Sailor Zombie cabinet, players choose a partner from one of seven AKB48 girls, and the two of you meet on a darkened street late at night. I chose to team up with Anna Iriyama. Already a zombie, she begged me to shoot her to save myself from infection. But this wasn’t a mercy killing: My gun, she said, contained a “love vaccine” that would temporarily reverse her condition.

From this point on, Sailor Zombie becomes a familiar arcade shooting gallery: The camera moves automatically, and you shoot the girls and other infected civilians as they shamble toward the screen. The game cabinet uses rumbling seats and blasts of air to keep your nerves frayed. When my partner first lunged at me, I was shocked to feel her breath on my face.

The scares subside when the music starts and the girls, still zombified, sing and dance through their hit single “Flying Get.” Players pull their guns’ triggers along with the musical cues. Even when saddled with an infectious disease that robs them of their humanity, AKB48 never stops performing.

There’s little to recommend about Sailor Zombie outside of the curiosity factor. As gun games go, it’s unforgiving—your weapon fires slowly and enemies require multiple hits before falling. And at 200 yen (about $2) per play, a full run-through of Sailor Zombie could cost you 30 bucks. The rhythm game aspects are no better than any other music games easily found in Japanese arcades, most of which feature AKB48 songs.

Even if the gameplay had more polish, I’d still avoid playing Sailor Zombie again. It’s about shooting famous women in the face. The virtual likenesses of the girls are uncanny-valley realistic, and don’t look much like zombies. There’s no rotting flesh, no blood, no wounds. They mostly just look like normal people wearing olive drab makeup.

AKB48 members already are treated like commodities. Part of the appeal of the group is the perceived “availability” of the girls: They are not allowed to date. Fans vote in elections that determine their “rankings” within the group. They frequently participate in “handshake events” where they meet fans. Earlier this year, two members of the group (including my in-game partner Anna Iriyama) were attacked at one of those events by a man wielding a saw blade.

“Love vaccines” or no, Sailor Zombie is carrying a bit too much baggage to be fun.


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

New Hybrid Mercedes Guilt-Trips Drivers Into Using Less Gas

Mercedes-Benz unveiled the S550 Plug-In Hybrid this week. Like the gas-powered S-Class on which it’s based, the company’s first plug-in hybrid looks fantastic and is loaded with high-tech features. We’ve come to expect this kind of excess from the flagship sedan, but what’s most impressive about the new car is that when it comes to fuel economy, it’s remarkably restrained.

Mercedes promises the turbocharged V6 and electric motor, powered by an 8.7 kilowatt-hour lithium-ion battery, will provide “the performance of a V8 and the fuel consumption of a compact.” It claims the luxo-barge consumes just 2.8-liters per 100 kilometers, which works out to 84 mpg by our math. To deliver that kind of fuel economy from a car that weighs 2.5 tons, Mercedes uses two tricks: A pedal that pushes back against lead feet, and software that analyzes traffic and topography to get the most out of the battery.

Nissan first put the meddle to the pedal six years ago with a haptic accelerator for its gas and hybrid models. Its Eco Pedal pushes back against the driver’s foot when the car’s sophisticated software decides you’re being a bit too assertive with the acceleration. It’s the high-tech equivalent of putting a grapefruit under the gas pedal. There’s some science to back up the technology. A 2013 study from the University of Warwick tested how drivers react to a stimulus triggered when they pushed the pedal past the 50 percent threshold. The results showed “significant decreases” in how the drivers accelerated, the authors write, and “workload decreased when driving with the haptic pedal as compared to when drivers were simply asked to drive economically.” In other words, humans are better at saving fuel when they have some help from their cars.

The pedal in the S550 plug-in works just like Nissan’s, but the goal is a bit different. The idea isn’t simply to tell the driver to ease off, but to warn him that he’s about to fire up the gas engine. Unlike hybrids, plug-in electric cars can drive at everyday speeds on battery power alone (the S550 can hit 87 mph on electricity alone; the gas engine is good for 130 mph). Usually, a car will stay in electric mode until the battery’s drained or until it needs the added oomph of internal combustion to provide the acceleration demanded by the driver. Because PHEVs are new to most people, Mercedes thinks its customers could use some help getting used to how they work, and how to drive them most efficiently. The haptic feedback of a pedal pushing back against your foot essentially tells you, “Hey… keep it up and the engine will kick in.” Implicit is the message: Do you really need to go faster, or would you rather save fuel?

Mercedes-Benz S550 PLUG-IN HYBRID (13) Daimler AG

Trick number two is the “intelligent operating strategy,” a fancy way of saying the S550 is programmed to know where it can recoup kinetic energy and charge the battery through regenerative braking. It has three ways of figuring that out:

The driver can change the transmission mode to indicate he wants more sporty or more economical driving. The latter will be heavier on the regen.If the car’s radar senses a vehicle slowing down ahead, it provides a “noticeable double impulse” in the pedal, hinting the driver should ease off. That kicks the car into EV mode and increases the regenerative braking, so when the driver hits the pedal on the left, more energy is recouped.Thanks to GPS, the Benz knows when hills are coming up. If it senses a climb followed by a downhill stretch, it will use more battery than engine power to get up. The point is to drain enough juice so that all the energy captured on the ride down the hill can be stored. No battery power wasted, and a bit of fuel saved.

The S550 will be available in California next spring, and the rest of the US sometime around 2016. There’s no official word on the price, but Mercedes says it will cost a bit more than the $92,900 S550 base model.


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

NASA Picks Boeing and SpaceX to Build Its Space Taxi

The SpaceX Dragon at the International Space Station. The SpaceX Dragon at the International Space Station. NASA

Let the space race begin.

NASA announced on Tuesday that it has awarded two multibillion dollar contracts to Boeing and Space Exploration Technologies, better known as SpaceX, to develop spacecraft to shuttle astronauts to and from the International Space Station. The contracts will make the two companies the first commercial businesses to send NASA astronauts to space, fulfilling the government’s commitment to commercial spaceflight ever since NASA retired its space shuttle fleet back in 2011.

But more than just a windfall for Boeing and SpaceX, which were awarded $4.2 billion and $2.6 billion respectively, the announcement also serves as an important first step toward kickstarting the commercial space industry, which includes other companies like Richard Branson’s Virgin Galactic and Sierra Nevada Corp. that seek to make space travel accessible to the rest of us. As NASA astronaut Mike Fincke said at Tuesday’s press conference: “I look at these spacecraft as the keys to the doorway to space, where we’re trying to open the door to more and more people getting to see what we’ve seen from space, our beautiful planet and beyond.”

According to NASA administrator Charles Bolden, the partnership will begin to end NASA’s reliance on Russia, which has been taking astronauts to space since the U.S. shuttle program ended. “The greatest nation on earth shouldn’t be dependent on any other nation to get to space,” Bolden said.

Partnering with these companies will also serve another important purpose for NASA. It will allow the agency to concentrate on what Bolden called a “more ambitious mission”—namely, sending humans to Mars. Bolden spoke at length about NASA’s ongoing progress with the Orion spacecraft, which is being developed to send humans farther than ever before, including to an asteroid and Mars. Orion, which is set to launch its first uncrewed mission in December, could enable NASA astronauts to become the first to take samples of asteroids, or, Bolden added, “perhaps the first to grow their own food and eat it in space.”

While such accomplishments may be many years away, Boeing and SpaceX are operating on a much tighter timeline. Boeing’s CST-100 capsule and SpaceX’s Dragon capsules are expected to complete NASA’s rigorous certification process by 2017. They will not only have to meet NASA’s safety standards, but must also run at least one crude test flight to the space station to get their certification. Then, once they’re certified, they’ll be required to run at least two and up to six missions, carrying a crew of four astronauts to the Space Station. According to Kathy Lueders, manager of NASA’s Commercial Crew Program, these astronauts will “nearly double the scientific research potential” on the Space Station.

Once the contracts are complete, SpaceX and Boeing will no doubt leverage the expertise they’ve acquired working with NASA to build out their own commercial operations for non-astronauts. After all, building a space travel industry aimed at civilians is something that SpaceX founder Elon Musk, for one, has been particularly vocal about. Having access to NASA’s financing and expertise is sure to accelerate that process.

At the conclusion of Tuesday’s press conference, Fincke, who holds the American record for most time in space, provided some insight into what such a future might look like. “I’ve watched from the windows of our beautiful space station as the earth moved below, and from 250 miles up, a glance can reveal Paris, California, and Brazil at once,” he said. “These new ships give us the hope that more and more people will get to see that view, and take in that inspiration.”


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.