Can Google's QUIC be faster than Mega Man's nemesis, Quick Man?
Google, as is its wont, is always trying to make the World Wide Web go faster. To that end, Google in 2009 unveiled SPDY, a networking protocol that reduces latency and is now being built into HTTP 2.0. SPDY is now supported by Chrome, Firefox, Opera, and the upcoming Internet Explorer 11.
But SPDY isn't enough. Yesterday, Google released a boatload of information about its next protocol, one that could reshape how the Web routes traffic. QUIC—standing for Quick UDP Internet Connections—was created to reduce the number of round trips data makes as it traverses the Internet in order to load stuff into your browser.
Although it is still in its early stages, Google is going to start testing the protocol on a "small percentage" of Chrome users who use the development or canary versions of the browser—the experimental versions that often contain features not stable enough for everyone. QUIC has been built into these test versions of Chrome and into Google's servers. The client and server implementations are open source, just as Chromium is.
angry tapir writes "Researchers at Microsoft Research have produced a prototype software system that can be used on smartphones to infer a user's mood. The 'MoodScope' system produced by researchers uses smartphone usage patterns to determine whether someone is happy, calm, excited, bored or stressed and could potentially add a new dimension to to mobile apps (as well as, as the researchers note, open up a Pandora's Box of privacy issues). The researchers created a low-power background service for iPhones and Android handsets that (with training) can offer reasonable detection of mood and offers and API that app developers could hook into."
Read more of this story at Slashdot.
This is the first in a two-part series exploring Butterfly Labs and its lineup of dedicated Bitcoin-mining hardware. In part one, we look at the company and the experiences customers have had with it. In part two, to be published on June 29, we share our experiences running a Bitcoin miner for a couple weeks. Spoiler alert: we made money.
The more I dig into Bitcoin, the stranger it gets. There’s gray-market online gambling and Russian-operated futures markets—to say nothing of the virtual currency’s wild ride over the last several months. It’s full of characters with names like “artforz” and “Tycho,” supposedly two of the largest Bitcoin holders out there. Of course, like most things Bitcoin, it’s nearly impossible to know for sure.
While reporting on a Bitcoin-based gambling story earlier this year, I interviewed Bryan Micon, who works with a Bitcoin-based poker site called Seals With Clubs. (To continue the lack of information, Micon won’t say who owns the site.) Micon has taken it upon himself to investigate what he believes are Bitcoin-related scams—such as the ill-fated Bitcoin Savings and Trust online bank—and he makes public pronouncements about them.
Demand for encryption apps has increased dramatically ever since the exposure of massive internet surveillance programs run by US and UK intelligence agencies. Now Facebook is reportedly moving to implement a strong, decades-old encryption technique that's been largely avoided by the online services that need it most.
Forward secrecy (sometimes called "perfect forward secrecy") is a way of encrypting internet traffic — the connection between a website and your browser — so that it's harder for a third party to intercept the pages being viewed, even if the server's key becomes compromised. It's been lauded by cryptography experts since its creation in the early 1990's, yet most "secure" online services like banks and webmail still...
One of the biggest personal data collectors around is getting ready to open its vaults to the public. According to Forbes, you'll soon be able to request your personal files from Acxiom, a marketing company that holds a database on the interests and details of over 700 million people. That database reportedly holds information on consumers' occupations, phone numbers, religions, shopping habits, and health issues, to name a few. That data has traditionally been given only to marketers — for a fee, of course — but Acxiom has decided to let consumers peer into its database as well. Whether individuals will have to pay too is still up for debate, but it's been decided that a person can only view their own file.
Photographers around the world looked up to the sky this past weekend to capture the "supermoon." This is the phenomenon when the moon makes its closest approach to Earth, appearing 30 percent brighter and about 14 percent larger than a typical full moon. It occurs about once every 14 months and is technically called a perigee full moon. At 221,823 miles from Earth, the supermoon was a feast for the eyes.-Leanne Burden Seidel (24 photos total)
A cotton candy vendor walks in from of the moon during the Los Angeles Angels' baseball game against the Pittsburgh Pirates, June 22 in Anaheim, Calif. (Mark J. Terrill/Associated Press)
Aurich Lawson / Jonathan Naumann / Joi Ito / Stanford CIS
Fifteen years ago, I was living outside Geneva, Switzerland, spending my lunch hours screwing around on the nascent Web a few dozen kilometers from where it was created. I popped into chat rooms, forums, and news sites, and I e-mailed family back home. I was learning French and getting my dose of tech news by reading the French-language edition of Macworld magazine. (Génial!)
I returned Stateside mere months after Ars began, reading more and more about the people behind many of the technologies that I was becoming increasingly fascinated with. I consumed just about every book I could find describing the history and personalities behind graphical user interfaces, networking, the Internet itself, and more.
If there’s one thing I’ve learned through all that, it’s that most people involved in technology continue the Newtonian tradition of humility. The most iconic innovators all seem to readily acknowledge that they stand on the shoulders of giants. In fact, when I met Vint Cerf and thanked him for making the work I do possible, he was a predictable gentleman, saying, “There were many others involved in the creation of TCP/IP, not just me.”
Tumblr Creative Director Peter Vidani
New York City noise blares right outside Tumblr’s office in the Flat Iron District in Manhattan. Once inside, the headquarters hum with a quiet intensity. I am surrounded by four dogs that employees have brought to the workspace today. Apparently, there are even more dogs lurking somewhere behind the perpendicular rows of desks. What makes the whole thing even spookier is that these dogs don’t bark or growl. It’s like someone’s told them that there are developers and designers at work, and somehow they’ve taken the cue.
I’m here to see Tumblr’s Creative Director Peter Vidani who is going to pull the curtain back on the design process and user experience at Tumblr. And when I say design process, I don’t just mean color schemes or typefaces. I am here to see the process of interaction design: how the team at Tumblr comes up with ideas for the user interface on its website and its mobile apps. I want to find out how those ideas are shaped into a final product by their engineering team.
Back in May, Yahoo announced it was acquiring Tumblr for $1.1 billion. Yahoo indicated that Tumblr would continue to operate independently, though we will probably see a lot of content crossover between the millions of blog posts hosted by Tumblr and Yahoo’s search engine technology. It’s a little known fact that Yahoo has provided some useful tools for UX professionals and developers over the years through their Design Pattern Library, which shares some of Yahoo’s most successful and time-tested UI touches and interactions with Web developers. It’s probably too early to tell if Tumblr’s UI elements will filter back into these libraries. In the meantime, I talked to Vidani about how Tumblr UI features come to life.
Often I write small methods (maybe 10 to 15 lines of code) that need to be reused across two projects that can't reference each other. The method might be something to do with networking / strings / MVVM etc. and is a generally useful method not specific to the project it originally sits in.
So how should you track shared snippets across projects so you know where your canonical code resides and know where it's in production when a bug needs to be fixed?
Smári McCarthy, in his Twitter bio, describes himself as a "Information freedom activist. Executive Director of IMMI. Pirate."
On Friday, two Icelandic activists with previous connections to WikiLeaks announced that they received newly unsealed court orders from Google. Google sent the orders earlier in the week, revealing that the company searched and seized data from their Gmail accounts—likely as a result of a grand jury investigation into the rogue whistleblower group.
Google was forbidden under American law from disclosing these orders to the men until the court lifted this restriction in early May 2013. (A Google spokesperson referred Ars to its Transparency Report for an explanation of its policies.)
On June 21, 2013, well-known Irish-Icelandic developer Smári McCarthy published his recently un-sealed court order dating back to July 14, 2011. Google sent him the order, which included McCarthy's Gmail account metadata, the night before. The government cited the Stored Communications Act (SCA)(specifically a 2703(d) order) as grounds to provide this order.