RFID

151 results back to index


pages: 229 words: 68,426

Everyware: The Dawning Age of Ubiquitous Computing by Adam Greenfield

"Hurricane Katrina" Superdome, augmented reality, business process, Charles Babbage, defense in depth, demand response, demographic transition, facts on the ground, game design, Howard Rheingold, Internet of things, James Dyson, knowledge worker, late capitalism, machine readable, Marshall McLuhan, new economy, Norbert Wiener, packet switching, pattern recognition, profit motive, QR code, recommendation engine, RFID, seminal paper, Steve Jobs, technoutopianism, the built environment, the scientific method, value engineering

Above all, the proposed bridge should be vanishingly cheap—the better to economically supply all the hundreds of billions of objects in the world with their own identifiers. Such bridges already exist—and are in fact already widely deployed. We'll limit our discussion here to the two most prominent such technologies: RFID tags and two-dimensional bar-codes. The acronym RFID simply means "radio-frequency identification," although in use it has come to connote a whole approach to low-cost, low-impact data-collection. There are two fundamental types of RFID tags, "active" and "passive"; just as you'd assume, active tags broadcast while passive tags require scanning before offering up their payload of information. While both types of tags incorporate a chip and an antenna, passive tags do not require an onboard power supply.

Of course, this limits their range of action to short distances, no more than a few meters at the very outside, while active RFID units, supplied with their own onboard transmitter and power supply, trade greater range for a correspondingly bulkier profile. The onboard memory chip generally encodes a unique numeric identifier and includes as well whatever other information is desired about the item of interest: part number, account number, SKU, color.... Really, the possibilities are endless. And it's this flexibility that accounts for the incredibly wide range of RFID applications we see: In everyday life, you're almost certainly already engaging RFID infrastructures, whether you're aware of it or (more likely) not.

See also user experience; users anonymity children disabled elderly everyday life faculty atrophy of human body human-computer interaction personal/recreational activities social interactions personal computers (PCs) personal computing See also computing phatic utterances phones, mobile photo-sharing services physical computing privacy issues See also surveillance processors product identifiers public space R radio-frequency identification. See RFID relationality remote controls (motes) remote systems RFID tags RFID technology. See also payment systems rooms. See indoor environment S screens computer display everyware and resolution wall seamlessness security. See also surveillance Sensewear patch sensors biometric floor networked problems with surveillance and SGML (Standard Generalized Markup Language) smart buildings smart flooring smartcards.


pages: 316 words: 90,165

You Are Here: From the Compass to GPS, the History and Future of How We Find Ourselves by Hiawatha Bray

A Declaration of the Independence of Cyberspace, Albert Einstein, Big bang: deregulation of the City of London, bitcoin, Boeing 747, British Empire, call centre, Charles Lindbergh, crowdsourcing, Dava Sobel, digital map, don't be evil, Easter island, Edmond Halley, Edward Snowden, Firefox, game design, Google Earth, GPS: selective availability, Hedy Lamarr / George Antheil, Isaac Newton, job automation, John Harrison: Longitude, John Perry Barlow, John Snow's cholera map, Korean Air Lines Flight 007, license plate recognition, lone genius, openstreetmap, polynesian navigation, popular electronics, RAND corporation, RFID, Ronald Reagan, Silicon Valley, Steve Jobs, Steven Levy, Thales of Miletus, trade route, turn-by-turn navigation, uranium enrichment, urban planning, Zipcar

So when the RFID reader at a supermarket warehouse picks up the serial number of an RFID chip attached to a box of spaghetti sauce, it notifies the warehouse’s inventory computer that the sauce has arrived. With RFID you do not need warehouse workers typing in the data as new shipments arrive. You just put RFID readers at each loading dock; the merchandise logs itself into inventory as it is brought into the warehouse and logs itself out when it is shipped out to stores. Retailers like Walmart who want to control labor costs depend quite heavily on RFID systems; so do manufacturers like airplane builders Boeing and Airbus, which use RFID tags to track vast inventories of spare parts.17 RFID chips also simplify many everyday human transactions. In Boston commuters use cards with embedded RFID chips to pay their fares by simply waving them in front of a detector.

The IFF system was the forerunner of the transponders on today’s commercial planes that identify the aircraft to ground controllers. RFID is a modernized, miniaturized version of the same idea. A small microchip with attached radio antenna can be embedded into an ID card or glued onto a package. This device sits inert until it comes within range of a “reader” that broadcasts a radio signal. The incoming signal alerts the RFID chip, which responds by beaming out a serial number. This serial number has already been stored in a database, where it is associated with a particular object or person. So when the RFID reader at a supermarket warehouse picks up the serial number of an RFID chip attached to a box of spaghetti sauce, it notifies the warehouse’s inventory computer that the sauce has arrived.

Cops or attorneys armed with subpoenas routinely inspect these records, which could provide an alibi in a criminal inquiry or prove to a divorce lawyer that you were not working late at the office that night.18 On an even more granular level, retailers have taken to attaching RFID tags to individual items in their stores as a precise tool for tracking inventories. Some civil libertarians fear that it is the first step in a process to track nearly every aspect of our lives—for example, RFID chips woven into clothing would constantly transmit our comings and goings. RFID industry executives say they are not interested. Still, in their 2005 book, Spychips, Katherine Albrecht and Liz McIntyre uncovered documentation from US companies suggesting that they have at least been thinking about it. For instance, in 2001 IBM filed a patent on a way of using RFID tags to track people inside “shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, rest rooms, sports arenas, libraries, theaters, museums, etc.”


pages: 138 words: 40,787

The Silent Intelligence: The Internet of Things by Daniel Kellmereit, Daniel Obodovski

Airbnb, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, autonomous vehicles, barriers to entry, business intelligence, call centre, Clayton Christensen, cloud computing, commoditize, connected car, crowdsourcing, data acquisition, driverless car, en.wikipedia.org, Erik Brynjolfsson, first square of the chessboard, first square of the chessboard / second half of the chessboard, Freestyle chess, Google X / Alphabet X, Internet of things, lifelogging, Metcalfe’s law, Network effects, Paul Graham, Ray Kurzweil, RFID, Robert Metcalfe, Salesforce, self-driving car, Silicon Valley, smart cities, smart grid, software as a service, Steve Jobs, The future is already here, the long tail, Tony Fadell, vertical integration, web application, Y Combinator, yield management

When deciding on which networks to run an M2M solution, we would like to point out the ubiquity versus granularity problem. For example, RFID tags are very low cost, don’t need a battery, and have an infinite life. One can put an RFID tag on almost anything — for instance, every item in a grocery store. That way, RFID provides a high level of granularity for seeing and detecting things. However, for each RFID installation there needs to be RFID readers, which require installation, calibration, and fine-tuning. The RFID does not provide the ubiquity of other networks. Let’s take cellular: Mobile carriers provide access to cellular networks almost everywhere — cellular networks are ubiquitous.

I thought it was a beautiful insight. Kevin Ashton continues: Barcodes at the time were considered a quasi-automatic data capture, but they are not automatic at all. Barcodes are data-capture technology for humans, while RFID is a capture technology for computers. RFID is a way to hack the real world. As things get wirelessly connected, Sanjay Sarma believes in the proliferation of RFID. He thinks RFID readers will become ubiquitous. The economic downturn of 2001 only temporarily slowed the unstoppable development of the Internet of Things. As a matter of fact, things started picking up as early as 2002. In 2004, Nokia published a white paper called Machine to Machine: Let Your Machines Talk, which pointed out: It is not only people who use telecommunication and Internet technologies to communicate, but the machines around us as well.

Let’s take cellular: Mobile carriers provide access to cellular networks almost everywhere — cellular networks are ubiquitous. However, the cellular devices are costly compared to the RFID tags, they are bulky, and they require batteries to run. Cellular devices do not offer the same level of granularity that RFID provides. To better understand this problem, we spoke with Professor Sanjay Sarma of MIT. Sanjay pointed out that the biggest cost in RFID today is in installation and integration. One way to address the issue of ubiquity, he says, would be to wirelessly enable RFID readers with 4G or Wi-Fi and make them ubiquitous. Sanjay says, “Imagine if the reader comes with a standard electric plug, all you need to do is plug it in and you’re good to go.”


Industry 4.0: The Industrial Internet of Things by Alasdair Gilchrist

3D printing, additive manufacturing, air gap, AlphaGo, Amazon Web Services, augmented reality, autonomous vehicles, barriers to entry, business intelligence, business logic, business process, chief data officer, cloud computing, connected car, cyber-physical system, data science, deep learning, DeepMind, deindustrialization, DevOps, digital twin, fault tolerance, fulfillment center, global value chain, Google Glasses, hiring and firing, industrial robot, inflight wifi, Infrastructure as a Service, Internet of things, inventory management, job automation, low cost airline, low skilled workers, microservices, millennium bug, OSI model, pattern recognition, peer-to-peer, platform as a service, pre–internet, race to the bottom, RFID, Salesforce, Skype, smart cities, smart grid, smart meter, smart transportation, software as a service, stealth mode startup, supply-chain management, The future is already here, trade route, undersea cable, vertical integration, warehouse robotics, web application, WebRTC, Y2K

This is one of the basis of Smart Manufacturing, because we can reduce waste and inefficiency by identifying products on the production line and determining their status and what is more their history and what specific stage of production they must next pass through. Now how do we do this? We can use RFID tags that are so miniaturized that now they can be embedded into a label or use NFC (near frequency contact) such as in card payment systems. NFC is a bit fragile it requires close proximity to the reader, whereas RFID is astonishingly capable. Take for instance a racing car embedded with an RFID tag and during each lap, an RFID reader counts the number of laps. Incredibly, an RFID reader can count reliably every lap a racing car performs even at speeds of 200 mph and more. Therefore, RFID tags are perfect for Smart Factory applications where the speed of the production process must not be compromised.

In order to address these inventory control processes, logistic companies sought an automated solution using IIoT techniques and wireless technologies. The solution is to use embedded RFID tags and the associated RFID readers, which can scan entire rows or stacks of pallets queued at the inbound gate simultaneously. This is something a barcode reader had to perform one at a time, which is an improvement in speed and accuracy as every RFID tag in 23 24 Chapter 2 | Industrial Internet Use-Cases radio range on every pallet, whether visible or not, is read by the system. The RFID reader automatically records the RFID tag’s information such as the order ID, the manufacturer, product model, type, and quantity, as well as the condition of the items before automatically recording the delivery in the ERP system.

On the other hand, some tags are battery powered and transmit actively and these can be situated hundreds of meters from the reader. RFID technology is used in many industries to identify and track inventory, people, objects, and animals due to the tag’s versatility and ability to be attached to just about anything. RFID is also used in contactless payment systems using cards or even smartphones to place in close proximity to the RFID reader. However, RFID does not always require such close contact; in some cases even the briefest contact at a distance is all that is required. An example of this is the timing of sports cars lapping a track. Even at those high speeds, RFID works efficiently and reliably and produces accurate timing.


Smart Grid Standards by Takuro Sato

business cycle, business process, carbon footprint, clean water, cloud computing, data acquisition, decarbonisation, demand response, distributed generation, electricity market, energy security, exponential backoff, factory automation, Ford Model T, green new deal, green transition, information retrieval, information security, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Iridium satellite, iterative process, knowledge economy, life extension, linear programming, low earth orbit, machine readable, market design, MITM: man-in-the-middle, off grid, oil shale / tar sands, OSI model, packet switching, performance metric, RFC: Request For Comment, RFID, smart cities, smart grid, smart meter, smart transportation, Thomas Davenport

It utilizes OFDM and modulation techniques up to 4096 QAM Optical ITU-T G.651.1 ITU ITU-T G.652 ITU ITU-T G.959 ITU-T G.693 ITU-T G.692 ITU ITU ITU T1.105.07 ANSI Characteristics of a 50/125 μm multimode graded-index optical fiber cable for the optical access network Characteristics of a single-mode optical fiber and cable Optical transport network physical layer interfaces Optical interfaces for intraoffice systems Optical interfaces for multichannel systems with optical amplifiers Synchronous Optical Network (SONET) - Sub-STS-1 Interface Rates and Formats Specification (continued overleaf) Smart Grid Standards 252 Table 6.2 (continued) Standard Body Details ITU-T G.707 ITU ITU-T G.783 ITU ITU-T G.784 ITU ITU-T G.803 ITU ITU-T G.983.x ITU IEEE 802.3ah IEEE ITU-T G.984.x ITU IEEE 802.3av IEEE ITU-T G.987 ITU Recommendation G.707/Y.1322, Network node interface for the Synchronous Digital Hierarchy (SDH) Characteristics of Synchronous Digital Hierarchy (SDH) equipment functional blocks Management aspects of the Synchronous Digital Hierarchy (SDH) transport network element Architecture of transport networks based on the Synchronous Digital Hierarchy (SDH) Broadband optical access systems based on Passive Optical Networks (PON), a series of recommendations for broadband passive optical networks Also known as “Ethernet in the First Mile;” defines the physical-layer specifications for Ethernet links providing 1000 Mbps over PONs up to at least 10 km (1000BASE-PX10) and up to at least 20 km (1000BASE-PX20) Gigabit-capable passive optical networks (GPON); a series of recommendations for GPON access networks Physical layer specifications and management parameters for 10 Gbps Ethernet Passive Optical Networks (10 GE-PON) 10-Gigabit-capable passive optical network (XG-PON) systems: definitions, abbreviations, and acronyms; a series of recommendations for gigabit passive optical access networks NG-PON2: next-generation passive optical network 2 NG-PON2 FSAN Very short range/contactless ISO 10536 ISO ISO 11784 ISO ISO 11785 ISO ISO 14443 ISO ISO 15693 ISO ISO 15961 ISO ISO RFID standard for close coupled cards ISO RFID standard that defines the way in which data is structured on an RFID tag ISO RFID standard that defines the air interface protocol ISO RFID standard that provides the definitions for the air interface protocol for RFID tags used in proximity systems – aimed for use with payment systems ISO RFID standard for use with what are termed vicinity cards ISO RFID standard for item management (includes application interface (part 1), registration of RFID data constructs (part 2), and RFID data constructs (part 3) Communications in the Smart Grid 253 Table 6.2 (continued) Standard Body Details ISO 18000 ISO ISO 24753 ISO UHF Class 1 Gen 2 EPCglobal EPC Class-1 HF EPCglobal ASTM D7434 ASTM ASTM D7435 ASTM ASTM D7580 ASTM JIS X 6319-4 JIS ISO/IEC 21481 ISO ISO/IEC 18092 ISO ISO RFID standard for the air interface for RFID frequencies around the globe Air interface commands for battery assist and sensor functionality Physical and logical requirements for a passive-backscatter, Interrogator-Talks-First (ITF), Radio-Frequency Identification (RFID) system operating in the 860–960 MHz frequency range Physical and logical requirements fora passive-backscatter, Interrogator-Talks-First (ITF), Radio-Frequency Identification (RFID) system operating in 13.65 MHz frequency Standard test method for determining the performance of passive Radio-Frequency Identification (RFID) transponders on palletized or unitized loads Standard test method for determining the performance of passive Radio-Frequency Identification (RFID) transponders on loaded containers Standard test method for rotary stretch wrapper method for determining the readability of passive RFID transponders on homogeneous palletized or unitized loads Also known as “Felica,” the Japanese Industrial Standard (or JIS) specifying the physical characteristics, air interface, transmission protocols, file structure, and commands of high-speed contactless proximity integrated circuit cards This standard specifies the communication mode-selection mechanism, which is designed to not interfere with any ongoing communication at 13.56 MHz, for devices implementing ECMA-340, ISO/IEC 14443, or ISO/IEC 15693 Also known as “ECMA-340.”

In Table 6.9, we provide an overview of those technologies in the context of Smart Grid applications. 6.4.2 Wireless Very Short Distance Communication Radio-Frequency Identification (RFID) technology is widely used for identifying and tracking assets, because of its simplicity and low cost. In particular, the most common applications of RFID are store/warehouse product identification, production control, livestock identification, and vehicle tracking. The RFID concept recognizes two entities: reader/writer and a tag. The RFID reader/writer communicates with RFID tags and reads/writes the information from/to the tag. There can be three different types of RFID tags: passive, semipassive, and active. The passive RFID tags take the major market share due to the extremely low cost without the need for any battery and with almost limitless lifespan.

The passive RFID tag is powered by the antenna of a reader/writer device. Semipassive tags are battery powered for internal operation. However, the read or write process utilizes the same method as a passive tag (powering from the antenna of the reader/writer). Finally, an active RFID tag is powered by battery and enables significantly larger distances for communication. There are several standards defining RFID technologies and the way in which two entities interact (an antenna-coupling mechanism). The most common methods are RFID inductive coupling, RFID capacitive coupling, and RFID backscattering.


pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman

23andMe, 3D printing, active measures, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, Alvin Toffler, Apollo 11, Apollo 13, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Boston Dynamics, Brian Krebs, business process, butterfly effect, call centre, Charles Lindbergh, Chelsea Manning, Citizen Lab, cloud computing, Cody Wilson, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, data science, Dean Kamen, deep learning, DeepMind, digital rights, disinformation, disintermediation, Dogecoin, don't be evil, double helix, Downton Abbey, driverless car, drone strike, Edward Snowden, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, Filter Bubble, Firefox, Flash crash, Free Software Foundation, future of work, game design, gamification, global pandemic, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, Hacker News, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, information security, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, John Markoff, Joi Ito, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Kiva Systems, knowledge worker, Kuwabatake Sanjuro: assassination market, Large Hadron Collider, Larry Ellison, Laura Poitras, Law of Accelerating Returns, Lean Startup, license plate recognition, lifelogging, litecoin, low earth orbit, M-Pesa, machine translation, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Metcalfe’s law, MITM: man-in-the-middle, mobile money, more computing power than Apollo, move fast and break things, Nate Silver, national security letter, natural language processing, Nick Bostrom, obamacare, Occupy movement, Oculus Rift, off grid, off-the-grid, offshore financial centre, operational security, optical character recognition, Parag Khanna, pattern recognition, peer-to-peer, personalized medicine, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, printed gun, RAND corporation, ransomware, Ray Kurzweil, Recombinant DNA, refrigerator car, RFID, ride hailing / ride sharing, Rodney Brooks, Ross Ulbricht, Russell Brand, Salesforce, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, SimCity, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, SoftBank, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, Stuxnet, subscription business, supply-chain management, synthetic biology, tech worker, technological singularity, TED Talk, telepresence, telepresence robot, Tesla Model S, The future is already here, The Future of Employment, the long tail, The Wisdom of Crowds, Tim Cook: Apple, trade route, uranium enrichment, Virgin Galactic, Wall-E, warehouse robotics, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, Westphalian system, WikiLeaks, Y Combinator, you are the product, zero day

Though the convenience of RFID, considered by many the gateway to the Internet of Things, sounds great, there’s one problem: it’s eminently hackable. There have been dozens of exploits against RFID technology, whose electronics can be readily hacked, spoofed, and jammed, and there is an active “RFID underground” continually working on improving its offensive techniques. The overwhelming majority of today’s RFID tags have no effective security, encryption, or privacy protocols in place. These shortcomings have allowed the security hacker Francis Brown to build his own RFID readers for under $400 that can scan, copy, clone, and steal data from your smart cards.

Welcome to pocket picking 2.0, where the thieves don’t even need to stick their hands in your pocket anymore. The techniques to hack RFID are easy to emulate, and there are hundreds of instruction sites and videos online telling hackers exactly how. Troubling given that billions of things coming online will be using RFID as their primary language to speak and interact with the world. RFID chips can also be infected with viruses, and just like GPS signals RFID can be jammed, preventing you from getting into your office and allowing thieves to shoplift expensive goods electronically tagged by retailers. Another popular IoT communications technology is RFID’s younger brother, known as near-field communication (NFC) and currently built into 20 percent of mobile phones, particularly Android models, as well as the latest iPhone 6 devices.

As the price of these tools drops, new consumer products such as Apple’s iBeacon and Tile’s location tags may soon become an omnipresent feature in our daily lives, allowing us to track objects with centimeter precision. The first of these IoT enabling technologies, RFID, was patented in 1983 and is a wireless low-energy device that can be embedded into any object to make it “smart,” or able to interact with RFID readers. RFID tags are printed electronic circuits no thicker than a piece of paper, often come in sticker format, many the size of a dime, and can be produced for under a penny. They are capable of performing real-time, constant data exchange and can be read by scanners, some as far as up to one hundred meters away. Even if you are unfamiliar with RFID technology, chances are you have already encountered it in your life, whether it’s the security ID card you use to swipe your way into your office, your “wave and pay” credit card, the key to your hotel room, your subway pass, or the little box you use to pay for highway tolls, such as E-ZPass.


Future Files: A Brief History of the Next 50 Years by Richard Watson

Abraham Maslow, Albert Einstein, bank run, banking crisis, battle of ideas, Black Swan, call centre, carbon credits, carbon footprint, carbon tax, cashless society, citizen journalism, commoditize, computer age, computer vision, congestion charging, corporate governance, corporate social responsibility, deglobalization, digital Maoism, digital nomad, disintermediation, driverless car, epigenetics, failed state, financial innovation, Firefox, food miles, Ford Model T, future of work, Future Shock, global pandemic, global supply chain, global village, hive mind, hobby farmer, industrial robot, invention of the telegraph, Jaron Lanier, Jeff Bezos, knowledge economy, lateral thinking, linked data, low cost airline, low skilled workers, M-Pesa, mass immigration, Northern Rock, Paradox of Choice, peak oil, pensions crisis, precautionary principle, precision agriculture, prediction markets, Ralph Nader, Ray Kurzweil, rent control, RFID, Richard Florida, self-driving car, speech recognition, synthetic biology, telepresence, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Turing test, Victor Gruen, Virgin Galactic, white flight, women in the workforce, work culture , Zipcar

Given that the percentage of Muslims in the world’s population is expected to grow from 19% in 2000 to 30% in 2025, I’d expect this sector of investment to grow too. Chapter 5 Money and Financial Services: everyone is a bank Prediction is very difficult, especially about the future. —Niels Bohr J on Merriman is the CEO of an investment bank and is one of 50 people in the US with a radio frequency ID (RFID) tag inserted in his arm. Mr Merriman’s firm is an adviser to VeriChip, a maker of ID implants for pets and RFID-enabled medical bracelets. If Mr Merriman (“Chip” to his friends?) is ever involved in a serious accident, doctors are just a scan away from all the necessary data. The chip contains everything from bank account and social security records to medical information.

“Precision agriculture” is an idea whereby farmland is monitored 182 FUTURE FILES and controlled meter by meter, with seeds sown at exactly the correct time and fertilizers and pesticides applied almost on a plantby-plant basis. Similar techniques exist for cattle, allowing individual herds to be monitored and controlled by satellite and the history of an individual animal to be tracked from paddock to plate. RFID chips are one way to do this, but an even better way is to test for DNA. However, in the future the dining tables will be turned. At present RFID chips are a logistical tool used by supermarkets and their suppliers. In the future customers will tap into these chips to monitor where their food is from and how it was produced. There is already a DNA test available called FoodExpert ID that can check for the presence of 32 common animals (including humans) in foodstuffs.

Shops are already intelligent and they are getting more so. In the future, a store might greet you by name and direct you to a loyalty queue for a speedy checkout. Or you may not even have to check out: an RFID reader will scan your shopping bags as you walk out of the store and the bill will be sent automatically to your creditcard company or bank. The Prada store in New York already shows footage of models wearing certain outfits if you hold the clothes up to a nearby screen. RFID technologies will scan your body from all angles and produce 206 FUTURE FILES a 360-degree 3D model to help you find clothes that fit you precisely. Entering the data into a terminal will also instantly tell you whether certain items are in stock, or perhaps inform you of where products were made and under what conditions.


pages: 116 words: 32,712

Making a Killing: The Deadly Implications of the Counterfeit Drug Trade by Roger Bate

global supply chain, interchangeable parts, RFID, Sam Peltzman, supply-chain management

As recommended by the FDA’s Counterfeit Task Force (a group created in 2003 to offer advice to policymakers about the growing threat posed by counterfeit and substandard drugs) and mandated in the 2007 Food and Drug Administration Amendments Act,26 pharmaceutical companies, wholesalers, and pharmacies should collaborate to design and implement a nationwide serialization system with track-and-trace technology for all drugs produced in the United States.27 The “e-pedigree” has been piloted in several states (including California, which requires that all drugs be included under the system by January 2009), but it has not been adopted on a national scale, which has made tracing drugs across state borders—and across different credentialing systems and pedigree requirements— prohibitive.28 Numerous technologies can ensure this e-pedigree is not compromised by counterfeiters. Radio frequency identification appears especially promising. An RFID tag, applied to a shipment of pharmaceuticals, can be read from several feet away using radio waves. In the United States, RFID may prove especially helpful in speeding the passage of drugs through customs, where thousands of drug packages become backlogged every year. Such backlogs can create perverse incentives for customs officials to push shipments through, even if they suspect they may be counterfeit.

Margaret Kyle, “Strategic Responses to Parallel Trade,” Working Paper 12968 (Cambridge, MA: National Bureau of Economic Research, March 2007), www.nber.org/papers/w12968. 25. Pharmaceutical Market Access and Drug Safety Act of 2007, S.242, 110th Cong., 1st session. 26. Bert Moore, “RFID, Bar Codes and Pharmaceutical Authenticity,” AIM Global, June 7, 2007. 27. U.S. Food and Drug Administration, “Counterfeit Drug Task Force Report: 2006 Update,” www.fda.gov/oc/initiatives/counterfeit/report6_ 06.html (accessed March 17, 2008). 28. Moore, “RFID, Bar Codes and Pharmaceutical Authenticity.” 29. Representative Steve Buyer, House Committee on Energy and Commerce, Subcommittee on Health, hearing on HR 3610 (Food and Drug Safety Import Act), 110th Cong., 1st session, 2007, http://energycommerce. house.gov/cmte_mtgs/110-he-hrg.092607.Food.Drug.Import.shtml (accessed March 17, 2008).

As of July 2007, it had sold over 240 minilabs in sixty-five countries.100 Pharmaceutical Companies. Individual pharmaceutical firms have also taken steps to resist counterfeit drugs. Many have begun to implement track-and-trace technology on their drugs to provide an effective “e-pedigree” to distributors and consumers. Some have experimented with using radio frequency identification (RFID) technology to check the e-pedigrees of drug shipments, although, in the United States, this is not yet required by the FDA.101 To help secure the complex, vulnerable global supply chain, many drug companies have implemented their own security measures. Pfizer announced in December 2003 that all distributors in the United States selling its products would have to purchase them directly from the company or from selected wholesalers.102 In September 2006, Pfizer announced that it would cease selling drugs to eighteen wholesalers in the United Kingdom and instead distribute drugs there only through UniChem.103 These moves are attempts to cut down the size of the secondary wholesale market, which includes sales among wholesalers.104 Other pharmaceutical firms will need to secure their own supply chains and alert the public when they become aware of counterfeit drugs.


Smart Mobs: The Next Social Revolution by Howard Rheingold

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", A Pattern Language, Alvin Toffler, AOL-Time Warner, augmented reality, barriers to entry, battle of ideas, Brewster Kahle, Burning Man, business climate, citizen journalism, computer vision, conceptual framework, creative destruction, Dennis Ritchie, digital divide, disinformation, Douglas Engelbart, Douglas Engelbart, experimental economics, experimental subject, Extropian, Free Software Foundation, Garrett Hardin, Hacker Ethic, Hedy Lamarr / George Antheil, Herman Kahn, history of Unix, hockey-stick growth, Howard Rheingold, invention of the telephone, inventory management, Ivan Sutherland, John Markoff, John von Neumann, Joi Ito, Joseph Schumpeter, Ken Thompson, Kevin Kelly, Lewis Mumford, Metcalfe's law, Metcalfe’s law, more computing power than Apollo, move 37, Multics, New Urbanism, Norbert Wiener, packet switching, PalmPilot, Panopticon Jeremy Bentham, pattern recognition, peer-to-peer, peer-to-peer model, pez dispenser, planetary scale, pre–internet, prisoner's dilemma, radical decentralization, RAND corporation, recommendation engine, Renaissance Technologies, RFID, Richard Stallman, Robert Metcalfe, Robert X Cringely, Ronald Coase, Search for Extraterrestrial Intelligence, seminal paper, SETI@home, sharing economy, Silicon Valley, skunkworks, slashdot, social intelligence, spectrum auction, Steven Levy, Stewart Brand, the Cathedral and the Bazaar, the scientific method, Tragedy of the Commons, transaction costs, ultimatum game, urban planning, web of trust, Whole Earth Review, Yochai Benkler, zero-sum game

In the 1980s, researchers started looking at radio frequency identity (RFID) tags as electronic successors to the barcode. RFID tags store, send, and receive information through weak radio signals. Active tags contain tiny batteries and send signals up to more than one hundred feet, depending on power and radio frequency. Because of the batteries, active tags are the more expensive kind and are used today for tracking cattle, merchandise in stores (those bulky plastic anti-theft devices contain small RFID tags, and the gates near store exits are tag readers), and in automatic toll systems for automobiles. It isn’t feasible to put expensive RFID tags on the wide variety of objects that barcodes track.

A range of services like news, help wanted listings, discussions, reports of damage or crime, and goods and services for barter or sale could be provided to people while they are present in the space. Entertainment applications, including games, are easy to imagine. Perhaps the most intrusive near-term application of RFID tags would be “smart money” that could record where it came from, who has owned it, and what it has bought. In December 2001, the European Central Bank was reported to be working on embedding RFID tags in currency by 2005.45 Although prevention of counterfeiting is the bank’s overt motivation, the same technology could afford surveillance of individual behaviors at a scale never before imagined.

Auto-ID Center, <http://www.autoidcenter.org/main.asp> (29 March 2002). 45. Junko Yoshida, “Euro Bank Notes to Embed RFID Chips by 2005,” EE Times, 19 December 2001, <http://www.eet.com/story/OEG20011219S0016> (29 January 2002). 46. Wes Vernon, “Latest Privacy Nightmare: Money That Tracks You,” News- Max.com, 28 July 2001, < http://www.newsmax.com/archives/articles/2001/7/27/212324.shtml > (3 February 2002). 47. Will Knight, “Tiny Radio Chip Gives Paper an ID,” New Scientist, 4 July 2001, <http://www.newscientist.com/news/news.jsp?id=ns9999967> (3 February 2002); “Hitachi Announces World’s Smallest RFID IC, the mu-chip,” 5 July 2001, <http://www.hitachi.com/products/electronic/semiconductorcomponent/elecrfid/ >(5 February 2002). 48.


pages: 329 words: 95,309

Digital Bank: Strategies for Launching or Becoming a Digital Bank by Chris Skinner

algorithmic trading, AltaVista, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, augmented reality, bank run, Basel III, bitcoin, Bitcoin Ponzi scheme, business cycle, business intelligence, business process, business process outsourcing, buy and hold, call centre, cashless society, clean water, cloud computing, corporate social responsibility, credit crunch, cross-border payments, crowdsourcing, cryptocurrency, demand response, disintermediation, don't be evil, en.wikipedia.org, fault tolerance, fiat currency, financial innovation, gamification, Google Glasses, high net worth, informal economy, information security, Infrastructure as a Service, Internet of things, Jeff Bezos, Kevin Kelly, Kickstarter, M-Pesa, margin call, mass affluent, MITM: man-in-the-middle, mobile money, Mohammed Bouazizi, new economy, Northern Rock, Occupy movement, Pingit, platform as a service, Ponzi scheme, prediction markets, pre–internet, QR code, quantitative easing, ransomware, reserve currency, RFID, Salesforce, Satoshi Nakamoto, Silicon Valley, smart cities, social intelligence, software as a service, Steve Jobs, strong AI, Stuxnet, the long tail, trade route, unbanked and underbanked, underbanked, upwardly mobile, vertical integration, We are the 99%, web application, WikiLeaks, Y2K

We can see the opportunity this change offers today, thanks to Near Field Communication (NFC) and Radio Frequency IDentification (RFID) will provide the internet of things with the ability to transact. When we talk about chips inside everything, so that they can wirelessly communicate, those chips in everything will be RFID chips today. RFID can only hold a small amount of intelligence right now, so it needs something to receive the RFID information and that is NFC. Hence, NFC will become the reader mechanism in phones and other devices for RFID in the internet of things. Today, you buy things by taking them to the teller; tomorrow, if you want to buy something, you just read the QR code or hold your phone over its RFID tag.

Save more than 10% of your earnings per month and we will give you a “Saver King” or “Saver Queen” badge to share with all your friends on Facebook. In fact, the Digital Bank will be the Augmented Bank as it will recognise that anything can transact with anything person-to-person, person-to-machine or even machine-to-machine. Transactions become embedded in everything from underpants to escalators through the placement of RFID chips inside everything. This means that everything will be intelligently and wirelessly communicating with everything through what is now called the internet of things. The internet of things delivers a new wireless augmented world of digital reality where, in the very near future, fifty billion devices will be communicating with each other.

Today, you buy things by taking them to the teller; tomorrow, if you want to buy something, you just read the QR code or hold your phone over its RFID tag. In addition, in the near future, the internet of things will be driven by the mobile internet of things, where everything is geo-located and identified by the network. It is this network- and chip-driven transaction system that is the point. The network-centric view, where everything is monitored real-time via the network, is the more sophisticated, intelligent and likely future scenario but the chip-based transaction system may well play an enabling short- to medium- term role in allowing the network to track the transactions.


pages: 99 words: 19,884

Getting Started with RStudio by John Verzani

Debian, RFID, web application

R has several ways to implement the split-apply-combine idiom, as it is one of the most useful patterns for R users. The plyr package is widely used, but for this task we use functions from base R. The split function can be used to divide the data by the grouping variable RFID, returning a list whose components are the records for the individual mole rats: > l <- split(x, x$RFID) The list, l, has a different component for each mole rat. We can check to see if any two rows for a mole rat are identical, using R’s convenient duplicated method. In addition, we add a bit of time to to each time value, so that times recorded with the same second are distinguished.

We will postpone for now an example of the “development” aspect of RStudio. The data set we look at here comes from a colleague, and contains records from a psychology experiment on a colony of naked mole rats. The experimenter is interested in both the behavior of each naked mole rat in time and the social aspect of the colony as a whole. Each rat wears an RFID chip that allows the researcher to track its motion. The experiment consists of 15 chambers (bubbles) in a linear arrangement separated by 14 tubes. Each tube has a gate with a sensor. When a mole rat passes through the tube, the time and gate are recorded. Unfortunately, gates can be missed, and the recording device can erroneously replicate values, so the raw data must be cleaned up.

However, the actual editor employed depends on the extension and MIME type of the file. For rtf files, the underlying operating system’s editor is used, which for Mac OS X is textedit. We can see that the data appears to have one line per record, with the values separated by semicolons. The fields are RFID, date, time, and gate number. This is basically comma-separated-value (CSV) data with a nonstandard separator. Figure 2-2. The rtf file is opened in an editor provided by the system, not by RStudio However, although we rarely see rtf files, we know the textedit program will likely render them using the markup for formatting, so perhaps there are some markup commands that needs to be removed.


pages: 525 words: 116,295

The New Digital Age: Transforming Nations, Businesses, and Our Lives by Eric Schmidt, Jared Cohen

access to a mobile phone, additive manufacturing, airport security, Amazon Mechanical Turk, Amazon Web Services, Andy Carvin, Andy Rubin, anti-communist, augmented reality, Ayatollah Khomeini, barriers to entry, bitcoin, borderless world, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, crowdsourcing, data acquisition, Dean Kamen, disinformation, driverless car, drone strike, Elon Musk, Evgeny Morozov, failed state, false flag, fear of failure, Filter Bubble, Google Earth, Google Glasses, Hacker Conference 1984, hive mind, income inequality, information security, information trail, invention of the printing press, job automation, John Markoff, Julian Assange, Khan Academy, Kickstarter, knowledge economy, Law of Accelerating Returns, market fundamentalism, Mary Meeker, means of production, military-industrial complex, MITM: man-in-the-middle, mobile money, mutually assured destruction, Naomi Klein, Nelson Mandela, no-fly zone, off-the-grid, offshore financial centre, Parag Khanna, peer-to-peer, peer-to-peer lending, personalized medicine, Peter Singer: altruism, power law, Ray Kurzweil, RFID, Robert Bork, self-driving car, sentiment analysis, Silicon Valley, Skype, Snapchat, social graph, speech recognition, Steve Jobs, Steven Pinker, Stewart Brand, Stuxnet, Susan Wojcicki, The Wisdom of Crowds, upwardly mobile, Whole Earth Catalog, WikiLeaks, young professional, zero day

Weapons and small arms routinely disappear after conflicts and find their way onto the black market (an estimated $1 billion annual business), later appearing in the hands of militias, gangs and armies in other countries. Radio frequency identification (RFID) chips could represent a solution to this challenge. RFID chips or tags contain electronically stored information and can be as small as a grain of rice. They are ever present today, in everything from our phones and passports to the products we buy. (They’re even in our pets: RFID chips embedded under the skin or on an ear are used to help identify lost animals.) If major states signed treaties that required weapons manufacturers to implant unremovable RFID chips in all of their products, it would make the hunt for arms caches and the interdiction of arms shipments much easier.

If major states signed treaties that required weapons manufacturers to implant unremovable RFID chips in all of their products, it would make the hunt for arms caches and the interdiction of arms shipments much easier. Given that today’s RFID chips can be easily fried in a microwave, the chips of the future will need a shield that protects them against tampering. (We assume there will be a technological cat-and-mouse game between governments who want to track the weapons with RFID chips and arms traffickers who want to deal the weapons off the grid.) When weapons with RFID chips were recovered, it would be possible to trace where they’d been if the chips themselves were designed to store location data. This wouldn’t stop the trafficking of arms but it would put pressure on the larger actors in the arms trade.

Moreover, states might claim that falsely planting another country’s weapons in a conflict zone would point to their involvement and lead to even more conflict. But international pressure might make a difference. Luckily, there are myriad other ways the RFID technology can be used in the short term in reconstruction efforts. RFID tags can be used to track aid deliveries and other essential supplies, to verify pharmaceuticals and other products as legitimate, and to generally limit waste or graft in large contracting projects. The World Food Program (WFP) has experimented with tracking food deliveries in Somalia, using bar codes and RFID chips to determine which suppliers are honest and deliver food to the target area. This type of tracking system—inexpensive, ubiquitous and reliable—could demonstrably help streamline the serpentine world of aid distribution by enhancing accountability and providing data that can be used to measure success and effectiveness, even in the least-connected places


pages: 389 words: 87,758

No Ordinary Disruption: The Four Global Forces Breaking All the Trends by Richard Dobbs, James Manyika

2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, access to a mobile phone, additive manufacturing, Airbnb, Amazon Mechanical Turk, American Society of Civil Engineers: Report Card, asset light, autonomous vehicles, Bakken shale, barriers to entry, business cycle, business intelligence, carbon tax, Carmen Reinhart, central bank independence, circular economy, cloud computing, corporate governance, creative destruction, crowdsourcing, data science, demographic dividend, deskilling, digital capitalism, disintermediation, disruptive innovation, distributed generation, driverless car, Erik Brynjolfsson, financial innovation, first square of the chessboard, first square of the chessboard / second half of the chessboard, Gini coefficient, global supply chain, global village, high-speed rail, hydraulic fracturing, illegal immigration, income inequality, index fund, industrial robot, intangible asset, Intergovernmental Panel on Climate Change (IPCC), Internet of things, inventory management, job automation, Just-in-time delivery, Kenneth Rogoff, Kickstarter, knowledge worker, labor-force participation, low interest rates, low skilled workers, Lyft, M-Pesa, machine readable, mass immigration, megacity, megaproject, mobile money, Mohammed Bouazizi, Network effects, new economy, New Urbanism, ocean acidification, oil shale / tar sands, oil shock, old age dependency ratio, openstreetmap, peer-to-peer lending, pension reform, pension time bomb, private sector deleveraging, purchasing power parity, quantitative easing, recommendation engine, Report Card for America’s Infrastructure, RFID, ride hailing / ride sharing, Salesforce, Second Machine Age, self-driving car, sharing economy, Silicon Valley, Silicon Valley startup, Skype, smart cities, Snapchat, sovereign wealth fund, spinning jenny, stem cell, Steve Jobs, subscription business, supply-chain management, synthetic biology, TaskRabbit, The Great Moderation, trade route, transaction costs, Travis Kalanick, uber lyft, urban sprawl, Watson beat the top human players on Jeopardy!, working-age population, Zipcar

Free Mobile signed up more than 2.6 million new subscribers in less than three months in 2012 and captured 13 percent market share in one year with no above-the-line budget.57 Luxury retailer Burberry is synonymous with best-in-class multichannel customer experience; its flagship store at 121 Regent Street in London boasts the world’s tallest retail screen, real-life digital feeds, and RFID chips that are sewn into Burberry products. These tiny chips trigger bespoke content in front of RFID-enabled mirrors.58 Nordstrom, the luxury department store, first exploited the marginal cost advantages of digital for internal purposes, to develop shipping and inventory-management facilities. The company then turned its digital investments outward, building a strong e-commerce site, mobile-shopping apps, kiosks, and capabilities for managing customer relationships across channels.

See Research and development Real estate industry, 68, 133, 141, 198 Recession recovery cycles, 149–151 Recycling, 123–125, 196 Reliance Communications, 144 Renault, 124 Renewable energy, 36, 122, 126–127, 199 Repurposed services, 27–28 Research and development (R&D) automotive manufacturing technology, 141–142 facility locations for, 27–28 globalized digital platforms for, 85–86 in oil extraction recovery, 125–126 Resource management, 111–129 adaptation to, 9–10, 120–128 circular economy approach to, 123–125 demand increase and, 114–116, 117 (table) energy efficiency for, 122, 123, 125–127 environmental conservation and, 119–120, 122 globalization and, 118–119 government regulation of, 195–196 intuition reset for, 9–10 overview, 9–10, 112 policy, 190, 195–196, 199 productivity improvement in, 120, 121 (table), 122–123, 141 public-private partnerships for, 198–199 supply challenges and, 116, 117 (table), 118 technological acceleration and, 9, 36, 113–114 volatility resilience design for, 127–128 Retailing industry aging population adaptation of, 69–70 digitization influence on, 39, 46 (fig.) new consumer adaptation of, 105–106 peer-to-peer services in, 85, 158, 160 reuse and recycling in, 124–125 RFID tags in, 48 See also E-commerce Retirement, 62–64, 65, 183, 194–195 Reuse programs, 123–125 RFID. See Radio-frequency identification technology Ricoh, 124 Robotics adoption acceleration and, 42 for aging population, 53–54 automotive manufacturing, 53, 83 current advances in, 36–37 evolution of, 35 (fig.) in Japan, 53–54 Rocket Internet, 79 Russia, 81 (table) Saga, 70 San Francisco, California, 27, 29, 30 See also Silicon Valley Sarkozy, Nicolas, 197 Saudi Arabia, 56, 81 (table), 113 (table), 143 Savings rates, 137–138, 139 Scentsa, 52 Schröder, Gerhard, 181–182 Science, technology, engineering, and mathematics (STEM), 155, 156, 158, 159 (table) The Second Machine Age (Brynjolfsson and McAfee), 6 Seniors.

Items such as shoes, jewelry, and tools may in the future be sold with the transfer of an electronic file, allowing the buyer to print the object on demand or at the point of consumption. Second, digitization enhances the information content of many of our routine transactions, enriching them and making them more valuable and productive. Examples include the digital tracking of physical shipments with the use of RFID tags and the use of 2-D barcodes to convey information to consumers. Third, digitization is creating online platforms that facilitate production and transaction and allow minnows to compete head-to-head with sharks. Online exchanges and platforms like eBay and Alibaba, two of the linchpins of global e-commerce, allow even the smallest companies and individuals to become micro-multinationals.


pages: 422 words: 104,457

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance by Julia Angwin

AltaVista, Ayatollah Khomeini, barriers to entry, bitcoin, Chelsea Manning, Chuck Templeton: OpenTable:, clean water, crowdsourcing, cuban missile crisis, data is the new oil, David Graeber, Debian, disinformation, Edward Snowden, Filter Bubble, Firefox, Free Software Foundation, Garrett Hardin, GnuPG, Google Chrome, Google Glasses, Ida Tarbell, incognito mode, informal economy, Jacob Appelbaum, John Gilmore, John Markoff, Julian Assange, Laura Poitras, Marc Andreessen, market bubble, market design, medical residency, meta-analysis, mutually assured destruction, operational security, Panopticon Jeremy Bentham, prediction markets, price discrimination, randomized controlled trial, RFID, Robert Shiller, Ronald Reagan, security theater, Silicon Valley, Silicon Valley startup, Skype, smart meter, sparse data, Steven Levy, Tragedy of the Commons, Upton Sinclair, WikiLeaks, Y2K, zero-sum game, Zimmermann PGP

Benjamin Robinson, CR-07-00596 (N.D. Cal., 2001), http://ia600500.us.archive.org/11/items/gov.uscourts.cand.195976/gov.uscourts.cand.195976.1.0.pdf. In 2009, Robinson pleaded guilty to unlawfully: Ibid. radio-frequency identification (RFID) chips: “FAQ on RFID and RFID Privacy,” RSA Laboratories, accessed September 8, 2013, http://www.emc.com/emc-plus/rsa-labs/research-areas/faq-on-rfid-and-rfid-privacy.htm#4. in passports: “The U.S. Electronic Passport Frequently Asked Questions,” Travel.State.Gov, A Service of the Bureau of Consular Affairs, accessed July 21, 2013, http://travel.state.gov/passport/passport_2788.html.

In 2009, Robinson pleaded guilty to unlawfully obtaining information from a protected computer, and he was sentenced to three years’ probation. And the day is not far off when real-time tracking will become routine. The United States already embeds radio-frequency identification (RFID) chips that can transmit data over a short range of about ten feet in passports, and schools and employers are starting to embed the chips in ID cards. In 2013, a federal judge in Texas denied a student’s challenge to her school’s requirement that she wear an RFID-enabled ID card. Some employers have even flirted with the idea of implanting the chips under their employees’ skin, which prompted California to outlaw the practice in 2008.

We rejected airport body scanners: Mike M. Ahlers, “TSA Removing ‘Virtual Strip Search’ Body Scanners,” CNN.com, January 19, 2013, http://www.cnn.com/2013/01/18/travel/tsa-body-scanners/index.html. We do not embed tracking microchips: “California Bans Forced RFID Tagging of Humans,” Government Technology, October 17, 2007, http://www.govtech.com/security/California-Bans-Forced-RFID-Tagging-of.html?topic=117688. In 2013, Judge Shira Scheindlin: David Floyd, Lalit Clarkson, Deon Dennis, and David Ourlicht v. the City of New York, 08 Civ. 1034 (SAS) (S.D. N.Y. 2013), http://www.nyclu.org/files/releases/Floyd%20opinion.pdf.


pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier

23andMe, Airbnb, airport security, AltaVista, Anne Wojcicki, AOL-Time Warner, augmented reality, behavioural economics, Benjamin Mako Hill, Black Swan, Boris Johnson, Brewster Kahle, Brian Krebs, call centre, Cass Sunstein, Chelsea Manning, citizen journalism, Citizen Lab, cloud computing, congestion charging, data science, digital rights, disintermediation, drone strike, Eben Moglen, Edward Snowden, end-to-end encryption, Evgeny Morozov, experimental subject, failed state, fault tolerance, Ferguson, Missouri, Filter Bubble, Firefox, friendly fire, Google Chrome, Google Glasses, heat death of the universe, hindsight bias, informal economy, information security, Internet Archive, Internet of things, Jacob Appelbaum, James Bridle, Jaron Lanier, John Gilmore, John Markoff, Julian Assange, Kevin Kelly, Laura Poitras, license plate recognition, lifelogging, linked data, Lyft, Mark Zuckerberg, moral panic, Nash equilibrium, Nate Silver, national security letter, Network effects, Occupy movement, operational security, Panopticon Jeremy Bentham, payday loans, pre–internet, price discrimination, profit motive, race to the bottom, RAND corporation, real-name policy, recommendation engine, RFID, Ross Ulbricht, satellite internet, self-driving car, Shoshana Zuboff, Silicon Valley, Skype, smart cities, smart grid, Snapchat, social graph, software as a service, South China Sea, sparse data, stealth mode startup, Steven Levy, Stuxnet, TaskRabbit, technological determinism, telemarketer, Tim Cook: Apple, transaction costs, Uber and Lyft, uber lyft, undersea cable, unit 8200, urban planning, Wayback Machine, WikiLeaks, workplace surveillance , Yochai Benkler, yottabyte, zero day

gait recognition systems: Zhaoxiang Zhang, Maodi Hu, and Yunhong Wang (2011), “A survey of advances in biometric gait recognition,” Biometric Recognition, Lecture Notes in Computer Science 7098, Springer-Verlag, http://link.springer.com/chapter/10.1007%2F978-3-642-25449-9_19. contactless RFID chip cards: Katherine Albrecht (2008), “RFID tag: You’re it,” Scientific American (Sep 2008): 72–77, http://www.scientificamerican.com/article/how-rfid-tags-could-be-used. University of Washington College of Engineering (22 Feb 2008), “University launches RFID people tracking experiment,” RFID Journal, http://www.rfidjournal.com/articles/view?6924. Christopher Zara (8 Jan 2013), “Disney World’s RFID tracking bracelets are a slippery slope, warns privacy advocate,” International Business Times, http://www.ibtimes.com/disney-worlds-rfid-tracking-bracelets-are-slippery-slope-warns-privacy-advocate-1001790.

German consumers opposing: IBM Corporation (16 Dec 2004), “METRO Group’s Future Store takes German public by storm—thanks to wireless technology,” ftp://ftp.software.ibm.com/software/solutions/pdfs/10704035_Metro_cs_1b.pdf. Kim Zetter (28 Feb 2004), “Germans protest radio-ID plans,” Wired, http://archive.wired.com/techbiz/media/news/2004/02/62472. Jan Libbenga (1 Mar 2004), “German revolt against RFID,” Register, http://www.theregister.co.uk/2004/03/01/german_revolt_against_rfid. Facebook users objecting: K. C. Jones (17 Feb 2009), “Facebook’s terms of use draw protest,” Information Week, http://www.informationweek.com/software/social/facebooks-terms-of-use-draw-protest/d/d-id/1076697. Bobbie Johnson and Afua Hirsch (18 Feb 2009), “Facebook backtracks after online privacy protest,” Guardian, http://www.theguardian.com/technology/2009/feb/19/facebook-personal-data.

Face recognition is the easiest way to identify people on camera, and the technology is getting better every year. In 2014, face recognition algorithms started outperforming people. There are other image identification technologies in development: iris scanners that work at a distance, gait recognition systems, and so on. There’s more hidden surveillance going on in the streets. Those contactless RFID chip cards in your wallet can be used to track people. Many retail stores are surreptitiously tracking people by the MAC addresses and Bluetooth IDs—which are basically identification numbers—broadcast by their smartphones. The goal is to record which aisles they walk down, which products they stop to look at, and so on.


pages: 332 words: 100,601

Rebooting India: Realizing a Billion Aspirations by Nandan Nilekani

Airbnb, Atul Gawande, autonomous vehicles, barriers to entry, bitcoin, call centre, carbon credits, cashless society, clean water, cloud computing, collaborative consumption, congestion charging, DARPA: Urban Challenge, data science, dematerialisation, demographic dividend, digital rights, driverless car, Edward Snowden, en.wikipedia.org, energy security, fail fast, financial exclusion, gamification, Google Hangouts, illegal immigration, informal economy, information security, Khan Academy, Kickstarter, knowledge economy, land reform, law of one price, M-Pesa, machine readable, Mahatma Gandhi, Marc Andreessen, Mark Zuckerberg, mobile money, Mohammed Bouazizi, more computing power than Apollo, Negawatt, Network effects, new economy, off-the-grid, offshore financial centre, price mechanism, price stability, rent-seeking, RFID, Ronald Coase, school choice, school vouchers, self-driving car, sharing economy, Silicon Valley, single source of truth, Skype, smart grid, smart meter, software is eating the world, source of truth, Steve Jobs, systems thinking, The future is already here, The Nature of the Firm, transaction costs, vertical integration, WikiLeaks, work culture

There are several technologies that can be employed for this process—active and passive microwave, infrared, and active and passive radio-frequency identification (RFID). Microwave-based systems are common in Europe and Japan, whereas RFID-based systems are popular in the US. Based on the technical merits and costs of different technologies, the committee chose passive RFID as the best solution for India. In this system, the vehicle owner needs to purchase a radio tag and stick it prominently on the windscreen. The tag has an antenna and a circuit printed on the inside; they are activated by the overhead reader, or transceiver, installed in the toll plaza. Such systems are now commonplace and the cost is minimal. In the passive RFID set-up, the main source of energy is the overhead reader, not the sticker.

For any system that is likely to be deployed nationwide, the technology component must be robust, tried and tested in the real world, and affordable. Ideally, it should be available from multiple vendors so that the government is not forced into a lock-in with a single vendor. For the RFID-enabled toll collection system, there need to be multiple vendors of tags and transceivers, all developed to a common specification laid down by the government. Once the specifications are met, any tag should be capable of being read by any transceiver and vice versa, irrespective of the vendor. The passive RFID technology satisfies all these criteria, and hence was recommended by the committee as the technology platform on which to build an electronic toll collection system.

Even more importantly, automating the tax computation process would eliminate incentives for corruption, resulting in a significant increase in revenues and a gradual improvement in road safety standards as well. Ravi Palekar explains to us, ‘If you integrate the RFID and taxation systems together, every time you read a tag at a check post, you can get the vehicle’s entire history—its origin, destination, what goods it’s carrying, whether the operators have paid tax or not—in a format that’s easily available to the state.’ A separate steering committee is working on integrating the radio tag into the state border check-post system, and he says, ‘A team will shortly be visiting Ahmedabad to consult with the Gujarat government about taking the RFID-border check-post linkage forward.’ Once the government develops ‘electronic toll as a platform’, not only will various government applications that we discussed above be possible, but also, start-ups will come up with all sorts of innovative ideas once they have a method to identify a vehicle and the ability to debit and credit its wallet in the cloud.


pages: 268 words: 109,447

The Cultural Logic of Computation by David Golumbia

Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, American ideology, Benoit Mandelbrot, Bletchley Park, borderless world, business process, cellular automata, citizen journalism, Claude Shannon: information theory, computer age, Computing Machinery and Intelligence, corporate governance, creative destruction, digital capitalism, digital divide, en.wikipedia.org, finite state, folksonomy, future of work, Google Earth, Howard Zinn, IBM and the Holocaust, iterative process, Jaron Lanier, jimmy wales, John von Neumann, Joseph Schumpeter, late capitalism, Lewis Mumford, machine readable, machine translation, means of production, natural language processing, Norbert Wiener, One Laptop per Child (OLPC), packet switching, RAND corporation, Ray Kurzweil, RFID, Richard Stallman, semantic web, Shoshana Zuboff, Slavoj Žižek, social web, stem cell, Stephen Hawking, Steve Ballmer, Stewart Brand, strong AI, supply-chain management, supply-chain management software, technological determinism, Ted Nelson, telemarketer, The Wisdom of Crowds, theory of mind, Turing machine, Turing test, Vannevar Bush, web application, Yochai Benkler

In recent years Wal-Mart has been at the forefront not just of ERP and supply-chain management software, but of a relatively new technology, Radio Frequency Identification Device (RFID) and the associated Electronic Product Code (EPC) system. Like the intensively computational bar codes before it, RFID identifies products via alphanumeric tagging. Where bar codes identify items by the class to which they belong (or what philosophers would call type identification)—every box of shredded wheat, for example, has the same bar code printed on it, allowing cashiers to retrieve the price for the item from a central computer—RFID specifies tokens of items. Each cereal box now includes a unique RFID chip, allowing the central authority to track precisely when and where it is processed, delivered, and sold.

Of course there are manifest benefits to such a system; the benefits are not at issue in the present discussion and RFID would not even be considered if it did not offer benefits to both Wal-Mart and its customers. Like similar technologies in the past, RFID and EPC have raised a certain amount of consumer and democratic concern, such that Wal-Mart in particular has been compelled in the name of public relations to contribute to a global effort called EPCGlobal (http://www.epcglobalna.org/) whose job is to promote public awareness of the uses of RFID and EPC and their benefits for consumers. Rather than demonstrating democratic control over this technology, though, the existence of EPCGlobal points more generally to the obvious privacy and surveillance issues raised by technologies like RFID that suggest the provision of worldwide, pinpoint surveillance to centralized authorities.

Rather than demonstrating democratic control over this technology, though, the existence of EPCGlobal points more generally to the obvious privacy and surveillance issues raised by technologies like RFID that suggest the provision of worldwide, pinpoint surveillance to centralized authorities. The ethical standards promulgated by EPCGlobal are themselves far less worrying than are the inevitable more secretive applications of similar technologies that are sure to follow on the heels of RFID. Such technologies radically reformulate critical tenets on which concepts like personal privacy and private space, let alone public space, are themselves constituted in a democratic society, and while their explicit use by law enforcement and the government may at least at times be raised for policy dis- Computationalism, Striation, and Cultural Authority p 177 cussion by lawmakers (though perhaps less often than some might wish), their widespread proliferation by multinational corporations is far less subject to democratic investigation and control, and at the same time perhaps more pervasive and constitutive of the contemporary lifeworld than are the surveillance technologies used by government.


pages: 464 words: 127,283

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia by Anthony M. Townsend

1960s counterculture, 4chan, A Pattern Language, Adam Curtis, air gap, Airbnb, Amazon Web Services, anti-communist, Apple II, Bay Area Rapid Transit, Big Tech, bike sharing, Boeing 747, Burning Man, business process, call centre, carbon footprint, charter city, chief data officer, clean tech, clean water, cloud computing, company town, computer age, congestion charging, congestion pricing, connected car, crack epidemic, crowdsourcing, DARPA: Urban Challenge, data acquisition, Deng Xiaoping, digital divide, digital map, Donald Davies, East Village, Edward Glaeser, Evgeny Morozov, food desert, game design, garden city movement, General Motors Futurama, gentrification, Geoffrey West, Santa Fe Institute, George Gilder, ghettoisation, global supply chain, Grace Hopper, Haight Ashbury, Hedy Lamarr / George Antheil, Herman Kahn, hive mind, Howard Rheingold, interchangeable parts, Internet Archive, Internet of things, Jacquard loom, Jane Jacobs, Jevons paradox, jitney, John Snow's cholera map, Joi Ito, Khan Academy, Kibera, Kickstarter, knowledge worker, Lewis Mumford, load shedding, lolcat, M-Pesa, machine readable, Mark Zuckerberg, megacity, megaproject, messenger bag, mobile money, mutually assured destruction, new economy, New Urbanism, Norbert Wiener, Occupy movement, off grid, One Laptop per Child (OLPC), openstreetmap, packet switching, PalmPilot, Panopticon Jeremy Bentham, Parag Khanna, patent troll, Pearl River Delta, place-making, planetary scale, popular electronics, power law, RFC: Request For Comment, RFID, ride hailing / ride sharing, Robert Gordon, scientific management, self-driving car, sharing economy, Shenzhen special economic zone , Silicon Valley, SimCity, Skype, smart cities, smart grid, smart meter, social graph, social software, social web, SpaceShipOne, special economic zone, Steve Jobs, Steve Wozniak, Stuxnet, supply-chain management, technoutopianism, Ted Kaczynski, telepresence, The Death and Life of Great American Cities, too big to fail, trade route, Twitter Arab Spring, Tyler Cowen, Tyler Cowen: Great Stagnation, undersea cable, Upton Sinclair, uranium enrichment, urban decay, urban planning, urban renewal, Vannevar Bush, working poor, working-age population, X Prize, Y2K, zero day, Zipcar

Upon entering the building, conventioneers pick up their ID badges, embedded with a “u-chip” (for “ubiquitous” computing), a radio-frequency identification (RFID) tag that functions as a wireless bar code. To enter the exhibition hall, one swipes the card across a reader mounted atop each turnstile, much like entering a subway station. It’s a familiar move for Korean city dwellers. For over a decade, they have used local tech giant LG’s rechargeable T-money cards not just to board buses and subways, but to pay for taxis and convenience-store purchases as well. From the earliest planning stages, the nation’s economic planners intended Songdo to be a test bed for RFID and a center for research and development in this crucial ubiquitous computing technology.

From the earliest planning stages, the nation’s economic planners intended Songdo to be a test bed for RFID and a center for research and development in this crucial ubiquitous computing technology. In 2005 the government announced a $300 million, 20-acre RFID-focused industrial park in Songdo.12 Inside Convensia, your interactions with computers seem far from ubiquitous, broken up into a fragmented series of gestures and glances—swiping your RFID card to enter a room or pressing a button to request that an elevator be dispatched to your location. As they move through the complex, visitors locate meeting rooms by reading digital displays mounted beside entryways, which draw down the latest events schedule from a central master calendar. Other smart technologies inhabit Convensia’s unseen innards—controls for climate systems, lighting, safety and security systems are there, yet invisible to the average person.

According to CEO John Chambers of Cisco Systems, which committed $47 million in 2009 to build out the city’s digital nervous system, it is a place that will “run on information.” 13 Plans call for cameras that detect the presence of pedestrians at night in order to save energy safely by automatically extinguishing street lighting on empty blocks. Passing automobiles with RFID-equipped license plates will be scanned, just the way conventioneers are at Convensia’s main gate, to create a real-time map of vehicle movements and, over time, the ability to predict future traffic patterns based on the trove of past measurements.14 A smart electricity grid will communicate with home appliances, perhaps anticipating the evening drawdown of juice as tens of thousands of programmable rice cookers count down to dinnertime.


Smart Cities, Digital Nations by Caspar Herzberg

Asian financial crisis, barriers to entry, business climate, business cycle, business process, carbon footprint, clean tech, clean water, cloud computing, corporate social responsibility, Dean Kamen, demographic dividend, Edward Glaeser, Edward Snowden, Hacker News, high-speed rail, hive mind, Internet of things, knowledge economy, Masdar, megacity, New Urbanism, operational security, packet switching, QR code, remote working, RFID, rising living standards, risk tolerance, Ronald Reagan, shareholder value, Silicon Valley, Silicon Valley startup, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart meter, social software, special economic zone, Stephen Hawking, telepresence, too big to fail, trade route, transcontinental railway, upwardly mobile, urban planning, urban sprawl, women in the workforce, working poor, X Prize

This was technology so deeply embedded in a resident’s environment as to be literally everywhere. As early as 2005, the press had been invited to marvel at Songdo’s services. Radio-frequency identification (RFID) technology on cars that transmitted geo-location information or home-automation options that could open a front door or select music by way of a smartphone were touted as natural outgrowths of South Korea’s vibrant technological awareness. Many of Songdo’s features (such as RFID cards) had been prototyped by LG CNS in Seoul and other cities; from this perspective, Songdo was the next evolutionary step for a nation on the front line of IT innovation.

This, like so many of the projections, was overly optimistic, and it also missed the value of accomplishments that would be more difficult to evaluate in terms of revenue. The components of smart city building are staggering in number. Residential and commercial buildings need to be outfitted with “smart” lighting, power, elevators, and security features. The sea and airports require Radio Frequency Identification (RFID) inventory systems, automated transport, and ruggedized connections. Reliable wireless connectivity is a given and must be available everywhere. Above the infrastructure, communications must be state of the art at inception but open to the upgrades and changes typical of technology subject to constant development.

Additionally, 40 percent of rooftops would become green space. In all, 75 percent of Songdo’s waste was to be recycled in some shape or form—it was a city that put pedestrians and cyclists before drivers and electric and high-occupancy cars in better parking spaces than standard gas-powered transport. RFID technology could read license plates and detect traffic clusters before they became traffic jams. At its best, Songdo would anticipate the behavior and preferences of residents and visitors alike, staying a step or two ahead of the action and keeping everything clean and under control. At last, a city could serve its masters efficiently.


Engineering Security by Peter Gutmann

active measures, address space layout randomization, air gap, algorithmic trading, Amazon Web Services, Asperger Syndrome, bank run, barriers to entry, bitcoin, Brian Krebs, business process, call centre, card file, cloud computing, cognitive bias, cognitive dissonance, cognitive load, combinatorial explosion, Credit Default Swap, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, Debian, domain-specific language, Donald Davies, Donald Knuth, double helix, Dr. Strangelove, Dunning–Kruger effect, en.wikipedia.org, endowment effect, false flag, fault tolerance, Firefox, fundamental attribution error, George Akerlof, glass ceiling, GnuPG, Google Chrome, Hacker News, information security, iterative process, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Conway, John Gilmore, John Markoff, John von Neumann, Ken Thompson, Kickstarter, lake wobegon effect, Laplace demon, linear programming, litecoin, load shedding, MITM: man-in-the-middle, Multics, Network effects, nocebo, operational security, Paradox of Choice, Parkinson's law, pattern recognition, peer-to-peer, Pierre-Simon Laplace, place-making, post-materialism, QR code, quantum cryptography, race to the bottom, random walk, recommendation engine, RFID, risk tolerance, Robert Metcalfe, rolling blackouts, Ruby on Rails, Sapir-Whorf hypothesis, Satoshi Nakamoto, security theater, semantic web, seminal paper, Skype, slashdot, smart meter, social intelligence, speech recognition, SQL injection, statistical model, Steve Jobs, Steven Pinker, Stuxnet, sunk-cost fallacy, supply-chain attack, telemarketer, text mining, the built environment, The Death and Life of Great American Cities, The Market for Lemons, the payments system, Therac-25, too big to fail, Tragedy of the Commons, Turing complete, Turing machine, Turing test, Wayback Machine, web application, web of trust, x509 certificate, Y2K, zero day, Zimmermann PGP

“MEED: A Memory-efficient Distance Bounding Protocol with Error Detection”, Wei Xin, Cong Tang, Hu Xiong, Yonggang Wang, Huiping Sun, Zhi Guan and Zhong Chen, Proceedings of the Asia Workshop on RFID Security (RFIDSec’11 Asia), April 2011, p.129. “Design of a Secure Distance-Bounding Channel for RFID”, Gerhard Hancke, Journal of Network and Computer Applications, Vol.34, No.3 (May 2011), p.877. “A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, Süleyman Kardaş, Mehmet Kiraz, Muhammed Bingöl, and Hüseyin Demirci, Proceedings of the 7th Workshop on RFID Security (RFIDSec’11), Springer-Verlag LNCS No.7055, June 2011, p.78. “A secure distance-based RFID identification protocol with an off-line backend database”, Pedro Peris-Lopez, Agustin Orfila, Esther Palomar and Julio Hernandez-Castro, Personal and Ubiquitous Computing, Vol.16, No.3 (March 2012), p.351.

“Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security” Pedro Peris-Lopez, Julio Hernandez-Castro, Juan Tapiador, Esther Palomar and Jan van der Lubbe, IEEE Communications Letters, Vol.14, No.2, (April 2010), p.121. “Design of a Secure Distance-Bounding Channel for RFID”, Gerhard Hancke, Journal of Network and Computer Applications, Vol.34, No.3 (May 2010), p.877. “Optimal Security Limits of RFID Distance Bounding Protocols” Orhun Kara, Süleyman Kardaş, Muhammed Bingöl and Gildas Avoine, Proceedings of the 6th Workshop on RFID Security (RFIDSec’10), Springer-Verlag LNCS No.6370, June 2010, p.220.

In this example the immigration official is seeing a fake passport that successfully identifies itself as the real article by forwarding the communications with the reader to a victim’s passport located somewhere else (for example via someone standing or sitting close to the victim, or simply placing a piece of luggage with the proxy hardware close to the victim’s passport), without the victim ever being aware that their passport is being misused in this manner. It doesn’t even require specialised equipment but can be done with standard RFID-enabled cellphones [421]. Although there exist theoretical defences against this in the form of specialised distance-bounding protocols (discussed earlier in this section) designed for RFID use, in practice implementation issues and problems due to excessive false positives has left these protocols mostly as a lab curiosity. The same types of relay attacks are possible with RFID-enabled credit cards [422][423][420], access control systems [424], keyless car entry systems [425], and a number of other systems employing contactless interfaces that have been rushed out without considering the security implications of the change in interface type.


pages: 390 words: 109,870

Radicals Chasing Utopia: Inside the Rogue Movements Trying to Change the World by Jamie Bartlett

Andrew Keen, back-to-the-land, Bernie Sanders, bitcoin, Black Lives Matter, blockchain, blue-collar work, Boris Johnson, brain emulation, Californian Ideology, centre right, clean water, climate change refugee, cryptocurrency, digital rights, Donald Trump, drone strike, Elon Musk, energy security, Ethereum, ethereum blockchain, Evgeny Morozov, failed state, gig economy, hydraulic fracturing, income inequality, intentional community, Intergovernmental Panel on Climate Change (IPCC), Jaron Lanier, Jeremy Corbyn, job automation, John Markoff, John Perry Barlow, Joseph Schumpeter, Kickstarter, life extension, military-industrial complex, Nick Bostrom, Occupy movement, off grid, Overton Window, Peter Thiel, post-industrial society, post-truth, postnationalism / post nation state, precariat, QR code, radical life extension, Ray Kurzweil, RFID, Rosa Parks, Ross Ulbricht, Satoshi Nakamoto, self-driving car, Silicon Valley, Silicon Valley startup, Skype, smart contracts, stem cell, Stephen Hawking, Steve Jobs, Steven Pinker, systems thinking, technoutopianism, the long tail, Tragedy of the Commons

.* ‘Are you feeling more than human now?’ I ask. ‘I feel like I’m about to wake up in the Matrix,’ laughs Zoltan, as he clenches and unclenches his fist. ‘That wasn’t too bad.’ There are millions of RFID chips in all sorts of daily devices already, such as fob keys and pets’ collars. In 2015 the market in RFID chips was worth around $10 billion, and this is expected to almost double within ten years. But this RFID chip can’t do much because it’s not compatible with iPhones, which is what Zoltan has. So instead, his chip is programmed to say ‘Win 2016’ if someone else hovers their (Samsung) phone over it.

But this weekend was the chance to meet fellow grinders in person and conduct experiments. Several plan to insert microchips and magnets into their body. One has designed a nineteenth-century duelling scar he’d like to run down the front of his face. Zoltan has decided to get a Radio Frequency Identification (RFID) chip implant.11 An RFID chip is smaller than a grain of rice, and stores small amounts of information that can be recognised by other compatible devices if they are programmed to do so. As we park up and jump off the bus, Rich Lee welcomes us and takes us into the ‘lab’ where the experiments are taking place.

I’ll be able to connect my brain to the internet, I’ll be able to feel sounds. And my brain will start to adapt. I’ll be a node on the internet!’ he says. ‘What if someone hacks into your system and starts sending you horrible noises?’ I ask. ‘I think that would be awesome.’ ‘Why?’ ‘I’d love to know what they do, and how they do it.’ Nearly all the grinders have RFID chip implants. One has set up his phone so it unlocks when he holds it over his thumb. Another scans her chip to share contact information with me. Julius, a smart nineteen-year-old from Texas who works in software, walks me over to his car and unlocks it with his hand. He then starts it with his hand.


Data Mining: Concepts and Techniques: Concepts and Techniques by Jiawei Han, Micheline Kamber, Jian Pei

backpropagation, bioinformatics, business intelligence, business process, Claude Shannon: information theory, cloud computing, computer vision, correlation coefficient, cyber-physical system, database schema, discrete time, disinformation, distributed generation, finite state, industrial research laboratory, information retrieval, information security, iterative process, knowledge worker, linked data, machine readable, natural language processing, Netflix Prize, Occam's razor, pattern recognition, performance metric, phenotype, power law, random walk, recommendation engine, RFID, search costs, semantic web, seminal paper, sentiment analysis, sparse data, speech recognition, statistical model, stochastic process, supply-chain management, text mining, thinkpad, Thomas Bayes, web application

(d) If you want to drive from A to B starting at a particular time, discuss how a system may use the data in this warehouse to work out a fast route. 4.11 Radio-frequency identification is commonly used to trace object movement and perform inventory control. An RFID reader can successfully read an RFID tag from a limited distance at any scheduled time. Suppose a company wants to design a data warehouse to facilitate the analysis of objects with RFID tags in an online analytical processing manner. The company registers huge amounts of RFID data in the format of (RFID, at_location, time), and also has some information about the objects carrying the RFID tag, for example, (RFID, product_name, product_category, producer, date_produced, price). (a) Design a data warehouse to facilitate effective registration and online analytical processing of such data.

(a) Design a data warehouse to facilitate effective registration and online analytical processing of such data. (b) The RFID data may contain lots of redundant information. Discuss a method that maximally reduces redundancy during data registration in the RFID data warehouse. (c) The RFID data may contain lots of noise such as missing registration and misread IDs. Discuss a method that effectively cleans up the noisy data in the RFID data warehouse. (d) You may want to perform online analytical processing to determine how many TV sets were shipped from the LA seaport to BestBuy in Champaign, IL, by month, brand, and price_range.

The basic data cube structure has been further extended for various sophisticated data types and new applications. Here we list some examples, such as spatial data cubes for the design and implementation of geospatial data warehouses, and multimedia data cubes for the multidimensional analysis of multimedia data (those containing images and videos). RFID data cubes handle the compression and multidimensional analysis of RFID (i.e., radio-frequency identification) data. Text cubes and topic cubes were developed for the application of vector-space models and generative language models, respectively, in the analysis of multidimensional text databases (which contain both structure attributes and narrative text attributes). 5.3.1.


pages: 274 words: 75,846

The Filter Bubble: What the Internet Is Hiding From You by Eli Pariser

A Declaration of the Independence of Cyberspace, A Pattern Language, adjacent possible, Amazon Web Services, An Inconvenient Truth, Apple Newton, augmented reality, back-to-the-land, Black Swan, borderless world, Build a better mousetrap, Cass Sunstein, citizen journalism, cloud computing, cognitive dissonance, crowdsourcing, Danny Hillis, data acquisition, disintermediation, don't be evil, Filter Bubble, Flash crash, fundamental attribution error, Gabriella Coleman, global village, Haight Ashbury, Internet of things, Isaac Newton, Jaron Lanier, Jeff Bezos, jimmy wales, John Perry Barlow, Kevin Kelly, knowledge worker, Mark Zuckerberg, Marshall McLuhan, megacity, Metcalfe’s law, Netflix Prize, new economy, PageRank, Paradox of Choice, Patri Friedman, paypal mafia, Peter Thiel, power law, recommendation engine, RFID, Robert Metcalfe, sentiment analysis, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, social graph, social software, social web, speech recognition, Startup school, statistical model, stem cell, Steve Jobs, Steven Levy, Stewart Brand, technoutopianism, Ted Nordhaus, The future is already here, the scientific method, urban planning, We are as Gods, Whole Earth Catalog, WikiLeaks, Y Combinator, Yochai Benkler

Wave the bracelet at the entrance to a ride, for example, and a status update posted to your account testifies that you’re about to embark. Take a picture of your friends with a special camera and wave the bracelet at it, and the photo’s posted with your identity already tagged. Embedded in each bracelet is a radio-frequency identification (RFID) chip. RFID chips don’t need batteries, and there’s only one way to use them: call-and-response. Provide a little wireless electromagnetic power, and the chip chirps out a unique identifying code. Correlate the code with, say, a Facebook account, and you’re in business. A single chip can cost as little as $.07, and they’ll cost far less in the years to come.

Affix a chip to an individual car part, and you can watch as the part travels to the car factory, gets assembled into a car, and makes its way to the show floor and then someone’s garage. No more inventory shrinkage, no more having to recall whole models of products because of the errors of one factory. Conversely, RFID provides a framework by which a home could automatically inventory every object inside it—and track which objects are in which rooms. With a powerful enough signal, RFID could be a permanent solution to the lost-keys problem—and bring us face-to-face with what Forbes writer Reihan Salam calls “the powerful promise of a real world that can be indexed and organized as cleanly and coherently as Google has indexed and organized the Web.”

Brockton Cops Have an App for That,” Brockton Patriot Ledger, June 15, 2010, accessed Dec. 17, 2010, www.patriotledger.com/news/cops_and_courts/x1602636300/Catching-criminals-Cops-have-an-app-for-that. 195 “other images of you with ninety-five percent accuracy”: Jerome Taylor, “Google Chief: My Fears for Generation Facebook,” Independent, Aug. 18, 2010, accessed Dec. 17, 2010, www.independent.co.uk/life-style/gadgets-and-tech/news/google-chief-my-fears-for-generation-facebook-2055390.html . 197 “The future is already here”: William Gibson, interview on NPR’s Fresh Air, Aug. 31, 1993, accessed Dec. 17, 2010, www.npr.org/templates/story/story.php?storyId=1107153. 197 your identity already tagged: “RFID Bracelet Brings Facebook to the Real World,” Aug. 20, 2010, accessed Dec. 17, 2010, www.psfk.com/2010/08/rfid-bracelet-brings-facebook-to-the-real-world.html. 198 “real world that can be indexed”: Reihan Salam, “Why Amazon Will Win the Internet,” Forbes, July 30, 2010, accessed Dec. 17, 2010, www.forbes.com/2010/07/30/amazon-kindle-economy-environment-opinions-columnists-reihan-salam.html. 198 “some have termed ‘smart dust’ ”: David Wright, Serge Gutwirth, Michael Friedewald, Yves Punie, and Elena Vildjiounaite, Safeguards in a World of Ambient Intelligence (Berlin/Dordrecht: Springer Science, 2008): abstract. 199 four-year joint effort: Google/Harvard press release.


The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences by Rob Kitchin

Bayesian statistics, business intelligence, business process, cellular automata, Celtic Tiger, cloud computing, collateralized debt obligation, conceptual framework, congestion charging, corporate governance, correlation does not imply causation, crowdsourcing, data science, discrete time, disruptive innovation, George Gilder, Google Earth, hype cycle, Infrastructure as a Service, Internet Archive, Internet of things, invisible hand, knowledge economy, Large Hadron Collider, late capitalism, lifelogging, linked data, longitudinal study, machine readable, Masdar, means of production, Nate Silver, natural language processing, openstreetmap, pattern recognition, platform as a service, recommendation engine, RFID, semantic web, sentiment analysis, SimCity, slashdot, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart grid, smart meter, software as a service, statistical model, supply-chain management, technological solutionism, the scientific method, The Signal and the Noise by Nate Silver, transaction costs

Hitachi uses such sensors to monitor their complex, expensive heavy construction vehicles, and UPS do the same with their fleet of vans and trucks so that they can be serviced to run efficiently and before they break down (Plumridge 2012; Mayer-Schonberger and Cukier 2013). By attaching an RFID to products it becomes possible to track and trace the movement of individual units from factory or farm to consumer, reducing theft and wastage. Likewise, toll tags contain RFID chips that communicate with transponders at toll-booth barriers, leading to quicker throughput of vehicles and automatic payment, as well as measuring vehicle flow or parking space availability for traffic management. RFID chips attached to buses and trains communicate with transponders along their routes making it possible to track the location of vehicles in real-time.

For example, most items for sale in a supermarket presently have a barcode. This barcode identifies the product, but not the individual item – all bottles of the same brand and range of shampoo share the same barcode – meaning that they cannot be individually discriminated. In contrast, a bottle of shampoo tagged with a RFID chip is uniquely identifiable because each chip has a unique ID code which can be read at a distance by a radio transponder. Consequently, each bottle can be tracked from the place of manufacture through the supply chain into a store and a customer’s basket, creating a detailed audit trail. In other words, it has become possible to minutely trace the circulation of individual things across time and space, including those who handle each thing along its path.

As well as being more indexical, identification codes have also become increasingly machinereadable (Dodge and Kitchin 2005). For example, a barcode contains an identification code that when scanned by a laser reader is linked to an information system where additional metadata are held that describe the object (e.g. product type/model, date and place of manufacture, price, etc.). RFID chips can be sensed at a distance by a transponder and identified. Vehicles can be recognised by automatic number plate recognition software, and new algorithmic techniques have been developed to recognise and identify faces and gait (how people walk). Elements of the world have thus become open to being automatically captured and identified, massively expanding the amount and resolution of data generated with regard to a system, enabling new forms of regulation and governance (Dodge and Kitchin 2007a) and systems to function in more automated ways (Kitchin and Dodge 2011).


pages: 427 words: 112,549

Freedom by Daniel Suarez

augmented reality, big-box store, British Empire, Burning Man, business intelligence, call centre, cloud computing, corporate personhood, digital map, game design, global supply chain, illegal immigration, Naomi Klein, new economy, Pearl River Delta, plutocrats, private military company, RFID, Shenzhen special economic zone , special economic zone, speech recognition, Stewart Brand, telemarketer, the scientific method, young professional

Philips listened to the news as she sat at the dining room table examining the plastic RFID bracelet affixed to her wrist. She held it up to the light to try to see through the thin plastic band. Boynton had said it was tamper-resistant, and she assumed this meant it had a wire antenna braided into its length that would be severed if the bracelet were broken. The whole ranch complex was littered with RFID readers--she'd spotted no less than six here in the bungalow. The sudden loss of a signal would undoubtedly put her unique RFID number into alarm and summon security to investigate. Unless she could slip this digital leash, she wasn't going to be able to escape or do anything else without their knowledge.

They would have taken over the Daemon and solidified their control. Philips knew an RFID tag was just a circuit attached to an antenna. It used energy from a radio wave to activate the circuit and broadcast its unique ID on a specific frequency. That's how it could broadcast its location to Sky Ranch Security without needing a battery. The ISO 15693 standard common for RFID proximity cards and mobile payment systems meant this bracelet was probably operating at 13.56 MHz--which was a commercial frequency. Philips had attended conferences where hacker groups demonstrated homemade devices able to harvest and spoof RFID tags at will. The question was whether Philips could build something similar with the materials here in the bungalow.

"You're strapping a transponder on me?" A soldier snapped a digital photograph of her. Boynton held up his hands reassuringly. "RFID tag for tracking purposes. Don't try to remove it." He pointed to the one on his own wrist. "It's your identity while on the ranch. It'll send an alert if it's tampered with. Sensors at the entrances to most buildings will go into alarm if you enter without one. Likewise if you enter restricted areas. And alarms are responded to with lethal force. These RFID tags let the troops know that you're friendly, and we've got quite a few snipers out there--so please wear it at all times."


pages: 219 words: 63,495

50 Future Ideas You Really Need to Know by Richard Watson

23andMe, 3D printing, access to a mobile phone, Albert Einstein, Alvin Toffler, artificial general intelligence, augmented reality, autonomous vehicles, BRICs, Buckminster Fuller, call centre, carbon credits, Charles Babbage, clean water, cloud computing, collaborative consumption, computer age, computer vision, crowdsourcing, dark matter, dematerialisation, Dennis Tito, digital Maoism, digital map, digital nomad, driverless car, Elon Musk, energy security, Eyjafjallajökull, failed state, Ford Model T, future of work, Future Shock, gamification, Geoffrey West, Santa Fe Institute, germ theory of disease, global pandemic, happiness index / gross national happiness, Higgs boson, high-speed rail, hive mind, hydrogen economy, Internet of things, Jaron Lanier, life extension, Mark Shuttleworth, Marshall McLuhan, megacity, natural language processing, Neil Armstrong, Network effects, new economy, ocean acidification, oil shale / tar sands, pattern recognition, peak oil, personalized medicine, phenotype, precision agriculture, private spaceflight, profit maximization, RAND corporation, Ray Kurzweil, RFID, Richard Florida, Search for Extraterrestrial Intelligence, self-driving car, semantic web, Skype, smart cities, smart meter, smart transportation, space junk, statistical model, stem cell, Stephen Hawking, Steve Jobs, Steven Pinker, Stewart Brand, strong AI, Stuxnet, supervolcano, synthetic biology, tech billionaire, telepresence, The Wisdom of Crowds, Thomas Malthus, Turing test, urban decay, Vernor Vinge, Virgin Galactic, Watson beat the top human players on Jeopardy!, web application, women in the workforce, working-age population, young professional

So if you’re lying on a beach somewhere in the future, someone you don’t know might point a phone at you, find out who you are, then work out where you’re from. If you’ve told others about your future plans via social networks, criminals might access this information then tell someone to visit your home and rob you. Looking forward So what might surveillance look like in the future? RFID (Radio Frequency Identification) tags might allow local councils and authorities to monitor domestic dustbin usage, alerting them when incorrect items are placed in recycling bins. As for CCTV cameras, there is very little evidence that they reduce crime. What they do instead is catch criminals in the act and reassure people looking for certainty and control in an age that is becoming more uncertain and complex.

Home economics And don’t think that the inside of your own home will be immune from such technology either. We’ve already seen digital dashboards that monitor energy use migrating from industrial buildings to private homes and there’s no reason to suspect that automation will stop there. So how about clothing that’s equipped with RFID tags (see page 5) so that your clothes can talk to your washing machine and work out the most efficient time to connect with the water pipes and power grids? Or how about a bathroom mirror (that’s also a TV) which uses facial recognition to identify individual family members and adjust the diary, to-do list or TV channels accordingly?

So what are some of these “things” and what are the consequences of an Internet that’s increasingly made up of physical objects embedded with sensors? In the future your socks will have an IP address and your sock drawer will know how many pairs you’ve got and what color they are. In other words, barcodes and RFID (see page 5) tags were only the first small steps toward a world where information is embedded within everyday objects, which are connected to networks so that they can communicate with each other and with the network as a whole. This will mean that the precise identity, location and status of everything—and possibly everyone—can be identified, and future actions or conditions can be predicted.


pages: 624 words: 180,416

For the Win by Cory Doctorow

anti-globalists, barriers to entry, book value, Burning Man, company town, creative destruction, double helix, Internet Archive, inventory management, lateral thinking, loose coupling, Maui Hawaii, microcredit, New Journalism, off-the-grid, planned obsolescence, Ponzi scheme, post-materialism, printed gun, random walk, reality distortion field, RFID, San Francisco homelessness, Silicon Valley, skunkworks, slashdot, speech recognition, stem cell, Steve Jobs, Steve Wozniak, supply-chain management, technoutopianism, time dilation, union organizing, wage slave, work culture

When we started talking about them a decade ago, all the privacy people went crazy, totally sure that these things would be bad news. The geeks dismissed them as not understanding the technology. Supposedly, an RFID can only be read from a couple inches away—if someone wanted to find out what RFIDs you had on your person, they’d have to wand you, and you’d know about it.” “Yeah, that was bull,” Perry said. “I mean, sure you can’t read an RFID unless it’s been excited with electromagnetic radiation, and sure you can’t do that from a hundred yards without frying everything between you and the target. But if you had a subway turnstile with an exciter built into it, you could snipe all the tag numbers from a distant roof with a directional antenna.

But if you had a subway turnstile with an exciter built into it, you could snipe all the tag numbers from a distant roof with a directional antenna. If those things had caught on, there’d be exciters everywhere and you’d be able to track anyone you wanted—Christ, they even put RFIDs in the hundred-dollar bill for a while! Pickpockets could have figured out whose purse was worth snatching from half a mile a way!” “All true,” Lester said. “But that didn’t stop these guys. There are still a couple of them around, limping along without many customers. They print the tags with inkjets, sized down to about a third the size of a grain of rice.

“Which brings me to my idea: why not tag everything in a group household, and use the tags to figure out who left the dishes in the sink, who took the hammer out and didn’t put it back, who put the empty milk-carton back in the fridge, and who’s got the TV remote? It won’t solve resource contention, but it will limit the social factors that contribute to it.” He looked around at them. “We can make it fun, you know, make cool RFID sticker designs, mod the little gnome dolls to act as terminals for getting reports.” Suzanne found herself nodding along. She could use this kind of thing, even though she lived alone, just to help her find out where she left her glasses and the TV remote. Perry shook his head, though. “When I was a kid, I had a really bad relationship with my mom.


pages: 236 words: 77,098

I Live in the Future & Here's How It Works: Why Your World, Work, and Brain Are Being Creatively Disrupted by Nick Bilton

3D printing, 4chan, Albert Einstein, augmented reality, barriers to entry, Cass Sunstein, death of newspapers, en.wikipedia.org, Internet of things, Joan Didion, John Gruber, John Markoff, Marshall McLuhan, Nicholas Carr, QR code, recommendation engine, RFID, Saturday Night Live, Steve Jobs, Steven Pinker, Stewart Brand, TED Talk, The future is already here

A mainstream version of this technology doesn’t exist yet, so we had to do a little tinkering and hacking. To start, we took a cell phone, placed an RFID chip inside, and then attached an RFID reader to our computers. An RFID (radio-frequency identification) chip is a tiny electronic chip that can store little pieces of information that can be transferred wirelessly to a RFID reader device that interprets the identity of a chip. Many businesses, mine included, give cards with RFID chips to employees so they can enter their office buildings without using a key. RFID chips are also in some credit cards so that you can wave your card in front of an ATM machine instead of swiping it through a scanner.


pages: 95 words: 23,041

Mobile First by Luke Wroblewski

augmented reality, Benchmark Capital, en.wikipedia.org, Mary Meeker, RFID, Steve Jobs, web application

And additional capabilities may be here soon, including: Direction: from a digital compass Gyroscope: 360 degrees of motion Audio: input from a microphone; output to speaker Video and image: capture and input from a camera Dual cameras: front and back Device connections: through Bluetooth Proximity: device closeness to physical objects Ambient light: light/dark environment awareness NFC: Near Field Communications through RFID readers Starting with mobile puts these capabilities in your hands now so you can rethink how people can interact with your website and the world around them. As mobile web browsers continue to gain access to capabilities currently reserved only for native mobile applications, these opportunities will only increase.

Imagine all the typing you’d have to do in a form to accomplish what Google Goggles does when you simply point your camera at something. Fig 6.19: Google Goggles allows you to use the video camera on a mobile device for input. And near field communications (NFC) can take this even further. Mobile devices that can communicate with radio frequency ID tags (RFID) just need to be near something that broadcasts its identity using one of these tiny “digital barcodes” in order to interact with it. Want to learn more about a product? Just get close enough for it to catch a signal and your mobile can bring up all the information you need. How’s that for going beyond input fields and forms?

1193 66http://www.cloudfour.com/on-mobile-context/ 67 http://globalmoxie.com/blog/mobile-web-responsive-design.shtml Index 1024×768 18 $265,000 plane 86 320×480 19, 110 3200 Tigres 114 A A/B testing 16 accelerometer 33-34, 39-42 Adobe 2 Adobe Air 16 American Airlines 93-94 Amazon 24 Android 15-16, 19, 40, 59, 61, 73, 92 Appcache 24 Apple Cinema Display 110-111 Aronowitz, Kate 2 AT&T 9-10 autocapitalize 97 autocorrect 97 B back button 59-62 Bada 15 Bagcheck 57-60, 103 Barnes & Noble 79, 81 Basecamp 50-52, 89-90 Blackberry 13, 16, 59 Bluetooth 43 Boingo 101-102 C Canvas 24 Clark, Josh 50 cell tower 37 Cisco 12 CSS3 24, 110, 112 D data traffic 10-11 device experiences 116-117 device width 110 Dive Into HTML5 96 diving 27-28 E eBay 9, 86 EDGE 9 email 8, 9, 12, 25 ESPN 52-54, 56-57, 64-65, 78 F Facebook 2, 16-17, 27, 53-55 Flickr 21-23, 50-52, 71-72 Fling, Brian 86 :focus 83, 95 G GestureWorks 73 Glympse 38 Gmail 58, 60 Google 2, 9, 15, 24, 40 Google Finance 53-54 Google Goggles 105-106 Google Places 112-113 Gowalla 15 GPS 36-37 graphical user interface (GUI) 75 Grigsby, Jason 15 gyroscope 42 H Hewitt, Joe 17 Hinman, Rachel 27 :hover 78-83, 95 HTML5 24, 88-89, 95, 97, 116 HTTP requests 23 I image sprites 23 input masks 98-100 input types 90-91, 95-97 Instapaper 40-41 iPad 27, 75, 115 iPhone 10-11, 13, 16-17, 26, 36, 42, 62, 91-92, 110, 115 iOS 15, 19, 61-63, 73 iOS Human Interface Guidelines 69 J Java 15 JavaScript 23, 57, 110, 113 Jobs, Steve 10 K Kayak 38, 92, 94-95, 105 Koch, Peter-Paul 97, 109-110 L labels 87-89 location (when using mobile devices) 25-26 location detection 33, 36-39 London Underground 30-35 Lynch, Kevin 2 M MailChimp 88-89 magnetometer 33-34 Marcotte, Ethan 113 media queries 110, 113 meta viewport tag 109-110 Microsoft 15, 24, 69-70 MIT Touch Lab 69 Mobile in Higher Ed 51 Mobile Web Design and Development 86 Motorola 9 N N900 110-111 Nair, Rahul 36 native mobile applications 14-16 natural user interface (NUI) 75-76 navigation 52-59, 62-64 Nearest Tube 33-35 Near Field Communications (NFC) 44, 105-106 Netflix 115-116 Nexus One 110 Nokia 27, 67, 69 O Objective C 15 Olsen, Dave 50 “one eyeball and one thumb” 25-26, 64, 68, 86 OperaMini 13 OS X 73 P Pandora 9 PayPal 9 PC 8 performance 22-24 Pilgrim, Mark 96 pixel density 110-111 Playstation 115 Q Quora 71, 104 R radio frequency ID (RFID) 44, 105-106 RAZR 9 Read It Later 26-29 Research in Motion (RIM) 13, 16 responsive web design 112-117 S Samsung 15 Schmidt, Eric 2 screen size 18-22 select menus 91-92 Silverlight 16 Sketch a Search 43 smart defaults 36, 94 SMS 9, 13, 14 snorkeling 27-28 snow globe 41-42 Southwest Airlines 19-21 spinner control 92, 94 Storm 13 T T9 10 Tapworthy 50 time 26-28 touch 42-43 touch gestures 73-76 Tube see London Underground Twitter 16, 28, 63-64, 77, 79-80, 87-88, 105 U Ubuntu 69 V Verizon 13 Villamor, Craig 73 W Wacom Bamboo 73 WebOS 19, 73 WebWorks 16 WiFi 36-37 Willis, Dan 73 Windows Phone 7 15, 59 Windows Phone 7 Guidelines 69-70, 73 X xkcd 50-51 Yahoo!


Designing Search: UX Strategies for Ecommerce Success by Greg Nudelman, Pabini Gabriel-Petit

access to a mobile phone, Albert Einstein, AltaVista, augmented reality, barriers to entry, Benchmark Capital, business intelligence, call centre, cognitive load, crowdsourcing, folksonomy, information retrieval, Internet of things, Neal Stephenson, Palm Treo, performance metric, QR code, recommendation engine, RFID, search costs, search engine result page, semantic web, Silicon Valley, social graph, social web, speech recognition, text mining, the long tail, the map is not the territory, The Wisdom of Crowds, web application, zero-sum game, Zipcar

The key is the added meaning the computer provides, based on its understanding and interpretation of the content of an image, combined with other device inputs such as camera, GPS location, RFID reader, and compass direction. Imagine, for example, taking a picture of a CD (or simply picking up a CD and bringing it near to your mobile device to read the RFID tag) to instantly share it with your friends to learn what they think about the music; using the same RFID or picture data to get more information about the artist on the Web—pictures, videos of recent concerts, and a biography; finding out where you can download the songs on this CD at the best price online, or using GPS to find coupons to purchase a physical CD from a local merchant.

Both of these examples demonstrate that we are moving ever faster toward a world populated by smart objects, which Bruce Sterling dubbed spimes—a word made up by combining space and time. We can track spimes’ history of use and interact with them through a mesh of real and virtual worlds created by pervasive RFID and GPS tracking. Mobile picture search is certainly emerging as the input device of choice for connecting the real and the virtual worlds to create the Internet of Things (see sidebar). Internet of Things Internet of Things, also known as Internet of Objects, refers to a self-configuring wireless network connecting regular everyday objects to one another.

According to a recent Design4Mobile 2010 report from mobile form guru Luke Wroblewski, users of the Yelp Monocle feature tend to use Yelp 40% more than people not using Monocle. Although Monocle is still somewhat limited because of the tiny iPhone screen, you can’t help but get excited by the enormous potential of near-field computing. With the augmented reality industry working on adding facial recognition and RFID tagging, you will soon be able to obtain near-instant information about people, landmarks, objects, and just about anything else of interest. However, to fully exploit augmented reality, you might need a screen that is slightly larger than that of a typical smart phone. Note—It is hard to see all the richness of the real world additionally augmented with enormous amounts of information already available, all on a tiny screen that severely limits your filtering options.


pages: 362 words: 86,195

Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet by Joseph Menn

Brian Krebs, dumpster diving, fault tolerance, Firefox, John Markoff, Menlo Park, offshore financial centre, pirate software, plutocrats, popular electronics, profit motive, RFID, Silicon Valley, zero day

Those credentials gave Barrett access to the entire network, right down to the desktop of the chief executive. But Barrett wasn’t through. The company was an early adopter of RFID (radio-frequency identification) badges for employees. The badges included photos and coded authentication that the staff swiped through automated card readers at office entrances. Barrett bought an RFID reader and went to a TGI Friday’s favored as an after-work hangout, where he surreptitiously swiped employees’ badges. Then he bought blank RFID cards, used a picture of himself, and made his own corporate ID. After Barrett’s full report to the customer, one of the target company’s senior technology executives was so impressed that he visited Barrett at his parents’ house, just to see what environment could have produced him.

Blue Security, Inc. and denial-of-service attacks and e-Gold and in Florida founding of Green, Brian and Lyon, Barrett and non-gambling clients of online gambling, federal crackdown on and Proliflik and Rennick, Darren and Richardson, Mickey and Russian mob and Sacco, Ron and sale of SCO Group and UltraDNS Corp. and Proliflik “Proof of concept,” Protx Ltd. Proud, Mat PureGig Putin, Vladimir Pyramid schemes QuickTime Qwest Radio-frequency identification (RFID) Ramzinskiy, Pavel RapidSatellite.com RBN. See Russian Business Network Real Host Red Hacker Alliance Red Hunter Registry of Known Spam Operations (ROKSO) Rennick, Darren FBI and online gambling, federal crackdown on and Prolexic and Reshef, Eran RFID. See Radio-frequency identification Richardson, Mickey background of BetCRIS and online gambling, federal crackdown on and Prolexic and Robbins, Andy Robots (bots) Rock Phish Rodery, Terry Rohozinski, Rafal ROKSO.


pages: 889 words: 433,897

The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein

affirmative action, Apple II, benefit corporation, call centre, disinformation, don't be evil, Firefox, game design, Hacker Ethic, hiring and firing, information retrieval, information security, John Markoff, John Perry Barlow, late fees, license plate recognition, Mitch Kapor, MITM: man-in-the-middle, Oklahoma City bombing, optical character recognition, OSI model, packet switching, pirate software, place-making, profit motive, QWERTY keyboard, RFID, Robert Hanssen: Double agent, rolodex, Ronald Reagan, satellite internet, Silicon Valley, Skype, spectrum auction, statistical model, Steve Jobs, Steve Wozniak, Steven Levy, Telecommunications Act of 1996, telemarketer, undersea cable, UUNET, Y2K

Again, I take absolutely no responsibility for extra cellular charges you may incur or for any trouble you may get into with your cellular provider if and when you try all of this. That said, have fun and I hope you learned something! RFID: Radio Freak-Me-Out Identification (Spring, 2007) By Kn1ghtl0rd RFID has become something of a hot topic in the hacking world. There have been multiple presentations on security and privacy of RFID and also the technology behind it. This article is designed to be a what-if type scenario on what RFID is potentially capable of and where the technology is heading. RFID stands for Radio Frequency Identification, which obviously means identifying objects using radio frequency. Current implementations include asset management, inventory control, inventory tracking, access control, and entity identification.

The first three are usually implemented in a business environment to track inventory from one location to another or to monitor asset activity to isolate theft situations and problem areas. These implementations of RFID are very efficient and perform a valuable task for a business. The fourth example is not so good. RFID is being changed into a new type of ID for people and animals to be used instead of a hard-copy form of identification. This may seem convenient for people and they don’t see why this is bad. There are 749 94192c18.qxd 6/4/08 3:52 AM Page 750 750 Chapter 18 many possibilities for this technology to turn our world upside down and allow for Big Brother to truly manifest itself. Currently a human being can receive an implanted RFID chip that stores an identification number that associates them with information in a database.

Not only can the government observe this information but so can anyone else who can figure out how to get the data off the tags. Since our country is basically run by huge retail outlets it is not too far of a stretch to see product marketing analysis based on human purchase activity that is all based on RFID technology. Picture walking into Wal-Mart and having the racks scan your RFID tags and create some kind of notice to you to point on items that you prefer based on past purchase history. You regularly buy black cotton t-shirts in size large so the rack will recognize this data and highlight the rack with the black cotton t-shirts with little lights attached to all the hangers that flash as you approach.


pages: 523 words: 61,179

Human + Machine: Reimagining Work in the Age of AI by Paul R. Daugherty, H. James Wilson

3D printing, AI winter, algorithmic management, algorithmic trading, AlphaGo, Amazon Mechanical Turk, Amazon Robotics, augmented reality, autonomous vehicles, blockchain, business process, call centre, carbon footprint, circular economy, cloud computing, computer vision, correlation does not imply causation, crowdsourcing, data science, deep learning, DeepMind, digital twin, disintermediation, Douglas Hofstadter, driverless car, en.wikipedia.org, Erik Brynjolfsson, fail fast, friendly AI, fulfillment center, future of work, Geoffrey Hinton, Hans Moravec, industrial robot, Internet of things, inventory management, iterative process, Jeff Bezos, job automation, job satisfaction, knowledge worker, Lyft, machine translation, Marc Benioff, natural language processing, Neal Stephenson, personalized medicine, precision agriculture, Ray Kurzweil, recommendation engine, RFID, ride hailing / ride sharing, risk tolerance, robotic process automation, Rodney Brooks, Salesforce, Second Machine Age, self-driving car, sensor fusion, sentiment analysis, Shoshana Zuboff, Silicon Valley, Snow Crash, software as a service, speech recognition, tacit knowledge, telepresence, telepresence robot, text mining, the scientific method, uber lyft, warehouse automation, warehouse robotics

Thanks to such increased efficiencies, the company has been able to offer same-day shipping for customers.a L’Oreal uses radio-frequency identification (RFID) technology and machine learning to help prevent forklift accidents in the company’s warehouse in Italy. The tracking system warns forklift operators and pedestrians about other nearby vehicles, cutting down on collisions.b a. Nick Wingfield, “As Amazon Pushes Forward with Robots, Workers Find New Roles,” New York Times, September 10, 2017, https://www.nytimes.com/2017/09/10/technology/amazon-robots-workers.html. b. Claire Swedberg, “L’Oréal Italia Prevents Warehouse Collisions via RTLS,” RFID Journal, August 18, 2014, http://www.rfidjournal.com/articles/view?

While Coca-Cola has been piloting the use of AI to automate its product-ordering process, other companies are focusing more on improving the customer experience by augmenting the work of floor sales staff. Take, for example, the global fashion company Ralph Lauren, which has partnered with Oak Labs, a San Francisco–based startup, to develop an integrated commerce experience for shoppers.3 A key part of the technology is the connected fitting room, equipped with a smart mirror that relies on RFID to automatically recognize the items that a shopper brings into the room. The mirror, which can translate six languages, can then display details about an item. It can also change the lighting (bright natural light, sunset, club setting, and so on) so shoppers can see how they look in different settings.

See ethical, moral, legal issues Mori, Masahiro, 131 Murphy, Mike, 23 Nadella, Satya, 203 Nao, 146 NASA, 200–201 natural-language agents, 55–56, 59, 65, 145–146 natural-language processing (NLP), 64 Nettsträter, Andreas, 26 network analysis, 45–46 neural networks, 34 deep, recurrent, and feedforward, 63 definition of, 62 history of, 40–41 neural opportunism, 205–206 Nike, 74–75 Nina, 145–146 Nissan, 113–114 normalizing, responsible, 12, 189–191 Nuance Communications, 145–146 Numerate, 81 Oak Labs, 87–88 observation, 69–72, 157–158 on-demand work environment, 111 operations, reimagining, 29–30 optimization, 63, 77 Orcutt, Mike, 78, 79 outsourcing, 120–121 PAIR (People + AI Research) initiative, 179 Paley, Sean, 199 Papert, Seymour, 40–41 PCSK9 drugs, 74 Penn Medicine, 188 Percolata, 88–89 performance, 3–4, 7, 11–12 personality trainers, 118–119 personalization brands and, 96–97 of cars, 147–149 definition of, 66 marketing and sales, 86, 89–90, 91 product/service design and, 76 theory and practice of, 77–80 ultra-customization, 68 Pew Center, 167 pharmaceutical industry, 81 Philips, 87, 141–143 Pogo, 196 Popper, Nathaniel, 49 Pratt, Gill, 166 Precision Agriculture Service, 35 predictive systems, 63 Predix, 27, 29–30, 75, 183–184 Preferred Networks, 21–22 pricing decisions, 193–194 privacy issues, 90, 164–165 processes, 4 adaptive, 5–6, 16, 108–109 automated, 5, 19 determining which to change, 52–54 discovering and describing, 155–158 experimentation with, 14, 160–165 guardrails in, 168–169 mindset for reimagining, 155–160 reimagining, 50, 105–112, 151–152, 203–205 reimagining, leadership in, 153–181 reimagining around people, 58–59 rewriting, 9 robotic automation of, 50–52 standardized, 5 Procter & Gamble, 34 procurement, 53–54 product design, 74–76 generative design in, 135–137, 139, 141 product development, 29 production, 19–39 in agriculture, 34–37 third wave, 38–39 productivity, 3–4, 135–152 job satisfaction and, 46–47 rehumanizing time and, 188–189 products, intelligent, 66 product support, 87 “quantamental” funds, 122 Quid, 70–72 Quixote, 130 Raccuglia, Paul, 71 radio-frequency identification (RFID), 31, 87–88 Ralph Lauren, 87–88, 100 rating systems, 172 R&D. See research and development (R&D) reciprocal apprenticing, 12, 201–202 recommendation systems, 65, 92, 110–111 recurrent neural networks (RNN), 63 regulations, 213 reimagining, relentless, 12, 203–205 reinforcement learning, 62 repetitive/routine work, 26–27, 29–30, 46–47 process reimagination and, 52–54 in R&D, 69–72 reimagining around people, 58–59 research and development (R&D), 10, 67–83 customization and delivery in, 77–80 ethical/legal issues in, 78–79 hypotheses in, 72–74 MELDS in, 83 observation in, 69–72 risk management and, 80–81 scientific method in, 69–77 testing in, 74–77 resource management, 74–75 retail pricing, 193–194 Rethink Robotics, 22, 24 Reverse Engineering and Forward Simulation (REFS), 72–74 Revionics, 194 Riedl, Mark O., 130 right to explanation, 124 Rio Tinto, 7–8, 109–110 risk management, 80–81 robotic arms, 21–23 learning by, 24–26 robotic process automation (RPA), 50–52 Robotics, Three Laws of (Asimov), 128–129 Robotiq, 23 Roomba, 24 Rosenblatt, Frank, 62 Round Chair, 136–137 routine work.


pages: 271 words: 62,538

The Best Interface Is No Interface: The Simple Path to Brilliant Technology (Voices That Matter) by Golden Krishna

Airbnb, Bear Stearns, computer vision, crossover SUV, data science, en.wikipedia.org, fear of failure, impulse control, Inbox Zero, Internet Archive, Internet of things, Jeff Bezos, Jony Ive, Kickstarter, lock screen, Mark Zuckerberg, microdosing, new economy, Oculus Rift, off-the-grid, Paradox of Choice, pattern recognition, QR code, RFID, self-driving car, Silicon Valley, skeuomorphism, Skype, Snapchat, Steve Jobs, tech worker, technoutopianism, TED Talk, Tim Cook: Apple, Y Combinator, Y2K

v=2zoeiNBdPdo 47 “MasterCard International, which first tested the PayPass in 2003” Sewell Chan, “A Test at 25 Stations: Subway Riding Without the Swiping,” The New York Times, January 31, 2006. http://www.nytimes.com/2006/01/31/nyregion/31fare.html 48 Marc Perton, “Chase to Issue RFID Credit Cards,” Engadget, May 20, 2005. http://www.engadget.com/2005/05/20/chase-to-issue-rfid-credit-cards/ 49 Marc Perton, “Amex to Include RFID in All New Blue Cards,” Engadget, June 7, 2005. http://www.engadget.com/2005/06/07/amex-to-include-rfid-in-all-new-blue-cards/ 50 Sarah Perez, “Visa to Launch Contactless Mobile Payments for iPhone,” ReadWrite, May 6, 2010. http://readwrite.com/2010/05/06/visa_to_launch_contactless_mobile_payments_for_iphone 51 “Launching Google Wallet on Sprint and Working with Visa, American Express, and Discover,” Official Google Blog, September 19, 2011. http://googleblog.blogspot.com/2011/09/launching-google-wallet-on-sprint-and.html 52 “Albertsons LLC, which operates 217 stores in seven Western and Southern states, will eliminate all self-checkout lanes in the 100 stores that have them and will replace them with standard or express lanes, a spokeswoman said.


Big Data at Work: Dispelling the Myths, Uncovering the Opportunities by Thomas H. Davenport

Automated Insights, autonomous vehicles, bioinformatics, business intelligence, business process, call centre, chief data officer, cloud computing, commoditize, data acquisition, data science, disruptive innovation, Edward Snowden, Erik Brynjolfsson, intermodal, Internet of things, Jeff Bezos, knowledge worker, lifelogging, Mark Zuckerberg, move fast and break things, Narrative Science, natural language processing, Netflix Prize, New Journalism, recommendation engine, RFID, self-driving car, sentiment analysis, Silicon Valley, smart grid, smart meter, social graph, sorting algorithm, statistical model, Tesla Model S, text mining, Thomas Davenport, three-martini lunch

While this would undoubtedly generate a lot of interesting data, it would probably be very unpopular with the sales force. Chapter_02.indd 51 03/12/13 11:42 AM 52 big data @ work Supply Chain Supply chain processes are among the most likely to be transformed by big data. Radio-frequency identification (RFID) devices—long discussed as a means of monitoring supply chain movements—are now actually becoming available at a reasonable cost. GPS tracking on trucks and trains means that arrival times for shipments can be more precisely predicted. Transportation companies, including UPS, FedEx, and Schneider National, have already installed tracking devices and are increasingly using them to monitor and optimize their networks.

In chapter 8, I describe how UPS, for example, has recently used data from its package cars (brown trucks) to redesign its driving route structure for only the third time in over one hundred years. Other types of sensors are likely to lead to a flood of additional data and opportunities to analyze it. RFID and telematics sensors primarily track location, but so-called ILC (­identification, ­location, ­condition) sensors can monitor the condition of goods in the supply chain as well, on such variables as light, temperature, tilt angle, g-forces, and whether a package has been opened. They can transfer data in real time via cellular networks.

One of most aspects of big data is the way it has captured the attention of senior managers like no other technology trend before it. Suddenly, C-level executives are funding headcount for big data projects and using the phrase “data as an asset” in board meetings. New applications for big data are often industry-specific. Think telematics data for auto insurers, vital signs in health care, or RFID tags in manufacturing. All of this data is difficult to capture and ingest, let alone use in a meaningful way. A recent survey found that the highest percentage of respondents—41 percent—reported not having a strategy for big data. The next-largest group reported “Operations/Processing” as being the area of focus for big data projects.5 Clearly, most companies still haven’t transcended their initial ­projects to articulate the full business potential of big data.


pages: 179 words: 42,081

DeFi and the Future of Finance by Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro, Vitalik Buterin, Fred Ehrsam

activist fund / activist shareholder / activist investor, bank run, barriers to entry, bitcoin, blockchain, collateralized debt obligation, crowdsourcing, cryptocurrency, David Graeber, Ethereum, ethereum blockchain, fault tolerance, fiat currency, fixed income, Future Shock, initial coin offering, Jane Street, margin call, money: store of value / unit of account / medium of exchange, Network effects, non-fungible token, passive income, peer-to-peer, prediction markets, rent-seeking, RFID, risk tolerance, Robinhood: mobile stock trading app, Satoshi Nakamoto, seigniorage, smart contracts, transaction costs, Vitalik Buterin, yield curve, zero-coupon bond

See also specific ERCs Exchange-traded funds (ETFs), 125 Externally owned accounts (EOAs), 30, 48–49, 163 F Facebook, 3 Fees, 49–50 Fiat-collateralized stablecoins, 25 Fiat currency, 1, 14, 163 Fidelity Digital Assets, 145 51% attack, 19 Finance, history of, 8–10 Fintech, 10–12, 163 Fixed-rate borrowing, 107f Flash attacks, 133 Flash loans, 56–57, 163 on dYdX, 112 risks associated with, 133 supported by Aave, 90–91, 91f Flash swaps, 100, 101f, 163 Foreign currency (forex) market, 10–11 Forfeiture, 30–31 Fork, 59–60, 163–164 Fungible tokens, 32–37 equity tokens, 33–34 ERC on, 23 governance tokens, 35–37 utility tokens, 34–35 value of, 175n2 Futures, 113–117, 118f G Gas, 164 Gas fees, 21–22, 30–31 Geoblock, 164 Global settlements, 76 Gold, as tangible asset, 13–14 Google, 3, 20 Governance risk, 135–136 Governance tokens, 28, 35–37, 70 on Compound, 86–87 defined, 164 on MakerDAO, 74 regulations on, 148 risk associated with, 136 on Uniswap, 102–103 H Haber, Stuart, 12 Halting problems, 22, 164 Hash, 164 Hexadecimals, 164 Horizontal scaling, 140, 164 Hussein, Saddam, 14 I Iceland, 147IDO (initial DeFi offering), 62, 165 Impermanent loss, 52–54, 98, 143, 165 Incentives, 46–50, 165 Inefficiency: in centralized financial systems, 4 DeFi solutions for, 58–60 Inequality: and problems with centralized financial systems, 6 and smart contracts, 16–17 Infinite loop of code, 22 Inflation, 14 Inflationary rewards, 41–42, 60 Infrastructure, 18–28 blockchains, 18–20 cryptocurrencies, 20–21 dApps, 27–28 oracles, 23–24 replaced by smart contracts, 16–17 smart contract platforms, 21–23 stablecoins, 24–27 Initial DeFi offering (IDO), 62, 165 Interdependence, of platforms, 54–55 Interest rates, 80 and inefficiency, 4 speculation on, 109 Internal Revenue Service, 149 Internet banking, 10 Invariants, 95–98, 165–166 Iraq, 14–15 Iraqi Swiss dinars, 14–15, 14f iTokens, 120 J Jane Street, 144 Jump, 144 K Keepers, 49, 59, 79, 166 Kinks, 81 Know your customer (KYC), 166 L Lack of interoperability: in centralized financial systems, 5 DeFi solutions for, 65–68 Layer 2, 140–141, 166 Lendf.Me lending protocol, 134 Lending, 69–95 Lending rates, 83f Limited access: in centralized financial systems, 3–4 DeFi solutions for, 60–62 Linear bonding curves, 43f Liquidation, 48, 55–56, 71, 111 Liquidation penalties, 75 Liquidity: composable, 52 and flash loans, 112 minting to create, 71 and Uniswap, 96–98 Liquidity pool, 89 Liquidity provider (LP), 97–98, 142–143, 166, 179n13 Loans: business, 6 collateralized, 54–56, 70–72 flash (see Flash loans) stable rate, 92 uncollateralized, 56–57 Logistic bonding curves, 45f M Mainnet, 166 Maintenance margins, 115–116 MakerDAO, 69–77, 73f–74f, 77t–78t Compound supplied by, 80 governance risk for, 135 governance token of, 36, 37 stablecoins created by, 26 Margins, 114–115 Margin class, 71 Margin trading, 110 Mastercard, 10 Maximum slippage, 100, 111 Mean-reverting pairs, 54 Memory pool, 31 Mempool, 31 Merchants, in wBTC ecosystem, 128 MetaMask, 145 Miners, 30–31, 166–167 Miner extractable value (MEV), 31, 167 Mint, 41–42, 71, 167 MKR tokens, 74–75 Mobil Speedpass, 10 Money: history of, 1–2 introduction of, 1 moving between institutions, 5 Mooniswap, 100 Mt Gox attack, 145 Multitoken standards, 38–39 N Nakamoto, Satoshi, 12 Networked liquidity, 68, 167 Network power, 19, 20 Network tokens, 120 New York State laws, 148 New York Stock Exchange (NYSE), 11 New York Times, 145 NFTs (nonfungible tokens), 23, 37–39, 175n2 Nodes, 167 Nonce, 167 Noncollateralized currency, 1 Noncollateralized stablecoins, 26–27 Nonfungible tokens (NFTs), 23, 37–39, 175n2 O Off-chain assets, 128 Off-chain data, 137 Off-chain order books, 144 On-chain order books, 143–144 Opacity: in centralized financial systems, 5 DeFi solutions for, 62–64 Optimistic rollup, 141, 168 Oracles, 23–24, 168 Oracle problem, 23–24 Oracle risk, 137–138 Oraclize, 137 Order-book DEXs, 143–144 Order book matching, 50–51, 168 OwnerOf(id) method, 37 P Pancakeswap, 136 Partial custody, 145 Path independence, 54 Payment networks, 21 PayPal, 12 Peckshield, 131 Permissionlessness, of dApps, 27 Perpetual futures contracts, 114–117, 118f, 168 Plaid, 5 Polkadot, 69, 139 PoS, see Proof of stake PoW, see Proof of work Pricing, of supply, 42–46 Primitive financial actions, 29–57 collateralized loans, 54–56 custody, 39–40 flash loans, 56–57 fungible tokens, 32–37 incentives, 46–50 nonfungible tokens, 37–39 supply adjustments, 40–46 swaps, 50–54 transactions, 29–31 Profit from corruption, 137 Proof of stake (PoS): in blockchains, 19–20 defined, 168 and energy efficiency, 146 on Polkadot, 69 scaling risk of, 139 Proof of work (PoW): in Bitcoin, 12 in blockchains, 19 defined, 169 and environmental risk, 146 scaling risk of, 138 Protocol debt, 75 Provable, 137 Q Quantstamp, 131 R Radio-frequency identification (RFID) payments, 10 Reentrancy bug, 134 Registrations, 178n6 Regulations, 147–149 Regulatory risk, 147–149 Reserve factors, 82 Reward funds, 46 Rewarding user behavior, 41–42 RFID (radio-frequency identification) payments, 10 Risk(s), 130–149 counterparty risk, 130 custodial risk, 144–146 DEX risk, 142–144 environmental risk, 146–147 in flash loans, 57 governance risk, 135–136 oracle risk, 137–138 regulatory risk, 147–149 scaling risk, 138–141 smart contract risk, 57, 131–135 Robin Hood Group, 134 Router contracts, 99, 169 S Savings rates, 83f Scaling risk, 138–141, 169 Schelling-point oracle, 137, 169 Schmidt, Eric, 20 Securities and Exchange Commission (SEC), 148 Self-custody, 144–145 Selling curves, 44, 45f, 46 Set Protocol, 124–127, 127t Set tokens, 125–127 Sharding, 140, 152, 169 Sigmoid bonding curves, 45f Slashing, 47–48, 140, 169 Slashing condition, 47, 170 Slock.it, 133 Slopes, 81 Smart contracts: and atomicity of transactions, 30 defined, 170 and Ethereum, 16 and transparency, 63–64 Smart contract level check, 180n18 Smart contract platforms, 21–23 Ethereum as, 16 as isolated from outside events, 23–24 standards for, 23 Smart contract risk, 57, 131–135 SNX tokens, 26, 120–122 Social Trading, 126 Software, risks of, 131 Solana, 140 Specie, 1, 170 Stablecoins, 24–27 defined, 170 on MakerDAO, 70 as synthetic tokens, 56 trading pairs of, 98–99 Stable rate loans, 92 Staked incentives, 46, 47, 170 Staking, 139, 170 Staking penalties, 47–48 Staking rewards, 47 Standards, 23, 37–39 Stanford Federal Credit Union, 10 Stellar, 69 sTokens, 120 Stornetta, Scott, 12 $TSD tokens, 136 Superlinear bonding curves, 44f Supply adjustments, 40–46 Supply interest rates, 81–82 Sushiswap, 103 Swaps, 50–54, 170–171 flash, 100, 101f, 163 Symmetric key cryptography, 171 Synthetic settlements, 106–107 Synthetic tokens, 56 Synthetix, 120–123, 123t, 182n30 network token exchange of, 26 staking rewards used by, 47 Synths, 120–122 Szabo, Nick, 131 T Taxation, on cryptocurrency, 148–149 Telephone banking, 10 Testnet, 171 Tether, 25 Third-party custody, 145 Tokenization, 66–68, 124, Set Protocol, 124–127, 127t wrapped bitcoin, 128–129 Trading pairs, 98–99 Trail of Bits, 131 Transactions, 29–31, 138–141 Transparency: defined, 171 lack of, in centralized financial systems, 5 and smart contracts, 63–64 True Seigniorage Dollar, 136 Two-token models, 70 U UMA, 137 Uncollateralized loans, 56–57 Underserved populations, 61 Uniswap, 62, 95–104, 97f, 104t–105t, 142, 143 Uniswap tokens, 89 Uniswap v2, 95, 143 Uniswap v3, 95, 103, 143 U.S. dollar, value of, 13 UNI tokens, 98, 102–103 USD, 26, 35 USDC, 25, 35, 77 Users, in wBTC ecosystem, 128–129 USTD, 25 Utility tokens, 34–35, 120, 171 Utilization, 80, 81–82 V Validators, in PoS, 19–20 Value proposition, of Bitcoin, 13 Vampirism, 60, 171 Vaults, 70, 171 Vertical scaling, 139–140, 171–172 Virtu, 144 Visa, 5 W Wallets, 145 Western Union transfer, 9f Wrapped bitcoin (wBTC), 128–129 Y Yearn.finance, 134–135 Yield farming, 42, 61, 151, 172 Yield Protocol, 105–109, 109t–110t yTokens, 105–109 Z Zelle, 12 Zilliqa, 139 WILEY END USER LICENSE AGREEMENT Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.

Figure 2.1 Western Union transfer from 1873 Source: Western Union Holdings, Inc. The last 75 years has seen many firsts in the financial world: credit card in 1950 (Diners Club); automated teller machine (ATM) in 1967 (Barclays Bank); telephone banking in 1983 (Bank of Scotland); Internet banking in 1994 (Stanford Federal Credit Union); radio-frequency identification (RFID) payments in 1997 (Mobil Speedpass); chip-and-pin credit cards in 2005 (Mastercard); and Apple Pay with a mobile device in 2014 (Apple). Importantly, all these innovations were built on the backbone of centralized finance. While there have been some technological advances, the structure of today’s banking system has not changed much in the past 150 years.


pages: 382 words: 120,064

Bank 3.0: Why Banking Is No Longer Somewhere You Go but Something You Do by Brett King

3D printing, Abraham Maslow, additive manufacturing, Airbus A320, Albert Einstein, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apollo 11, Apollo 13, Apollo Guidance Computer, asset-backed security, augmented reality, barriers to entry, behavioural economics, bitcoin, bounce rate, business intelligence, business process, business process outsourcing, call centre, capital controls, citizen journalism, Clayton Christensen, cloud computing, credit crunch, crowdsourcing, disintermediation, en.wikipedia.org, fixed income, George Gilder, Google Glasses, high net worth, I think there is a world market for maybe five computers, Infrastructure as a Service, invention of the printing press, Jeff Bezos, jimmy wales, Kickstarter, London Interbank Offered Rate, low interest rates, M-Pesa, Mark Zuckerberg, mass affluent, Metcalfe’s law, microcredit, mobile money, more computing power than Apollo, Northern Rock, Occupy movement, operational security, optical character recognition, peer-to-peer, performance metric, Pingit, platform as a service, QR code, QWERTY keyboard, Ray Kurzweil, recommendation engine, RFID, risk tolerance, Robert Metcalfe, self-driving car, Skype, speech recognition, stem cell, telepresence, the long tail, Tim Cook: Apple, transaction costs, underbanked, US Airways Flight 1549, web application, world market for maybe five computers

In addition to media walls, however, we’re seeing other technologies come into play that assist in the ability to engage customers more seamlessly. YES Bank in India and HSBC Premier in Hong Kong both trialled the use of RFID technology to recognise a customer as they walked into their branch space, accelerating their slot in the “queue” system. RBS allows customers to book a spot in the queue via their smartphone banking app. Incorporating RFID recognition or geolocation mobile triggers into the store experience allows the customer to be recognised, and the store environment to start to be personalised to the needs, behaviours and product footprint of the customer.

But they may not have to lose the branding opportunities and client connections that their current ATM network provides. It won’t be long before self-service machines, digital signage and media walls combine into one platform. For the Beijing Olympics, Coca-Cola deployed an interactive touch-screen vending machine from Samsung that they called uVend. And future ATMs might work in a rather similar way. RFID or facial recognition built into the ATM will recognise us and display our bank’s brand as we approach. If not, it cycles through the available brands or paid-for-advertising from the banks that use the network. When we insert our cards or tap our contactless phones to sign in, the ATM becomes a HSBC, Barclays or BofA ATM in schema, branding and interface—the branding proudly displayed, and the touch-screen interface modelled to our bank and/or our most frequent ATM activities.

Applications of smart glasses could be anything from an equivalent of our current laptop display while we are on the move, to simply a Bluetooth plug in our app phone showing us in real time a virtual HUD (head-up display) with key information from our device (Caller Id, local weather, e-alerts or appointments, etc.). Incorporating image and facial recognition software, along with RFID technology, smart glasses could remind us of the name and details of a key business contact, an old school friend who passes us by while we’re chilling out at the mall or the current price on Amazon of that book we’re looking at through a retailer’s window. The possibilities are far-reaching, and just a little freaky.


pages: 361 words: 97,787

The Curse of Cash by Kenneth S Rogoff

Alan Greenspan, Andrei Shleifer, Asian financial crisis, bank run, Ben Bernanke: helicopter money, Berlin Wall, bitcoin, blockchain, Boris Johnson, Bretton Woods, business cycle, capital controls, Carmen Reinhart, cashless society, central bank independence, cryptocurrency, debt deflation, disruptive innovation, distributed ledger, Dr. Strangelove, Edward Snowden, Ethereum, ethereum blockchain, eurozone crisis, Fall of the Berlin Wall, fiat currency, financial exclusion, financial intermediation, financial repression, forward guidance, frictionless, full employment, George Akerlof, German hyperinflation, government statistician, illegal immigration, inflation targeting, informal economy, interest rate swap, Isaac Newton, Johann Wolfgang von Goethe, Johannes Kepler, Kenneth Rogoff, labor-force participation, large denomination, liquidity trap, low interest rates, Modern Monetary Theory, Money creation, money market fund, money: store of value / unit of account / medium of exchange, moral hazard, moveable type in China, New Economic Geography, offshore financial centre, oil shock, open economy, payday loans, price stability, purchasing power parity, quantitative easing, RAND corporation, RFID, savings glut, secular stagnation, seigniorage, The Great Moderation, the payments system, The Rise and Fall of American Growth, transaction costs, unbanked and underbanked, unconventional monetary instruments, underbanked, unorthodox policies, Y2K, yield curve

For the moment, Goodfriend’s idea is not quite feasible, or at least economically viable, but the time for it might not be far off. Indeed, periodic bouts of consternation have roiled the underground economy on rumors that the government is putting active transmitting radio-frequency identification (RFID) chips into currency, to be able to detect large bags of cash in airports and elsewhere. One can find videos online that show how to put currency in a microwave to fry any embedded chips. The implication is that if an RFID chip is embedded, the microwave might burn a hole in the note, but that is better than getting caught with a big bag of illicit cash. In fact, as of yet there are no embedded chips in US currency, though paper-thin chips are being developed that might make it possible someday, if the government chose to do so.15 Embedded chips (or magnetic strips) may prove unnecessary in any event, given the development of increasingly low-cost cash processors that can scan serial numbers at extremely high speeds.

See Fisher (1933), Champ (2008), and Gatch (2009). 13. See Svensson and Westermark (2015). 14. See Goodfriend (2000). Buiter (2003) and Buiter and Panigirtzoglou (2003) were also early advocates of the Gesell solution. 15. “New $100 Bill and RFID Microwave Test,” available at https://www.youtube.com/watch?v=Kn5aqb-mN3Q. See also “Are You Ready for RFID Chips Built into Your Money and Documents,” Kurzweil Accelerating Intelligence, May 7, 2013. 16. If a retail store has a camera monitoring its cash registers and time stamps bills with serial numbers attached, authorities could potentially connect bills and people. 17.

See also seigniorage profits from monopoly on paper currency, 217 proxy notes, 22 public health risks, 78–79 Putin, Vladimir (president, Russia), 72 quantitative easing, 123–24, 132–33; empirics of, 136, 140–42; explained, 137–40; financial crisis of 2008, in response to, 135–36; inflation, lack of impact on, 136–37; in a liquidity trap, 246n26; as a policy instrument, limits of, 144–45; risks associated with, 178; zero bound sand trap, escaping from, 142–44 “Quantitative Easing Explained” (Malekan), 140 quantity theory of money, 26 radio-frequency identification (RFID) chips, 166 RAND Corporation, 49, 69 real-time clearing, 67, 92, 94–95, 102–3, 115 Reifschneider, David L., 133, 244n11, 245n17 Reinhart, Carmen M., 122, 177, 243n3, 245n18, 255n10 Reinhart, Vincent, 243n3 reverse money laundering, 4, 80 Rey, Hélène, 207 Ricardian equivalence, 246n25 Robinson, James, 70 Rockoff, Hugh, 192 Rognlie, Matthew, 250n2 Rogoff, Kenneth S., 233n10, 243nn3–4, 245n14, 245n18, 252n2, 255nn9–10, 255n15 Rolnick, Arthur J., 234n13 Rösl, Gerhard, 236n23 Rubin, Robert, 2 Russell, David O., 71 (director, American Hustle) Russia, 44, 83–84, 191, 203 Sands, Peter, 253n5 Sargent, Thomas J., 19 Sbordone, Argia M., 248n5 Schneider, Friedrich, 62, 239n12, 239n16 Schwartz, Anna, 188 Secret Service: foreign holdings of currency, estimate of, 44–45; founding of to fight counterfeiting, 77 security concerns, 111–14 seigniorage, 80–81; cost of substituting interest-bearing debt for paper currency, 86–90; measures of, 81–85; political economy importance of, central bank independence and, 90–91, 106; revenue as a percentage of GDP, 2006–2015, 84; shrinkage of revenues if currency were phased out, 85–86, 202–4 Seitz, Franz, 45, 236n23 Serious Organised Crime Agency (SOCA), 200 sexual exploitation in the United States, 74 shadow policy interest rate, 244n5 Shi, Joanna Y.


pages: 263 words: 75,610

Delete: The Virtue of Forgetting in the Digital Age by Viktor Mayer-Schönberger

digital divide, en.wikipedia.org, Erik Brynjolfsson, Firefox, full text search, George Akerlof, information asymmetry, information retrieval, information security, information trail, Internet Archive, invention of movable type, invention of the printing press, John Markoff, Joi Ito, lifelogging, moveable type in China, Network effects, packet switching, Panopticon Jeremy Bentham, pattern recognition, power law, RFID, slashdot, Steve Jobs, Steven Levy, systematic bias, The Market for Lemons, The Structural Transformation of the Public Sphere, Vannevar Bush, Yochai Benkler

Potential application for expiration dates may even go beyond the confines of personal computers or online services, and include emergent technologies. For example, recently the European Union discussed the implications of RFID (radio-frequency identification) chips and similar networked sensing devices that add information to our digital memories. The Council of the European Union concluded to promote “the possibility of deactivating RFID chips or any other way which provides empowerment and user control.”16 Instead of the relatively stark “silencing of the chips” that the Council suggests, perhaps mandated expiration dates might offer a somewhat finer-grained approach.

Cambridge, MA: Harvard University Press. 2002. comScore Media Advisory. “Baidu Ranked Third Largest Worldwide Search Property by comScore in December 2007.” News release. Jan. 24, 2008. http://www.comscore.com/press/release.asp?press=2018. Curry, Michael R. “Location and Identity: A Brief History,” in RFID: Applications, Security, and Privacy, S. L. Garfinkel and B. Rosenberg, eds. 149–62. Saddle River, NJ: Addison-Wesley. 2005. ———. “Toward a Geography of a World without Maps: Lessons from Ptolemy and Postal Codes.” Annals of the Association of American Geographers 95 (2005): 680–91. Deering, Michael F.

.), 136 property, 150 Proust, Marcel, 117 Ptolemy, 33 public sphere, 41 purpose limitation principle, 136, 138, 159 Quagliano, Enrique, 195 radio, 44 rating system, 93 reading, 36, 37, 40, 41–42 recall, 22 “Reciprocal Transparency,” 105–8 Reformation, 38–39, 98 religion, 29–30, 37–39, 42 remembering benefits of digital, 93–95 constructive endeavor of human, 27–28, 106–7, 118 cost of, 26 curse of, 13 default of, 68 human, 27–28, 106–7, 114–17 role of, 16–23 shift to, 14 reputation, 106, 142 retrieval, 72–79 decontextualization of digital, 78 digital, 75–79 RFID (radio-frequency identification), 180–81 Ripoli Press, 37–38, 39 Rotenberg, Marc, 150 sample, 54, 56–57 Samuelson, Pamela, 142, 150 Schacter, Daniel, 20–21, 106, 155–56 Schmidt, Eric, 109 Schwartz, Paul, 143, 150 scribes, 36–37 script, 31–42 interpretation of, 34 search engine, 1, 4, 6, 123–25 search query, 6, 76, 175–78 self-censorship, 110–12 server farms, 70 Short Messaging (SMS), 126–27 Snyder, Stacy, 1–2, 4, 5, 102, 109–10, 197 Solove, Daniel, 8, 142 sousveillance, 165 Soviet Union, 103 Spock.com, 104 standardization, 58–60 Starbuck, William, 118 Starr, Paul, 41 storage.


pages: 484 words: 104,873

Rise of the Robots: Technology and the Threat of a Jobless Future by Martin Ford

3D printing, additive manufacturing, Affordable Care Act / Obamacare, AI winter, algorithmic management, algorithmic trading, Amazon Mechanical Turk, artificial general intelligence, assortative mating, autonomous vehicles, banking crisis, basic income, Baxter: Rethink Robotics, Bernie Madoff, Bill Joy: nanobots, bond market vigilante , business cycle, call centre, Capital in the Twenty-First Century by Thomas Piketty, carbon tax, Charles Babbage, Chris Urmson, Clayton Christensen, clean water, cloud computing, collateralized debt obligation, commoditize, computer age, creative destruction, data science, debt deflation, deep learning, deskilling, digital divide, disruptive innovation, diversified portfolio, driverless car, Erik Brynjolfsson, factory automation, financial innovation, Flash crash, Ford Model T, Fractional reserve banking, Freestyle chess, full employment, general purpose technology, Geoffrey Hinton, Goldman Sachs: Vampire Squid, Gunnar Myrdal, High speed trading, income inequality, indoor plumbing, industrial robot, informal economy, iterative process, Jaron Lanier, job automation, John Markoff, John Maynard Keynes: technological unemployment, John von Neumann, Kenneth Arrow, Khan Academy, Kiva Systems, knowledge worker, labor-force participation, large language model, liquidity trap, low interest rates, low skilled workers, low-wage service sector, Lyft, machine readable, machine translation, manufacturing employment, Marc Andreessen, McJob, moral hazard, Narrative Science, Network effects, new economy, Nicholas Carr, Norbert Wiener, obamacare, optical character recognition, passive income, Paul Samuelson, performance metric, Peter Thiel, plutocrats, post scarcity, precision agriculture, price mechanism, public intellectual, Ray Kurzweil, rent control, rent-seeking, reshoring, RFID, Richard Feynman, Robert Solow, Rodney Brooks, Salesforce, Sam Peltzman, secular stagnation, self-driving car, Silicon Valley, Silicon Valley billionaire, Silicon Valley startup, single-payer health, software is eating the world, sovereign wealth fund, speech recognition, Spread Networks laid a new fibre optics cable between New York and Chicago, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Steven Levy, Steven Pinker, strong AI, Stuxnet, technological singularity, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Coming Technological Singularity, The Future of Employment, the long tail, Thomas L Friedman, too big to fail, Tragedy of the Commons, Tyler Cowen, Tyler Cowen: Great Stagnation, uber lyft, union organizing, Vernor Vinge, very high income, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, women in the workforce

See personal consumption expenditure (PCE) Peltzman, Sam, 267 Peltzman effect, 267 Penn State, MOOCs and, 136 pensions, 222, 224 people analytics, 93 Perelman, Les, 130–131 per-employee valuations, technology sector and, 175 permanent income hypothesis, 210–211 personal consumption expenditure (PCE), 202n personal robots, 7 pharmacists, 172–173n pharmacy robotics, 153–155 Philippines, income inequality in, 46 Pierson, Paul, 57 Piketty, Thomas, 275 Pinker, Steven, 237 “Piquant” system, 99–100 plagiarism, MOOCs and, 136–137 Player Piano (Vonnegut), 32 PlayStation, 4 plutocracy, 219 plutonomy, 198 polarization, job-market, 50–51 politics advancing technology and, 57–58 financial elite’s influence over, 47–48, 59–60 guaranteed income concept and, 260–261, 278–279 post-scarcity economy, 247 Poterba, James, 222 poverty trap, 262 Prey (Crichton), 244 prices deflation and, 216–217 drug, 170–171 effect of automation on, 215–216 PrimeSense, 4 Princeton University, MOOCs and, 133 Principles of Economics (Frank & Bernanke), 37 Principles of Economics (Taylor & Weerapana), 37 productivity, 206–207 defined, 35n information technology and, 52 recessions and, 207–208 technological progress and, 33 wages and, xi, 33, 35–38, 38n product lifecycles, robots and, 11 professionals, erosion of employment for, xvi–xvi “Professionals Against Machine Scoring of Student Essays in High Stakes Assessment” (petition), 129, 130 progress, lack of broad-based, 64–65 proton beam facilities, 164 public universities, MOOCs and, 142 purchasing power distribution of, 197, 198 guaranteed income and, 265–266 jobs and, xvii “Quill” software, 84–86 Rabkin, Eric, 137 Race Against the Machine (Brynjolfsson & McAfee), 60 Radical Abundance (Drexler), 243, 246 radio-frequency identification (RFID), 154, 157 radiologists, artificial intelligence and, xv, 152 Rand, Ayn, 264 recessions investment and, 227 months for employment to recover, 45 productivity and, 207–208 stagnant income, rising costs, and, 217–218 See also Great Recession recursive improvement, Artificial General Intelligence and, 231–232 Redbox movie rental kiosks, 18–19 regulatory capture, 170 religious overtones of Singularity, 235 “Remaining Awake Through a Great Revolution” (King), 29–30 rent seeking, financialization and, 55–56 Republicans, income distribution preferred by, 47n reshoring, 8–12 resource depletion, technology and, xvii, 282–283 restocking, automated, 18–19 retail sector, 16–20, 87, 88. See also online retailing Rethink Robotics, 5, 7, 10 retirement income, 222 Reuther, Walter, 193 reverse engineering the brain, 237 RFID. See radio-frequency identification (RFID) Riegel v. Medtronic, Inc., 150n risk, Peltzman effect and, 267–268 RoboBusiness conference/tradeshow, 7 Robot & Frank (film), 155 robotics, 6–8 cloud, 20–23 See also automation; robots robotic walkers, 157 robots in agriculture, 23–26 box-moving, 1–2, 5–6 consumer, 197n educational, 7 elder-care, 155–158 hospital and pharmacy, 153–155 industrial, 1–5, 10–11 personal, 7 telepresence, 119–120, 157 Rolling Stone (magazine), 56 Romney, Mitt, 272 Roosevelt, Franklin, 279 Rosenthal, Elisabeth, 160, 163 Rosenwald, Michael, 107 ROS (Robot Operating System), 6, 7 Russell, Stuart, 229 Rutter, Brad, 101 Sachs, Jeffrey, 60 Saez, Emmanuel, 46 safety, autonomous cars and, 184–185, 187 Salesforce.com, 134 Samsung Electronics, 70n Samuelson, Paul, x Sand, Benjamin M., 127 San Jose State University, 134 Sankai, Yoshiyuki, 156–157 Santelli, Rick, 170 savings, China’s high rate of, 224–225 SBTC.

According to one hospital administrator, paying people to do the same work would have cost over a million dollars per year.15 In early 2013, General Electric announced plans to develop a mobile robot capable of locating, cleaning, sterilizing, and delivering the thousands of surgical tools used in operating rooms. The tools would be tagged with radio-frequency identification (RFID) locator chips, making it easy for the machine to find them.16 Beyond the specific areas of pharmacy and hospital logistics and delivery, autonomous robots have so far made relatively few inroads. Surgical robots are in widespread use, but they are designed to extend the capabilities of surgeons, and robotic surgery actually costs more than traditional methods.

The suits lease for just under $2,000 per year and are already in use at over three hundred Japanese hospitals and nursing homes.21 Other near-term developments will probably include robotic walkers to assist in mobility and inexpensive robots capable of bringing medicine, providing a glass of water, or retrieving commonly misplaced items like eyeglasses. (This would likely be done by attaching RFID tags to the items.) Robots that can help track and monitor people with dementia are also appearing. Telepresence robots that allow doctors or caretakers to interact with patients remotely are already in use in some hospitals and care facilities. Devices of this type are relatively easy to develop because they skirt around the challenge of dexterity.


Hacking Capitalism by Söderberg, Johan; Söderberg, Johan;

Abraham Maslow, air gap, Alvin Toffler, AOL-Time Warner, barriers to entry, Charles Babbage, collective bargaining, commoditize, computer age, corporate governance, creative destruction, Debian, deindustrialization, delayed gratification, Dennis Ritchie, deskilling, digital capitalism, digital divide, Donald Davies, Eben Moglen, Erik Brynjolfsson, Firefox, Free Software Foundation, frictionless, full employment, Garrett Hardin, Hacker Conference 1984, Hacker Ethic, Herbert Marcuse, Howard Rheingold, IBM and the Holocaust, informal economy, interchangeable parts, invention of radio, invention of the telephone, Jacquard loom, James Watt: steam engine, jimmy wales, John Markoff, John von Neumann, Joseph Schumpeter, Joseph-Marie Jacquard, Ken Thompson, knowledge economy, knowledge worker, labour market flexibility, late capitalism, Lewis Mumford, liberal capitalism, Marshall McLuhan, means of production, Mitch Kapor, mutually assured destruction, new economy, Norbert Wiener, On the Economy of Machinery and Manufactures, packet switching, patent troll, peer-to-peer, peer-to-peer model, planned obsolescence, post scarcity, post-Fordism, post-industrial society, price mechanism, Productivity paradox, profit motive, RFID, Richard Florida, Richard Stallman, Ronald Coase, safety bicycle, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, Slavoj Žižek, software patent, Steven Levy, Stewart Brand, subscription business, tech worker, technological determinism, technoutopianism, the Cathedral and the Bazaar, The Nature of the Firm, the scientific method, The Theory of the Leisure Class by Thorstein Veblen, Thomas Davenport, Thorstein Veblen, tragedy of the anticommons, Tragedy of the Commons, transaction costs, Whole Earth Catalog, Yochai Benkler

Following this development, the engagement of many hackers in the right to be anonymous on the Internet is growing into a concern for anonymity in the public space as well. Two technologies in particular have alarmed the hacker movement, Radio Frequency Identifiers (RFID) and biometrics. These technologies will enable the same degree of regulation and control in real life as is now possible inside the computer network. RFID are microchips, no bigger than a grain of sand, which scan for radio queries and transmit their unique identification number to the sender. The movement of the body in real space can thus be pinpointed in a virtual, Cartesian grid. RFID tags have been used for many years to track shipments and monitor inventories, and are expected to be used extensively on ordinary household products, branded cloths, and money.

Index Aestethic innovation 64, 68, 177 Adorno, Theodor 65, 70, 168, 191–192 Advanced Research Projects Agency, see ARPA Affluent society 99–101 Aglietta, Michel 59 Alienation 10, 156–159, 173, 182, 188, 190 Allopoietic 134–135 Altair 17 Althusser, Louis 77 Analytical Engine 3 Anti-production 120, 213 n.12 AOL Time Warner 89, 91, 125 Apache 24, 28, 38, 44 Apple 17 ARPA (advanced research projects agency) 13–15 AT&T (american telephone and telegraph) 13–15, 19, 23–24, 91, 116 Audience power 66, 68, 198 n.47, 204 n.40 Authorship 74, 78, 80–82, 112, 114, 125, 128–129, 138, 154, 160, 174, 206 n.9 Autonomous Marxism 6–7, 52, 55, 176, 194 n.18, 201 n.9 Autopoietic 134–135, 155 Axelos, Kostas 158–159 Babbage, Charles 3–4 Back Orifice 80 Barbrook, Richard 150, 216 n.27 Bataille, George 147, 149, 154, 216 n.20 Baudrillard, Jean 64, 103, 105, 109, 127, 202 n.19, 211 n.9, n.12 BBS (bulletin board systems) 96 Beauty of the Baud 3, 184 Bell, Daniel 51, 54, 100, 170–171, 173 Bell, Graham 11 Bell laboratory 14 Benjamin, Walter 65, 207 n.18, 210 n.49 Benkler, Yochai 139–140, Berkeley internet name domain, see BIND Berkeley software distribution, see BSD Berne convention 85, 208 n.25 Bertelsmann 124 Biegel, Stuart 91 Bijker, Wiebe 54–55, 203 n.24 Binary code 19, 21–22, 97, 195 n.16 BIND (Berkeley internet name domain) 25 Biometric technology 92–93 Black, Edwin 194 n.15 Boomerang externalities 146 Bowles, Samuel 173 Boyle, James 117, 208 n.24 Brand, Stewart 16, 69 Braverman, Harry 130–133 British cultural studies 9, 65–66 Brooks, Fred 184 BSD (Berkeley software distribution) 15, 23–24, 38 Bulletin board systems, see BBS Burghardt, Gordon 166–167 Bush, Vannevar 12 Caffentzis, George 61–63 Caillois, Roger 166–167, 182 Castells, Manuel 51, 145, 200 n.3, 202 n.19, 216 n.15 CC (Creative commons) 4, 41, 78 Censorship 4, 79–80, 82, 91, 97, 178, 189 CERN (Conseil européen pour la recherche nucléaire) 25 Certeau, Michel de 66, 112, 182 Chaos computer club 180 Charismatic code 153, 217 n.33 Chiapello, Eve 163 Circulating capital 120, 145 Class consciousness 18, 178, 180–181 for-itself 188 struggle 4, 7, 44, 47–48, 54, 56, 67, 72, 76, 103–104, 159, 175–178, 188, 203 n.20, 204 n.27, 212 n.12 Clickwrap license, see shrinkwrap license Coase, Ronald 140 Cohen, Gerald 54 Collective invention, 213 n.6 Collins, Hugh 76–77 Commodification of information 8, 31, 199 n.60, Commodity exchange theory 75–76, 90 Commons 119, 122, 129, 135, 137, 145–148, 150–151, 171–172, 184, 191, 199 n.57, 216 n.18 Community for-itself 183 FOSS developers 21, 23 Compiling 195 n.16 Computer literacy 131–132 Constant capital 127 Copyleft 20–22, 34, 196 n.19, n.21, 198 n.44 Copyright law 8, 18–22, 78–79, 82–85, 94, 98, 112, 113, 143, 154, 181, 195 n.14, 196 n.19, 207 n.15, 208 n.22 Crackers 69, 98, 113, 151, 153, 155, 183, 188, 217 n.35 Creative class 51, 61, 173–174 Creative commons, see CC Cross, Gary 101 Cultural workers 82, 163–164, 192 Culture industry 57, 70, 73, 75, 85, 106, 112, 168, 173, 205 n.46 Cyber attacks 199 n.61 feminism 30, 214 n.32 libertarianism 4, 90, 216 n.27 marx 52 politics 4, 30, 48, 69 space 11, 88, 150 Cycles of struggle 176–177 Cygnus 32–34 Darknet 97 Davies, Donald 195 n.5 Debian 123 Debian-women 30 Debord, Guy 103, 211 n.9 Decompiling 195 n.16 DeCSS see DVD-Jon Deleuze, Gilles 135, 213 n.12, 215 n.34 Denial-of-service attacks 1, 193 n.3 Derrida, Jacques 57, 149, 153, 216 n.24 Desire 18, 27, 48, 105, 109, 136, 155–156, 161, 174, 185–186 Deskilling 5, 9, 45, 97, 111, 130–131, 209 n.44, 210 n.56 Desktop factory 186 Developing countries and FOSS 30, 87, 96, 210 n.54 Difference Engine 3 Digital rigths management, see DRM DRM (digital rights management) 22, 42, 91, 183, 209 n.45 DVD-Jon 87–88, 91 Edelman, Bernard 77–78, 80, 207 n.16 Edwards, Richard 89 Electro-hippies 178 Electronic Frontier Foundation 58, 208 n.21 Ellickson, Robert 217 n.30 Empire 6 Enclosure movement 71, 129, 171 Engels, Friedrich 53, 115 Enzensberger, Hans 194 n.16, 210 n.49 Excess of expenditure 49, 100, 136, 147–148, 153–155, 171, 174 Exchange value 45, 56, 103–105, 109, 144, 211 n.12 Fan media production 112–113, 127, 164, 183, 191, 212 n.20, 194 n.16 Fanning, Shawn 124–125 Felsenstein, Lee 17 Filesharing networks 4, 8, 10, 31, 73, 93–94, 113, 127, 137, 150–153, 189 Firefox 37, Fisher, William 74–75 Fixed capital 15, 27, 39, 68 Flextronics 96 Florida, Richard 51, 173–174 Fordism 59, 67, 101, 203 n.26 Formal subsumption 56, 118 FOSS (free and open source) community 5, 8, 28–29, 38, 49, 111, 125, 133, 172, 177 development model 6, 9, 24, 41, 49, 115, 121, 137, 139–140, 190 license 8, 20, 28, 40, 78, 122, 125, 190 movement 26–27, 31–32, 38, 43, 50, 116, 133, 150, 184, 195 n.17 Foucault, Michel 48, 57, 76, 80, 128, 181 Frankel, Justin 124–125 Frankfurt School 57, 160 Free and open source software, see FOSS Freenet 80, 214 n.18, Free software foundation 19, 22–23, 37, 73, 126, 179–180, 196 n.20, n.23 movement 151, 195 n.17 Free speach not free beer 32, 73, 123 French regulation school 59, 204 n.27 French revolution 1–2, 79, 159, 161, 165, 187 Friedman, Andrew 133 Frow, John 151 Gaines, Jane 207 n.20 Garnham, Nicholas 102 Gates, Bill 4 Gay, Paul du 106–107 General economy 147 intellect 60, 63, 184 public license, see GPL Giddens, Anthony 200 n.6 Gift economy 10, 54, 100, 137, 148–152 Gintis, Herbert 173 Gnome 35, GNU (GNU is not Unix) book 210 n.55 Emacs 20, 32 /Linux 4, 15, 22–24, 26, 28, 31–35, 38–39, 43–44, 47, 87, 123, 163, 183, 196 n.23, n.28 Gnutella 124–125, 153, 214 n.18 Google 41 Gopher 25 Gosling, James 20 Gouldner, Alvin 201 n.12 GPL (General public license) 19–24, 27, 31–32, 34–35, 37, 96, 129, 185, 196 n.19, n.20, n.21, 197 n.44 Gracenote 41, 199 n.57 Guattari, Felix 135, 213 n.12, 215 n.34 Habermas, Jurgen 202 n.16 Hacker manifesto 28, 30, 172 spirit 44, 108, 174, 199 n.66 Hacktivists 16, 55, 84, 178, 180, 182 Haeksen 30, 197 n.41 Halloween Documents 26 Haraway, Donna 197 n.42 Hardin, Garrett 145–146, 148 Hardt, Michael 6, 47–48, 52, 60, 194 n.18, 204 n.30 Hardware hackers 7, 17–18, 96 Harrison, Bennett 140–141 Harvey, David 95 Haug, Wolfgang 104–105 Hayes, Dennis 44 Hayles, Katherine 71–72, 203 n.22 Hearn, Francis 168, 182 Heeles, Paul 108 Hegel, G.W.F. 52–53, 56, 74, 157 Heidegger, Martin 160 Heller, Michael 148 High-tech cottage industry 139 gift economy 10, 100, 137, 150 Himanen, Pekka 100, 108, 174, 199 n.66 Hippel, Eric von 205 n.44 Hirsch, Fred 102, 171 Hobsbawm, Eric 76, 189, 193 n.6 Holloway, John 7 Homebrew computer club 17, 185 Homo ludens 165 Horkheimer, Max 65, 70, 168 Howard, Michael 114–115 Huizinga, Johan 165–167, 182 Human genome project 39, 93 Hyde, Lewis 152, IBM 5, 7, 17–19, 24, 38, 43–44, 47, 73, 92, 108, 128, 142, 194 n.15 Identification 90–93, 189 Identity 98, 110, 123, 174–177, 181 Illich, Ivan 128, Immaterial labour 52, 60–61, 71 Independent media centre (IMC) 126 Information age 8, 19, 31, 50–54, 57, 60, 108, 180, 182, 199 n.66, 202 n.19, 203 n.26 exeptionalism 69–70, 73, 132, society 50 Instrumentality 10, 49, 56, 116, 160, Intel 17, 38–39, 43, 92, 198 n.52 Intellectual property enforcement 5, 43, 83, 85, 85, 88, 94, 98, 133 regime 19, 35, 42, 65, 72–75, 80, 82–85, 111, 113–114, 119, 123, 154, 174 Internet explorer 36–37 Jacquard Joseph-Marie 1, 3 Jacquard loom, 1, 193 n.1, n.2, n.4 Jameson, Fredric 56, 64, 201 n.8, 202 n.17 Jefferson, Thomas 69, 205 n.50 Jenkins, Henry 212 n.20 Jessop, Bob 143, 216 n.14 Johansen, Jon, see DVD-Jon Johnson-Forrest Tendency 143 Kant, Immanuel 74, 161 Kautsky, Karl 53–54 KDE (K desktop environment) 35 Kenney, Martin 39, 67 Keynesianism 143, 170 King, John 114–115 Kirchheimer Otto 77 Kloppenburg, Jack 90 Kopytoff, Igor 150 Kropotkin, Peter 129 Labour contract of the outlaw 123 Laclau, Ernesto 175 Lamer 58, 153, 155 Landsat system 119 Late capitalism 56, 101, 104, 120, 168, 188, 201 n.8, 202 n.17, n.18 Lazzarato, Maurizio 60–62 Lenin, Vladimir 4, 115 Lessig, Lawrence 70, 88 Lévi-Strauss, Claude 152, 217 n.34 Levy, Steven 17 Libertarianism 18, 34, 50, 90, 182, 196 n.28, 216 n.27 Library economy 136, 151–153, 155 Liebowitz, Stan 122–123, 144, Linux, see also GNU/Linux chix 30 kernel 21, 23, 49, 193 n.7, 196 n.23 Liu, Alan 48 Locke, John 74, 78, 147, 154 Luddites 1–2, 189 Lukács, Georg 162, 178–181, 184 Lury, Celia 81 Lyotard, Jean-Francois 201 n.10 Machlup, Fritz 69, 206 n.58 Magic circle 165, 167, 190 Make-believe markets 145–146, 148, 155 Mallet, Serge 60, 204 n.29 Malinowski, Bonislaw 148 Mandel, Ernest 56, 59–60, 62–63, 184, 202 n.17, n.18, n.19 Marconi Wireless Telegraph Company 116 Marcuse, Herbert 3, 10, 116, 159–164, 182, 184 Marx, Karl 2, 4, 7, 48, 50, 53–54, 56–57, 60–61, 64, 81, 88, 101, 104, 109–111, 114–115, 118–119, 133, 139, 141, 144–145, 156–162, 173–175, 197 n.32, 201 n.12, 211 n.5, 212 n.19, 215 n.4 Maslow, Abraham 99–101, 211 n.2 Mass worker 7, 176 Maturana, Humberto 134, 136s Mauss, Marcel 148–149 McBride, Darl 31, 87 McLuhan, Marshall 58 McRobbie, Angela 108 Means of production 9, 48, 57, 81, 116, 129–130, 135, 186, 192 Mentor, the 172 Micro-capital 141 Microsoft 4, 19, 24, 26, 34, 36–39, 42–43, 63, 87, 92, 96, 144 Mill, John Stuart 69 Minitel 14 Minix 23–24 Moglen, Eben 4, 126 Mokyr, Joel 55 Moody, Glen 35, 37, 130 Moore, Fred 17 Morris-Suzuki, Tessa 63–64 Mosaic 36, 198 n.50 Mosco, Vincent, 204 n.40 Motion pictures association of america, see MPAA Mouffe, Chantal 175 Mozilla 36–37, 198 n.50 Mozilla crypto group 126 MPAA (motion pictures association of america) 42, 87–88, 199 n.58, 209 n.36 Multitude 6–7, 60, 181 Mumford, Lewis 134, 147 Naples, Nancy 200 n.77 Napster 124–125, 213 n.17 Naughton, John 12, 15 N/C technology 45–46, 131 Negri, Antonio 6–7, 47–48, 52, 56–57, 60–61, 176–177, 194 n.18, 201 n.9, n.15, 202 n.16, 204 n.31, n.33 Neo-Luddism 134 Netscape 36–38, 126 Network externalities 38, 144 firm 137, 141–142, 144 industry 27, 137 science 141, 215 n.2 society 51, 137, 142 Neuman, Franz 77 Neumann, John von 61, 63 New economy 124, 132, 144 New left 16–17, 150–151, 157, 212 n.12 Noble, David 45, 131, 206 n.59 Norton, Bruce 202 n.17 Nullsoft 125 Nupedia 128 Oekonux 5 Offe, Claus 214 n.30 Office despotism 18 Opencores project 96 Open marxism 7 Open source car 185 development labs 43 initiative 36, 38–41, 78, 180 Organised labour 27, 41, 69, 72, 95–96, 131–132, 141–142, 188, 190 Pashukanis, Evgeny 75–77, 206 n.2 Patent costs 116–118 expansion 22, 39, 83–84, 208 n.24 pools 119 Peer-to-peer filesharing networks 31, 91, 123– 125, 151 labour relations 123, 129 Perelman, Michael 86, 171 Perpetual innovation economy 64, 120 Petty commodity trader 61, 81, 159 PGP (pretty good privacy) 80 Phone phreaks 16, 96–97 Pirate sharing 69, 122–123, 183, 209 n.33, n.45 Play drive 10, 18, 49, 154, 161–162 struggle 3, 10, 156, 174, 182, 190–192 Political subject 156, 174 Poster, Mark 128 Post- fordism 8, 59–61, 67, 81, 107, 116, 133, 135, 139–140, 163, 168, 176, 183, 203 n.26, 204 n.27 industrialism 5, 51–52, 54, 56, 60–61, 71, 100, 103, 130, 137, 139 marxism 175, 177 modern capitalism, 52, 56, 61, 64, 73, 101, 104, 120, 145, 168, 175–176, 188, 216 n.20 Poulantzas, Nicos 218 n.18 Pretty good privacy, see PGP Professional worker 176 Proprietary software 9, 16, 19, 21, 24, 26–27, 33–34, 38, 41, 115, 129–130, 139, 144, 198 n.46, n.52, 200 n.71 Prosumer 106–108 Put to work 8, 48, 73, 82, 177, 184 Qt 35 Radio amateur 17, 96, 185, 191 Radio frequency identifiers, see RFID RAND (research and development) 13 Rand, Ayn 206 n.61 Raymond, Eric 25–27, 196 n.28, 197 n.29 Real subsumption 56, 118, 135 Record industry association of america, see RIAA Recuperation 49, 164, 182 Red Hat 26, 32–35, 43, 47, 68, 196 n.27, 197 n.33, n.44, 198 n.45 Refusal of work 44, 108 Rehn, Alf 217 n.35 Representation politics 66, 110, 191 Research and development, see RAND Restrictive economy, see general economy RFID (radio frequency identifiers) 92 RIAA (record industry association of america) 42, 124–125, 153, 199 n.58 Robins, Kevin 194 n.17, 209 n.44 Romanticism 2, 81–82, 159, 162–163 Ross, Andrew 46, 199 n.66 Sabotage 1, 10, 46, 111, 188, 193 n.6 Sahlins, Marshall 70 Sanger, Larry 128 Sarnoff law 66 Scarcity 70–71, 99–101, 109, 112–113, 130, 147, 155, 160, 169, 190 Schiller, Dan 71, Schiller, Friedrich 23, 10, 154, 160–163, 184 Schumpeterian competition state 143 Schumpeter, Joseph 30 SCO/Caldera 43–44, 87 Self-administrated poverty 172 Sennett, Richard 45 SETI@home 127 Sham property 141 Shiva, Vandana 209 n.45 Shrinkwrap license 21 Shy, Oz 122, 143–144 Silicon Valley 44, 180 Simputer 210 n.54 Sitecom Germany GmbH 22 Situationists 150 Smythe, Dallas 66–67 Social bandit 76, 93–94, 98, 189 division of labour 4, 77, 99, 123, 149, 158–159, 164, 174, 187–188, 192, 205 n.44, 210 n.49 factory 47–48, 56, 64, 68, 89, 177 labour 38, 56, 71 planning theory 74–75 taylorism 90, 97–98, 209 n.44 worker 7, 60, 176–177 Sony 42 Stallman, Richard 19–20, 32, 37, 73, 179, 195 n.17, 196 n.23, 200 n.71 Strahilevitz, Jacob 152–153, 217 n.33 Stefik, Mark 92 Sterling, Bruce 11, 15 Strahilevitz, Jacob 152–153, 217 n.33 Surplus labour 8, 47–48, 61, 63, 67, 211 n.5 profit business model 34, 68 value 33–34, 47, 50, 61–64, 66–68, 101, 105, 110–111, 118, 120–121, 134, 156, 202 n.16, 204 n.40, 213 n.12, Surveillance 4–5, 85, 90–91, 97, 143, 145, 189, 214 n.18, Tanenbaum, Andrew 23 Taylorism 8, 45–46, 48, 90, 115, 132 Techies 16, 18, 30, 178, 182 Technical division of labour 27, 48, 115, 123, 132, 142, 155, 199 n.68 Technicist 54, 201 n.6 Technological american party 16, 18 Technological determinism 57–58, 182 Terranova, Tiziana 68 Toffler, Alvin 51, 106 Torvalds, Linus 21–23, 26–27, 49, 193 n.7, 197 n.32 Travis, Hannibal 207 n.15 TRIPS 86, 208 n.29 Troll Tech 35 Tronti, Mario 47 Trusted computing 92, 96 Unix 14–15, 19–20, 23–24, 43, 87, 195 n.7 User centred development 9, 27, 41, 65–68, 129, 131, 133, 192, 205 n.44 community 50, 68, 111, 123 friendliness 17, 45, 90, 98 Use value 68, 71, 101–105, 109, 113, 120, 122, 129, 144, 147, 153, 155, 211 n.9, n.12 Vaneigem Raoul 212 n.21 Varela, Francisco 134, 136 Variable capital 127 Veblen, Torsten 211 n.7 Villanueva, Edgar 144 Virno, Paulo 57, 73, 172, 177 Virtual community 152–153, 217 n.30 space 90, 92–93, 95, 184, 203 n.22, 217 n.33 Volosinov, Valentin 202 n.20 Voluntarism 5, 29, 179 Voluntary labour 2, 8, 107, 129, 166 Wales, Jimmy 128 Warez 153, 183, 217 n.35 Wark, McKenzie 177 W.a.s.t.e. 125 Watt, Duncan 141–142 Watt, James 166 Watt, Richard 213 n.14 Wayner, Peter 151–152 Webster, Frank 194 n.17, 200 n.3, 201 n.7, 209 n.44 Wetware 133–135 White collar working class 48, 97, 130, 200 n.72 hat hacking 180 Whole Earth Catalog 16 Wiener, Norbert 12 Wikipedia 128–129 Williams, Raymond 58 Windows 25, 41, 43, 86–87, 123, 126, 163, 183 Winner, Langdon 16, 203 n.25 WIPO (World Intellectual Property Organisation) 18, 83, 91 Wired Magazine 18, 58, 180 Witheford, Nick-Dyer 51, 204 n.31 Wolfgang, Haug 104–105 Wolf, Naomi 105 Wood, Stephen 131 Workfare state 135, 171 World Intellectual Property Organisation, see WIPO World Trade Organisation, see WTO Worshipful Company of Stationers London 79 Wright, Steve 201 n.9 WTO (World Trade Organisation) 86, 126, 178 Yahoo 41 Young, Robert 26–27, 33, 126, 196 n.27, 198 n.46, n.52 Youth international party line 16 Zero work 49 Zizek, Slavoj 4, 175


pages: 202 words: 59,883

Age of Context: Mobile, Sensors, Data and the Future of Privacy by Robert Scoble, Shel Israel

Albert Einstein, Apple II, augmented reality, call centre, Chelsea Manning, cloud computing, connected car, driverless car, Edward Snowden, Edward Thorp, Elon Musk, factory automation, Filter Bubble, G4S, gamification, Google Earth, Google Glasses, Internet of things, job automation, John Markoff, Kickstarter, lifelogging, Marc Andreessen, Marc Benioff, Mars Rover, Menlo Park, Metcalfe’s law, New Urbanism, PageRank, pattern recognition, RFID, ride hailing / ride sharing, Robert Metcalfe, Salesforce, Saturday Night Live, self-driving car, sensor fusion, Silicon Valley, Skype, smart grid, social graph, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Tesla Model S, Tim Cook: Apple, TSMC, ubercab, urban planning, Zipcar

More than that, they use contextual technology. Every card and every chip is embedded with a tiny RFID-like chip. Every gaming table has a sensor underneath it to detect flimflams such as a player pulling an extra ace out of his sleeve. That isn’t wearable technology, but the sensors casinos use come from former Swiss watchmaking company NagraID, which has reinvented itself by designing highly secure miniature technology. NagraID chips make credit cards and loyalty cards smart enough to know their owners and their location. That same technology in the form of an RFID (radio-frequency identification) chip is embedded on contextual passes worn by skiers at Aspen Snowmass, the world’s most popular ski resort, and in the Disney’s MagicBands, making transactions for hotels and meals automatic.

Combine NagraID with a VinTank geo-fence and you’ll get a new level of personalized, location-specific services or sales, where payments can be automatically authenticated and processed. VinTank also extracts data from a customer’s previous recommendations, so the restaurant, amusement park or hotel can customize its service and offers to each customer’s preferences. That little RFID chip and a few tiny sensors on a card will generate a very large improvement in personalized service, and with it enhanced customer loyalty. Now, toss in one more piece of technology. Put on a digital eyewear device such as Glass or Oakley Airwave, and you’ll have a contextual, wearable system that knows your location, your current activity, your preferences as well as what you are looking at in real time.


Stacy Mitchell by Big-Box Swindle The True Cost of Mega-Retailers, the Fight for America's Independent Businesses (2006)

accelerated depreciation, big-box store, business climate, business cycle, clean water, collective bargaining, corporate personhood, drop ship, European colonialism, Haight Ashbury, income inequality, independent contractor, inventory management, invisible hand, Jane Jacobs, low skilled workers, Maui Hawaii, Menlo Park, new economy, New Urbanism, price discrimination, race to the bottom, Ray Oldenburg, RFID, Ronald Reagan, The Chicago School, The Death and Life of Great American Cities, The Great Good Place, the long tail, union organizing, urban planning, women in the workforce, zero-sum game

Blythman, Shopped, 234–35; Wal-Mart, 2004 annual report; Mark O’Neill, NOTES 265 “Retailers under Siege with ‘Wolves’ at the Door,” South China Morning Post, Nov. 24, 2004, 12. 35. Jack Neƒ, “Wal-Marketing: How to Benefit in Bentonville,” Advertising Age, Oct. 6, 2003, 1; Anne D’Innocenzio, “Wal-Mart Suppliers Flocking to Arkansas,” Associated Press, Sept. 21, 2003; Fishman, The Wal-Mart Eƒect. 36. Mary Brandel, “RFID: Smart Tags, High Costs,” Computerworld, Dec. 15, 2003; Christine Spivey Overby, RFID At What Cost? (Cambridge, Mass.: Forrester Research, Mar. 1, 2004). 37. Marc Greenberger and Randi Lass, “A Fundamental Change in Retail: ScanBased Trading, No Inventory Costs for Retailers,” Chain Drug Review, May 19, 2003, 3; Marc Greenberger, “SBT: From Theory to Practice,” Chain Drug Review, June 30, 2003, 3. 38.

Much of the work done at manufacturers’ Bentonville branch o‰ces benefits Wal-Mart at no cost to the company. Retailers also commonly require vendors to adopt expensive new technologies that are of little benefit to themselves, but that reduce labor costs for the chains. Costco, Target, and Wal-Mart, for example, are beginning to demand that suppliers embed radio frequency identification (RFID) tags in 22 BIG-BOX SWINDLE their merchandise. These tiny microchips, about the size of a grain of sand, emit signals that can be picked up by specialized scanners. They make managing and tracking inventory much easier for retailers. Wal-Mart expects the tags to reduce payroll at its distribution centers by as much as 10 to 20 percent.

See also government; land-use policy 313 public relations, corporate retail, 4, 34–35, 97–99, 122, 209, 201–202 public spaces, 79–80, 83–85, 92–96 publishers, 24, 140–42, 145–46, 149, 185–87 Puryear, Kathy, 232 Putnam, Robert, 77 PW grocer, 48 quality of life. See community life quality of products and big-box pricing, 132–33 racial diƒerences, corporate manipulation of, 202 radio frequency identification (RFID) tagging, 21–22 Raguski, Steve, 231, 256 Ramos, Paul, 236 raw materials, mega-retailer sourcing of, 25–26 real estate development. See development, land record labels, 148–49 Red Hook, Brooklyn, 91, 202 regional-level planning, 194, 218–21 regional draw of big-box stores, 38–39, 66 Reile, Mike, 236, 238 Reilly, William J., 108–9 Reiner, Leslie, 186–87 relationships at local level: and consumer choice, 153; and economic capital, 41–42, 48–49, 55; and local business satisfaction, 225–26, 244–45; and social capital, 77, 78–80, 87 remodeling contractors’ cooperative, 247 Rendell, Ed, 174 rents, escalation in, 233–34 Reny, John, 133 314 INDEX restaurants, 11–12, 87 retail gravitation, law of, 108–9 Review (East Liverpool, OH), 40–41 RFID (radio frequency identification) tagging, 21–22 Rhode Island: Pawtucket, 89; Providence, 91 Riley, Ken, 158–59 Rite Aid, xii, 89, 90, 134 River Bank Books & Music, 230–31 road networks and sprawl costs, 5, 67, 109–10 Roberts, Bruce, 226 Robinson, Chuck, 144–45, 249, 256, 257 Robinson-Patman Act, 183–84, 188–89 Robnett’s Hardware, 28, 29 Rochefort, David, 154–55 Rockne, Jennifer, 253 Roosevelt, Franklin, 177 rootedness, 71–72, 76, 77, 82–85 Rother, Lisa, 212 Rubbermaid, 23 Rubin, Peter, 31, 243 Ruckelshaus, Cathy, 62 Ruƒ N’ Stuƒ, 232 runoƒ from parking lots, 106–7, 117–19, 218 rural economies, mega-retailers’ impact, 47 safety at work, big-box violations of, 56, 158 sales taxes, 65–66, 69, 169, 176–77 Salzman, Burt, 85 Sam’s Club, 9, 165, 168, 219 Santa Fe Custom Shutters and Doors, 24 Santa Fe Shares card, 254–55 Sather, Don, 204 Savage, Ronald, 67 scale: growth in size of retail stores, 208–210; local government restric- tions on size of retail stores, x, 192–98, 210–13 Schaefer, Gina, 224–25 Schaefer, Mark, 224 Schanen, Bill, 71 Schueler, Tom, 118 Scott, Lee, 14 Sears, Roebuck & Co., 3, 13–14 Seely, Frank, 241 Sekula, Greg, 90 self-reliance, local, xviii, 75, 80–81.


RDF Database Systems: Triples Storage and SPARQL Query Processing by Olivier Cure, Guillaume Blin

Amazon Web Services, bioinformatics, business intelligence, cloud computing, database schema, fault tolerance, folksonomy, full text search, functional programming, information retrieval, Internet Archive, Internet of things, linked data, machine readable, NP-complete, peer-to-peer, performance metric, power law, random walk, recommendation engine, RFID, semantic web, Silicon Valley, social intelligence, software as a service, SPARQL, sparse data, web application

See RDF Schema (RDFS) RDF Schema (RDFS), 3, 42 entailment, graphical representation of, 190 minimal, 208 ontology languages, 60, 208 Tboxes, 147 RDF-3X system, 6, 97, 109, 159 Reasoning capabilities, 189 database management systems, 191 first-order logic bottom-up resolution, 200 top-down resolution, 200 materialization vs. query rewriting, 195 object-based approach, 202 consequence-based reasoning procedures, 204 structural subsumption, 202 tableau-based method, 203 in propositional logic, 198 RDF data set, 196 extract, 190 RDFS entailment graphical representation of, 190 RDFS ontology, 195 rule-based approach, 197 SPARQL query language, 189 W3C ontology languages, 189 Reasoning services, 74 Redis, 28 Redland RDF library, 146 Reification, 46 Relational database management system (RDBMS), 2, 9 with ACID properties, 28 benchmarks, 77 evolutions of, 38 Jena SDB system, 126 property-class modeling, 129 property table technique, 128, 129 241 Index RDFJoin project, 127 RDFKB (resource description framework knowledge base), 127 relations, attributes, and tuples, 10 roStore, 132 structured query language (SQL), 52 triples table approach, 125 vertical-partitioning approach, 130, 131 Virtuoso system, 126 Remote procedure call (RPC), 34 Re-Pair, 90 Representational state transfer (REST), 3 Resolvent, 197 Resource description framework (RDF), 1, 43, 44 challenges, 221 data management, 6 data set, graph, 47 expected features, 222 stores, 223 graph representation, 44 HTML serializations, 52 Notation 3 (N3), 50 N-triples, 50 stores, set of dimensions, 7 Turtle, 51 URIs, 45 XML serialization, 48 Resource interchange format (RIF), 42 REST. See Representational state transfer (REST) Reverse primary hash (RPH), 132 Reverse secondary hash (RSH), 132 Rexster, 149 RFID. See Radio-frequency identification device (RFID) Riak, 28 RIF. See Resource interchange format (RIF) roStore, 132 RPC. See Remote procedure call (RPC) RPH. See Reverse primary hash (RPH) RSH. See Reverse secondary hash (RSH) Ruby, 4, 79 Rule-based ontology languages, 76 Rya engine, 140 S SAOR system. See Scalable authoritative OWL reasoning (SAOR) system Scalable authoritative OWL reasoning (SAOR) system, 216 Scalable highly expressive reasoner (SHER), 215 Scalable high-performance, robust, and distributed (SHARD), 180 SDB system, 99 SDSs.

Introduction The Internet of Things (IoT) is another contributor to the Big Data ecosystem, which is just in its infancy but will certainly become a major data provider.This Internet branch is mainly concerned with machine-to-machine (M2M) communications that are evolving on a Web environment using Web standards such as Uniform Resource Identifiers (URIs), HyperText Transfer Protocol (HTTP), and representational state transfer (REST). It focuses on the devices and sensors that are present in our daily lives, and can belong to either the industrial sector or the consumer market. These active devices may correspond but are not limited to smartphones, radio-frequency identification device (RFID) tagged objects, wireless sensor networks, or ambient devices. IoT enables the collection of temporospatial information—that is, regrouping temporal as well as spatial aspects. In 2009, considered an early year of IoT, Jeff Jonas in his blog (Jonas, 2009) was already announcing that 600 billion geospatially tagged transactions were generated per day in North America.

See Query parallel inference engine (QueryPie) Query processing overview of, 143 parsing, 145 RDFS/OWL ontology, 144 SPARQL query, 143–145 simplifiable, 147 SPARQL 1.1 W3C recommendation, 163 for update queries, 163 X-RDF-3X extension, 164 Query rewriting, 98 CumulusRDF system, 149 encoding/decoding, 148 RDFS blog ontology, extracts, 147 simplification, 147 translation, 148 QuOnto system, 212 R Radio-frequency identification device (RFID), 3 RAM. See Random access memory (RAM) Random access memory (RAM), 14 RavenDB, 32 RDBMS. See Relational database management system (RDBMS) RDF. See Resource description framework (RDF) RDFa. See RDF in attributes (RDFa) RDFCube system, 112 storage schema, 112 RDF in attributes (RDFa), 3 RDFMatView, 146 RDFPeers, 112 RDFS.


Data and the City by Rob Kitchin,Tracey P. Lauriault,Gavin McArdle

A Declaration of the Independence of Cyberspace, algorithmic management, bike sharing, bitcoin, blockchain, Bretton Woods, Chelsea Manning, citizen journalism, Claude Shannon: information theory, clean water, cloud computing, complexity theory, conceptual framework, corporate governance, correlation does not imply causation, create, read, update, delete, crowdsourcing, cryptocurrency, data science, dematerialisation, digital divide, digital map, digital rights, distributed ledger, Evgeny Morozov, fault tolerance, fiat currency, Filter Bubble, floating exchange rates, folksonomy, functional programming, global value chain, Google Earth, Hacker News, hive mind, information security, Internet of things, Kickstarter, knowledge economy, Lewis Mumford, lifelogging, linked data, loose coupling, machine readable, new economy, New Urbanism, Nicholas Carr, nowcasting, open economy, openstreetmap, OSI model, packet switching, pattern recognition, performance metric, place-making, power law, quantum entanglement, RAND corporation, RFID, Richard Florida, ride hailing / ride sharing, semantic web, sentiment analysis, sharing economy, Silicon Valley, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart contracts, smart grid, smart meter, social graph, software studies, statistical model, tacit knowledge, TaskRabbit, technological determinism, technological solutionism, text mining, The Chicago School, The Death and Life of Great American Cities, the long tail, the market place, the medium is the message, the scientific method, Toyota Production System, urban planning, urban sprawl, web application

Sensors deployed on street infrastructure such as bins and lampposts or in shops/malls capture and track phone identifiers such as MAC addresses. The IDs of devices which access or try to access a wifi network are captured and tracked between wifi points. Barcodes, magnetic strips or embedded RFID chips are tracked when they are scanned to gain entry to buildings or transportation. Embedded GPS in devices and vehicles communicate location and movement via cellular or satellite networks. Transponders with embedded RFID chips broadcast their IDs and are tracked by scanning receivers, commonly used in automatic road tolling or electronic tagging of people on probation. Such as using ATMs, credit cards or checking a book out of a library that leaves a digital record. 54 R.

Because these data are recorded at the exact time when the smart card or mobile device is linked to the system in question, there is a continuous or at least continual record of activations which represent real-time collection, either accessible in real-time itself or for post hoc analysis. In short, the data are as voluminous as the number of activations. If this is phone calls, then it is the number of calls made from that device per day or over whatever unit of time and space the data are aggregated to. Here, we will use data generated by the Oyster card, a RFID smart card used on all public transport in Greater London. This card stores the money that travellers use to pay for journeys and the system is designed to recognize the category of payer as well as the time and place where the traveller taps in or out of the system. Travellers tap in and out on trains but only tap in on buses.

Index abstraction 17, 90, 91, 93, 114, 117, 128, 142, 143, 160, 165, 166, 173, 179 accountability 48, 62, 64, 67, 68, 113, 120, 122, 144, 220 Actor Network Theory (ANT) 22, 86, 94, 161 Acxiom 75, 76 agency 95, 153, 165, 197, 198, 201, 205, 217 algorithm 1, 19, 20, 27, 31, 51, 53, 54, 102, 117, 143, 159, 160, 161, 172, 177, 179, 203, 205, 214, 216 API 7, 46, 99, 113, 116, 130, 135, 157 apps 23, 48, 130, 138 assemblage 19, 20, 22, 22, 78, 85, 158–60, 162, 163, 164, 192, 193, 213, 216 assemblage theory 7, 157 automation 9, 26, 31, 31, 34, 175, 184, 197, 218 auto-spatialization 162 Batty, M. 1, 2, 3–4, 10, 17, 19, 20, 26, 31, 33, 34, 47, 75, 114, 158, 190 bias 63, 65, 73, 74, 76, 77, 78, 79, 87, 92, 98, 99, 100, 102, 103, 104, 117, 118, 195, 196, 197, 198 biopolitics 174 bitcoin, 7, 141–3, 148, 149, 150, 151, 153, 154 black-boxed 11, 22, 24, 45, 51, 53, 75, 76, 119, 156, 214 blockchain, 2, 7, 141–57 Borgmann, A. 214, 215, 216, 221–22 boundary object 86, 88, 93 calibration 1, 35, 50, 77, 102, 116, 117, 142, 147 cameras 17, 46, 52, 53, 113, 127, 213, 214, 219, 220, 221 capital 9, 77, 114, 151, 196 capta 60, 68 Castells, M. 25, 26, 156 census 31, 32, 33, 45, 99, 113, 120, 173 Chicago school 18, 24 CitiStat 121 citizen science 2, 9, 11, 21, 46, 209, 213, 216–19, 222 citizenship 2, 9, 11, 203, 207 city operating systems 1, 46, 47, 48 Clery Act 67, 68 code/space 22, 76–77, 159 Cohen, J. 204, 205 communities of practice 86, 88 community 9, 21, 22, 25, 26, 27, 63–4, 91, 100, 123, 145, 204, 216, 217, 220, 221, 222 context 5, 6, 8, 21, 22, 23, 50, 51, 60, 63, 67, 68, 72, 73, 79, 80, 92, 98, 99, 100, 101, 103–05, 115, 122, 163, 166, 179, 191–7 contingency 49, 51, 52, 76, 86, 87, 90, 92, 122, 160, 181 control 10, 11, 44, 48, 51, 54, 60, 62, 76, 122, 166, 202, 203, 214, 217 control rooms 1, 7, 17, 46, 47, 111 counter-narrative 6, 9, 68, 120, 122 crime 5, 53, 59–69, 141, 202 critical data studies 72, 75, 80, 81, 91, 173, 179 crowdsourcing 46, 68, 69, 105, 113, 222 culture 18, 24–7, 49, 60, 64, 68, 95, 100, 104, 114, 153, 159, 191, 193 Customer Relationship Management 153 cybernetics 19, 48, 92, 165, 202, 207 cyberspace 158, 160, 201–07 dashboard 2, 6, 7, 17, 47, 111–124, 135, 137, 138, 139, 141, 154, 190, 197, 198 data: access 11, 17, 23, 45, 50, 51, 60, 61, 64, 68, 99, 105, 113, 115–17, 122, 226 Index 123, 131, 138, 139, 158, 174, 190, 205, 207, 208; administration 2, 45, 46, 47, 78, 88, 111, 113, 127; analytics 1, 19, 45, 47, 48, 53, 59, 60, 74, 75, 127, 196, 197; assemblage 4, 6, 11, 50, 51, 53, 86, 181; big 1, 3, 4, 6, 9, 32, 33–39, 41, 42, 44, 45–9, 50, 51, 52, 72, 75, 78, 104, 113, 115, 116, 118, 122, 127, 135, 138, 139, 159, 175, 184, 189–91, 213, 216; brokers 1, 9, 10, 46, 53; citizens 9, 10, 11, 201–10; control 4, 45, 51; coverage 4, 45, 50, 103; crime 4, 59–69; cube 4, 32–33; culture 1, 2, 8–9, 10, 11, 189–198; derived 5, 44, 53, 113; determinism 53; encounter 5, 73, 79–81; financial 76, 77; framework 51, 116, 184; friction 2, 6, 93, 99, 101, 103; governance 8, 189, 196; indexical 2; infrastructure 1, 2, 5, 7, 8, 77, 78, 85, 156–66, 172, 173, 180, 182, 193; integrity 4, 45, 52, 66, 67, 68, 73, 144; journey 5, 85, 93; lineage 73, 80, 116, 117; linked 184; management 59, 174, 177; minimization 52; mining 31, 38, 42, 47, 114; model 8, 45, 102, 171, 173, 175–77, 178, 179, 180–82; open 1, 4, 10, 47, 48, 59, 60, 61, 64, 66, 67, 69, 77, 99, 113, 116, 118, 120, 122, 124, 193, 196, 198; ownership 4, 45, 51, 80, 202, 208; politics 10, 49–51; portal 7, 99, 123, 139, 193; power 8, 11, 189–98; practice 2, 8, 10, 75, 76, 91, 92, 93, 94, 189, 191, 193–7, 198; protection 4, 45, 64, 207, 208; provenance 2, 5, 72–81, 85, 95, 180, 184, 202; proxies 6, 98, 99, 115, 138, 153; quality 2, 5, 45, 50, 61, 65, 89, 90, 103, 116–18, 194; re-use 66, 116, 128, 134, 190, 193; science 4, 10, 32, 47, 139; security 4, 45, 52; sharing 4, 7, 63, 78, 116, 127, 128, 134, 139; small 4, 32, 33, 41, 46; spatial 32, 72, 73, 79, 80, 117, 118, 131, 175; statistical 47, 61, 64, 113; sticky 6, 98–105; threads 5, 11, 85–95 database 7, 8, 19, 23, 45, 80, 81, 87, 87, 141, 145, 145, 153, 159, 171, 172, 173, 178, 179, 181, 184 data-driven urbanism 2, 3, 4, 11, 12, 44, 48, 113 dataveillance 4, 10, 45, 49, 52, 197 democracy 2, 9, 11, 122, 190, 222 demographic 60, 63, 100, 101, 104, 192, 196 device paradigm 9, 214–16, 217, 218 Dodge, M. 21, 22, 46, 48, 49, 52, 76, 79, 157, 159, 175, 204, 205, 214 Dublin Dashboard 6, 113, 117, 118, 120, 122 dynamic nominalism 8, 11, 181, 182–85 efficiency 11, 19, 48, 72, 75, 123, 127, 190, 196, 197, 213, 222 embodiment 92, 159, 203, 209, 210 empowerment 19, 48, 147 epistemology 2, 3, 6, 7, 10–11, 17, 18–21, 22, 27, 59, 77, 78, 85, 113–15, 121, 123, 160, 162, 163, 194, 214 error 5, 88, 89, 99, 117, 118, 120, 154, 180, 217 essentialism 4, 75, 114, 115, 158 ethics 2, 10, 27, 45, 49, 52–3, 95, 122–123, 190, 198 Euclidean space 7, 161, 162, 164 Evans, L. 23 fab lab 219 Facebook 76, 130, 153, 156, 214, 215 feminism 94, 202 focal practice 9, 214–16, 217, 218, 219–221, 222 Foucault, M. 50, 51, 78, 174, 178, 179, 181, 203, 205 Foursquare 46, 77, 78, 156 Fuchs, C. 206, 207 gender 63, 68, 196 geodemographic 19, 53, 76, 78, 123 geoservices 7, 128, 131–4, 135, 136 geosurveillance 49, 52 Github, 164 Google 73, 76, 104, 130, 135, 160, 210, 216, 217, 220 governance 1, 2, 8, 9, 44, 45, 48, 49, 72, 78, 85, 95, 104, 115, 121, 122, 123, 191, 192, 193, 197, 202; algorithmic 48, 54; anticipatory 4, 45, 49, 53; technocratic 9, 49, 78, 121 government, 9, 10, 19, 21, 22, 48, 59, 64, 79, 88, 111, 113, 116, 141, 174, 189, 190, 192, 193, 205, 208, 222 GPS 46, 53, 80, 149, 152, 160, 165, 217, 219 gravity model 36 hacking 4, 45, 48, 49, 52, 105, 219, 221 Hacking, I. 8, 172, 178, 179, 181–83 Hägerstrand, T. 141, 144, 145, 153 HarassMap 68 heterogeneity 19, 27, 39, 50, 160, 179 Index 227 IBM 19, 47, 189, 190, 218 ideology 5, 20, 21, 49, 86, 95, 114, 115, 205, 206, 214 immutable mobile 86, 162, 163 indicators 5, 51, 85, 88, 89, 90, 91, 113, 115, 116, 117, 122, 138, 139, 194 inequality 49, 62, 100, 101, 146, 158 infant mortality 86–9 infrastructure 1, 3, 22, 40, 44, 45, 48, 49, 50, 52, 54, 66, 72, 77, 85, 86, 91, 92, 111, 127, 136, 157, 158, 159, 162, 172, 179, 184, 184, 189, 192, 195, 205, 214 innovation 48 institution 1, 5, 9, 10, 19, 20, 22, 50, 60, 61–2, 68, 78, 98, 99, 116, 174, 179, 182, 183, 210 instrumentally 2, 5, 6, 9, 11, 12, 23, 54, 72, 121, 122, 123, 222 intelligent transport systems 2, 48 interface 22, 25, 26, 51, 93, 114, 130, 131, 133, 134, 158, 166 internet of things 46, 127 interoperability 6–7, 45, 127, 129, 130, 131, 134, 135, 136, 139, 184 interpretation 5, 33, 34, 60, 68, 79, 80, 87, 117, 119, 150, 194, 209, 210, 214 ISO 37, 120 51, 89, 90, 91 Judgement 5, 10, 60 Kitchin, R. 1, 4, 6, 8, 11, 17, 20, 21, 22, 27, 34, 44, 46, 47, 48, 49, 52, 53, 60, 74, 75, 76, 78, 85, 113, 114, 115, 116, 121, 122, 157, 159, 171, 178, 179, 180, 189, 190, 190, 191, 192, 194, 196, 197, 204, 205, 214 labour 10, 100, 153, 190 Latour, B. 22, 159, 160, 161, 162, 164, 165, 166, 208 ledgers 141–57 Lefebvre, H. 165, 206, 209 Lessig, L. 204, 205 licensing 45, 53, 85, 95, 116, 123 lightings 101–03 literacy 113, 119–20, 123, 158, 194 living labs 21, 148 loose coupling 7, 128, 129, 137 machine learning 3, 19, 42, 47, 145 management 3, 4, 6, 10, 17, 25, 34, 45, 47, 48, 50, 54, 61, 62, 95, 111, 113, 115, 120, 121, 122, 127, 134, 135, 144, 153, 190, 193, 197, 214 Map Knitter 220 mapping 2, 10, 45, 46, 64–66, 116, 119, 135, 172, 174, 210, 216, 217, 220, 222 Marx, K. 141, 142 materiality 5, 7, 8, 85, 91, 93, 95, 157, 158, 159, 163–65 media 22, 26, 31, 44, 45, 66, 100, 116, 156, 159, 160 metadata 5, 6, 7, 72, 73, 74, 75, 76, 77, 79, 80, 81, 90, 98, 99, 116, 118, 123, 134, 135 metaphysics 27, 94, 114 Microsoft 47, 130, 135, 191 misinterpretation 74 mobile; devices 39, 52, 99, 184; phone 23, 46, 51, 76, 158, 159, 160, 210 model 4, 17, 19, 35–9, 78, 104, 119, 145, 147, 172, 173, 180, 184 modelling 19, 35–9, 40, 47, 100, 114, 118, 120, 132, 172, 180, 181, 184, 213 Modifiable Areal Unit Problem 119 money 39, 40, 141–4, 148, 153, 190, 196 Mumford, L. 24–5 MySpace 26 NASA 102, 103 neoliberalism 63, 65, 78, 196 network 1, 7, 19, 22, 23, 40, 45, 46, 52, 53, 86, 93, 129, 135, 142, 143, 150, 158, 161, 162, 163, 164, 165, 173, 193, 203, 205; society 26, 156; topology 161 networked; locality 22; urbanism 44, 48, 52, 54 neutrality 4, 5, 8, 10, 22, 48, 49, 51, 54, 60, 78, 79, 86, 87, 114, 115, 134, 135, 166, 179, 202, 214 normative 2, 3, 4, 11–2, 18, 24, 26, 27, 28, 54, 115 objectivity 5, 8, 10, 18, 49, 51, 54, 60, 61, 69, 78, 79, 81, 86, 87, 103, 114, 115, 123, 144, 172, 179, 181, 194, 195, 206, 209 object-oriented model 8, 179 ontology 3, 4, 8, 23, 72, 79, 80, 81, 86, 113, 162, 165, 171, 174, 175, 177, 182, 183, 184, 194, 209, 214 Open Street Map 46, 217 Ordnance Survey Ireland 8, 173, 174–8, 183–5 organizational service layer 136–8 participation 2, 9, 10, 48, 48, 68, 122, 203, 214, 216–19, 221, 222 pavement management system 173 228 Index performance 26, 62, 86, 120, 121, 141, 164; metrics 74, 88–91, 122, 197 performativity, 23, 206, 207, 209 phenomenology 23 planning 18, 34, 47, 54, 60, 72, 74, 78, 89, 90, 184 platform 6, 27, 49, 51, 100, 101, 104, 127, 129, 130, 142, 143, 148, 150, 154, 173, 174, 175, 179, 198, 208, 209, 210, 215; independency 7, 127, 128, 134, 135, 137; society 26 policy 5, 6, 12, 44, 45, 47, 49, 50, 64, 74, 89, 90, 115, 118, 120, 121, 122, 190, 192, 196 political economy 8, 49, 114, 173, 181, 185, 197 politics 2, 4, 8, 9, 10, 11, 12, 21, 27, 49, 50, 52, 54, 78, 86, 91, 95, 99, 102, 114, 115, 120, 124, 157, 193, 196, 201, 202, 203, 208, 209, 213 post-human 164–5 post-political 12 power 5, 7, 8, 9, 10, 20, 21, 22, 24, 25, 27, 49, 73, 143, 144, 160, 161, 166, 189–98, 201–208, 210, 222 power/knowledge 8, 51, 179, 180, 185 prediction 7, 35–7, 47, 52, 53, 76, 100, 102, 104, 114, 139, 153 predictive policing 2, 5, 53, 104 privacy 4, 9, 45, 52, 65, 68, 72, 105, 122, 201, 202, 207, 208 privatization 51, 63, 68, 116 profiling 2, 19, 77 protocols 1, 7, 76, 81, 93, 130, 133, 135, 157, 163, 205 public; good 8, 49, 77, 78; space 26, 27, 100, 152, 205 Public Lab 219, 222 race 63, 64, 67, 196 realism 21, 22, 50, 79, 103, 114, 121, 146, 158, 172, 194, 197, 215, 216, 217, 222 real-time 1, 3, 4, 17, 18, 19, 23, 34, 39–41, 44, 46, 47, 48, 54, 72, 75, 113 regulation 9, 10, 11, 22, 50, 50, 51, 52, 54, 142, 192, 203, 205, 206, 207 relational space 79, 94, 161 relationality 5, 7, 17, 51, 85, 86, 93, 122, 156, 173 representation 23, 25, 42, 59, 60, 68, 72, 75, 76, 89, 92, 92, 93, 98, 105, 114, 117, 141, 142, 143, 145, 149, 153, 158, 184, 195, 197, 206, 216, 217 Research Data Alliance 191 resistance 10, 183, 197 resource allocation 66 RESTful service 7, 128, 129–36, 138 RFID 39, 53 sampling 2, 4, 36, 45, 50, 89, 99, 113, 116, 118 scalable 7, 128, 130, 135, 139 scale 11, 37, 38, 76, 80, 81, 86, 95, 99, 103, 119, 158, 171, 173, 175, 184 science and technology studies 157, 159 security 2, 5, 9, 46, 48, 63, 64, 67, 72, 130, 134, 135, 164, 202, 213 Senseable City Lab 19 sensors 2, 19, 34, 46, 49, 50, 52, 53, 60, 62–3, 102, 103, 113, 116, 127, 213, 214, 216, 219, 221, 222 service orientation principles 7, 128–9 sharing economy 48 simulation 2, 47, 48, 114 smart: card 34, 39, 40, 53, 116; cities, 1, 2, 3, 4, 7, 9, 10, 18, 19, 20, 21, 42, 44, 45–9, 52, 54, 68, 75, 78, 80, 113, 122, 123, 127–139, 148, 190, 197, 202, 213–222; smartphone 52, 53, 54, 80, 116, 127, 215, 218, 219, 221 social: media 42, 46, 48, 49, 76, 99, 100, 101, 104, 113, 206; network 17, 26, 35, 100, 215; sorting 2, 4, 45, 52, 123, 172 socio-technical: assemblage 4, 7, 8, 10, 49, 49, 50, 161, 172, 178, 179, 184, 185, 202; practices 80 space 25, 52, 65, 79, 92, 93, 94, 100, 115, 144, 145, 153, 157, 158, 162, 163, 165, 183, 191, 201, 202, 204, 205, 206; production of 3, 8, 21, 22, 25, 206 space of flows, 7, 156 spacetime 93, 94, 165 space-time compression, 7, 156 spacetimematter 94, 165 spatial: imaginaries 86, 92–4; interaction 32–3, 42; media 2; sorting 49, 123; structure 95; urban 18, 21–4, 68, 156, 157, 173, 196, 209, 213; video 46 spatiality 7, 24, 85, 91, 92, 93, 94, 143, 161, 163 standards 1, 5, 6, 46, 51, 62, 64, 73, 74, 75, 80, 85, 87, 89, 90, 91, 116, 117, 118, 123, 129, 130, 134, 173, 184, 195, 195 statistical analysis 47 statistics 33, 44, 45, 59, 61, 62, 64, 65, 67, 85, 87, 88, 89, 115, 118, 184, 213 subjective 5, 22, 49, 60, 166, 196, 198, 201, 207, 210 Index 229 subjectivity 2, 10, 60, 165, 202, 203, 208 surveillance 2, 9, 10, 46, 52, 78, 100, 102, 144, 202, 210 survey 2, 45, 49, 61, 64, 66, 74, 89, 89, 89, 90, 99, 113, 210 sustainability 11, 48, 122, 123, 127, 148, 197 truth 49, 77, 78, 114, 123, 174, 184 Twitter, 6, 46, 49, 99–101, 103, 113, 218 TCP/IP 93 technicity 159 territory 7, 174 Thrift, N. 144, 158 time-spaces 7, 163, 164, 164–65 topology 7, 11, 157, 160, 161–4, 165, 166, 173, 175, 176, 181, 183, 184 Toyota 147, 154 transduction 8, 22, 159, 162, 171, 173 transparency 20, 48, 60, 64, 66–8, 113, 120, 122, 164, 181, 193, 216, 221 transponder 46, 53, 113, 127 transport 4, 20, 33, 34–41, 45, 46, 48, 51, 53, 76, 90, 184, 215 trust 5, 7, 24, 25–6, 27, 52, 62, 73, 74, 85, 103, 111, 117, 118, 148, 150, 151, 154, 195 values 8, 9, 10, 33, 78, 88, 91, 98, 142, 143, 146, 191, 192, 193, 195–7, 202, 213 veracity 5, 6, 33, 45, 76, 95, 113, 117–19, 120, 123 virtual 142, 157, 158, 159, 201, 204 visualization 4, 6, 33, 34, 35, 38, 42, 44, 47, 59, 60, 61, 64, 65, 66, 68, 69, 103, 111, 113, 114, 120, 154, 213, 216 volunteer computing 218 volunteered geographic information 1, 46 Uber 26, 76, 156 urban: entrepreneurship 48; informatics 18, 47, 48, 114, 123; modelling 2, 33; science 4, 10, 18, 48, 47, 114 Web Services 7, 128, 129–131, 134, 135, 136, 138 wicked problems 20, 49, 122 wifi 53 World Council on City Data 90–1


pages: 265 words: 70,788

The Wide Lens: What Successful Innovators See That Others Miss by Ron Adner

ASML, barriers to entry, Bear Stearns, Blue Ocean Strategy, book value, call centre, Clayton Christensen, Ford Model T, inventory management, iterative process, Jeff Bezos, Lean Startup, M-Pesa, minimum viable product, mobile money, new economy, RAND corporation, RFID, smart grid, smart meter, SoftBank, spectrum auction, Steve Ballmer, Steve Jobs, Steven Levy, supply-chain management, Tim Cook: Apple, transaction costs, vertical integration

Who wouldn’t want to call the shots so they can win big every time? The leadership prism should help put those urges in perspective. The reality is, no one has pockets deep enough to finance every endeavor. Ask Microsoft in television set-top boxes, Intel in WiMAX mobile communication, and Wal-Mart in radio frequency identification (RFID) chips for consumer packaged goods. Ask every IT player in EHR: only when they chose to follow (and support) the government’s lead was real progress—and money—made. No one will stop you from spending a fortune on a leadership candidacy you can’t win. You can try to lead in every ecosystem where you play, or you can choose to be involved only in leading ecosystems.

See E-books; E-readers iPad media partners, 219–21 Pulmonary insulin. See Exubera; Inhalable insulin R Raikes, Jeff, 56 Rave, 142 Read, Ian, 111 Reidy, Carolyn, 90 Renault, and Better Place, 184–85, 238, 240 Research in Motion, 211 Resources, and co-innovation, 50 Retailers, role of, 55, 61 RFID (radio frequency ID) chips, 133 Ricci, Dr. Russell, 125 Rio PMP300, 142 Rocket e-reader, 88 S SaeHan MPMan, 140–44 failure, reasons for, 142–44 features, 142 Safaricom, mobile banking joint venture. See M-PESA Samsung, 40, 207 Scaling, pilots, difficulty of, 202–3 Semiconductor lithography, 150–53 functions of, 150–51 goals of, 152 innovation ecosystem for, 151–53 Sensory Science, 142 Sklyer, Dr.

See Value blueprints for leadership prism, 118 and minimum viable ecosystem (MVE) approach, 203–4 Vertical integration, pros/cons of, 8, 177 Veterans Health Administration (VHA), electronic health records (EHRs), 131 Virtual print fee (VPF), 72–73, 76 Vision and co-innovation, 50–51 value proposition as, 85 VISTA electronic record system, 131 Vodafone, mobile banking joint venture. See M-PESA W Wachter, Dr. Robert, 119 Wal-Mart, RFID chips, 133 Weed, Larry, 120 Whitney, William C., 165–66 Wide-lens perspective components of, 7, 158–59, 233 ecosystem and innovation. See entries under Ecosystem necessity of, 229–31 odds for success, creating with, 228–30 potential problems, productive approach to, 228 tool kit, 226–28 WiMAX, 133 * In 2010, at the behest of publishers, Amazon abandoned the fixed retail price model, allowing publishers to set e-book prices directly and receiving a 30 percent commission on each sale


pages: 238 words: 46

When Things Start to Think by Neil A. Gershenfeld

3D printing, Ada Lovelace, Bretton Woods, cellular automata, Charles Babbage, Claude Shannon: information theory, Computing Machinery and Intelligence, disinformation, Dynabook, Hedy Lamarr / George Antheil, I think there is a world market for maybe five computers, information security, invention of movable type, Iridium satellite, Isaac Newton, Jacquard loom, Johannes Kepler, John von Neumann, low earth orbit, means of production, new economy, Nick Leeson, packet switching, RFID, speech recognition, Stephen Hawking, Steve Jobs, telemarketer, the medium is the message, Turing machine, Turing test, Vannevar Bush, world market for maybe five computers

There's been an anthropomorphic tendency to assume that a computer's senses should match our own. We had trouble keeping the Fish boards on hand because they would be carried off around the Media Lab by students who wanted to build physical interfaces. More recently, the students have been acquiring as many radio-frequency identification (RFID) chips as they can get their hands on. These are tiny processors, SEEING THROUGH WINDOWS + 145 small enough even to be swallowed, that are powered by an external field that can also exchange data with them. They're currently used in niche applications, such as tracking laboratory animals, or in the key-chain tags that enable us to pump gas without using a credit card.

Europe is also leading the way with smart cards, computers the size of a credit card that are used much the same way, but that store electronic cash instead of requiring access to a remote computer. They were first used to eliminate the need for change to use pay phones, and are now spreading to all areas of electronic commerce. Finally, for tens of cents come the RFID chips that are used to tag things with an electronic identity. These are used in the badges that control access to a workplace, and in tracking laboratory animals. And that's where it stops. No one's been able to fabricate, package, and sell chips for less than about ten cents. While that might not appear to be a severe limit, think about what it leaves off: just about everything!

Robert, 179 optical pumping, 162 optical weak localization, 15 Orange County, California, 78 Orth, Maggie, 55 oscilloscope, 205 Oxford University, 158, 159 pagers, wristwatches as, 152 paper: book, 15 carbonless copy paper, 15-16 increasing consumption of, 102 radio, 18 INDEX reusable, 16-17 smart, 15-16 Papert, Seymour, 117, 138, 201-2 Paradiso, Joseph, 169, 180, 206-7 parallel computers, 68, 157 Parsons School of Design, 55 Pascal, Blaise, 131 Passages from the Life of a Philosopher (Babbage), 125-26 Passenger Sensing System, 170-71 patents, 181, 191 PEMS (Printed Electro-Mechanical Systems), 72-74 Penn & Teller, 169-70, 193 pennies, 82 Pentland, Sandy, 55 performance limit of a communications channel, 176 peripherals, computer, 52-53 Personal Area Network (PAN), 50-52 fictional predecessor of, 51-52 personal computers (PCs), 63-64, 151 invention of, 137-39 laptops, see laptop computers proliferation of, 63 Personal Digital Assistant, 151-52 Personal Fabricator, 64-75 physical gestures and logical meaning, Personal Area Network (PAN) and, 51 Piaget, Jean, 106, 137-38, 146 pianos, digital, 41 Picard, Roz, 54 Plymouth University, 158 Poe, Edgar Allan, 124 Poincare, Henri, 114 Popular Mechanics, 199 Post, Rehmi, 55 printers, 17-18, 102, 202 PEMS (Printed Electro-Mechanical Systems), 72-74 3D, 64-65, 70-71 two-dimensional output of, 4-5 privacy, 56-57, 100-1 Things That Think and, 207-10 + 223 probability theory, 120-21 productivity, 7 Pythagoras, 39 quantum computer, 157-63, 177 quantum mechanics, 130-31, 155, 157-59 radar, 171, 172 radio, 10, 99, 212 radio-frequency identification (RFID) chips, 144-45, 152 radio paper, 18 radio spectrum, 50 Raman, C. V., 39-40 Reeves, Byron, 54 Reformation, 95-97, 103 religion, 131, 133 research and development, 169-84 applied research, 172, 177, 178, 185 basic research, 172, 174, 177, 178, 185 government role, 171-74 new way to organize inquiry, 180-84 organization in the U.S., 171-74, 180 presumed pathway of, 177 Resnick, Mitchel, 68-70, 146-47, 206 responsibilities in using new technologies, 104 reusable paper, 16-17 Reynolds, Matt, 196, 197 rights: Bill of Things' Rights, 104 Bill of Things Users' Rights, 102 Rittmueller, Phil, 170, 180 Roosevelt, Franklin D., 171, 172 Santa Fe Institute, 118 Satellites, communications, 99-100 Science-The Endless Frontier, 172 search engines, 134 security versus privacy, 57 224 + semiconductor industry, 72 Sensormatic, 153 Shannon,C~ud~5, 128,176,188-90 shoe, computer in a, 50, 52, 102-3, 179 shoplifting tags, 153 Shor, Peter, 158, 159 Silicon Graphics, 140 Simon, Dan, 158 skepticism about technological advances, 122 Small, David, 22-23 Smalltalk, 138 smart cards, 81, 152 smart money, 77-91 cryptography and, 80-81 as digital information, 80 distinction between atom-dollars and bit-dollars, 83-85 freeing money from legacy as tangible asset, 79, 91 global currency market, 83 linking algorithms with money, 86-88 paying-as-you-go, 82 precedent for, 80 standards for, 88-91 smart name badges, 206 Smith, Joshua, 144, 170-71 sociology of science, 119 software, 7, 53, 156 belief in magic bullets, 121 CAD, 73 for children, 138 remarkable descriptions of, 108-9 upgrades, 98, 108-9 Soviet Union, 121-22 speech recognition, 140 spirit chair, 169-70, 179, 193, 202 spread-spectrum coding techniques, 165, 166 standards: computer, 88-90, 126 smart money, 88-91 Stanford Research Institute, 139 INDEX Stanford University, 54 Starner, Thad, 47, 57-58 Steane, Andy, 159 Steelcase, 202, 203, 204 Stradivarius, designing digital instrument to compete with, 32-33,39-42 Strickon, Joshua, 55 Sumitomo, 77 supercomputers, 151, 177, 199 surveillance, 57 Swatch Access watches, 152 Szilard, Leo, 176 technology: Bill of Things' Rights, 104 Bill of Things Users' Rights, 102 daily use of, 58 freedom of technological expression, 103 imposing on our lives, 95, 100-2 invisible and unobtrusive, 44, 200, 211 jargon, 107-22 mature, 10 musical instruments incorporating available, 38 wisdom in old technologies, 19, 24 telemarketing, 95, 101 telephones, 175 access to phone numbers, 100 invasion in our lives, 95, 101 satellite, 99-100 smart cards, 81 widespread dissemination of, 99 television, 10, 99, 202 high-definition, 6 Termen, Lev, 144 Tetzel, Johann, 96 "There's Plenty of Room at the Bottom," 161 thermodynamics, 175, 176 Things That Think, 202-7 privacy and, 207-10 stratification of society and, 210-11 INDEX 3D graphics interface, 141-42 3D printer, 64-65, 70-71 3001: The Final Odyssey (Clarke), 51 Toffoli, Tomaso, 132 transistors: invention of the, 175 study of, 179 Turing, Alan, 127-28, 131, 135, 166 Turing test, 128, 131, 133-34, 135 281, 210-11 Underkoffler, John, 145-46 U.S.


pages: 239 words: 56,531

The Secret War Between Downloading and Uploading: Tales of the Computer as Culture Machine by Peter Lunenfeld

Albert Einstein, Andrew Keen, anti-globalists, Apple II, Berlin Wall, British Empire, Brownian motion, Buckminster Fuller, Burning Man, business cycle, business logic, butterfly effect, Charles Babbage, computer age, Computing Machinery and Intelligence, creative destruction, crowdsourcing, cuban missile crisis, Dissolution of the Soviet Union, don't be evil, Douglas Engelbart, Douglas Engelbart, Dynabook, East Village, Edward Lorenz: Chaos theory, Fairchild Semiconductor, Fall of the Berlin Wall, folksonomy, Francis Fukuyama: the end of history, Frank Gehry, Free Software Foundation, Grace Hopper, gravity well, Guggenheim Bilbao, Herman Kahn, Honoré de Balzac, Howard Rheingold, Ian Bogost, invention of movable type, Isaac Newton, Ivan Sutherland, Jacquard loom, Jane Jacobs, Jeff Bezos, John Markoff, John von Neumann, Jon Ronson, Kickstarter, Mark Zuckerberg, Marshall McLuhan, Mercator projection, Metcalfe’s law, Mother of all demos, mutually assured destruction, Neal Stephenson, Nelson Mandela, Network effects, new economy, Norbert Wiener, PageRank, pattern recognition, peer-to-peer, planetary scale, plutocrats, post-materialism, Potemkin village, RFID, Richard Feynman, Richard Stallman, Robert Metcalfe, Robert X Cringely, Schrödinger's Cat, Search for Extraterrestrial Intelligence, seminal paper, SETI@home, Silicon Valley, Skype, social bookmarking, social software, spaced repetition, Steve Ballmer, Steve Jobs, Steve Wozniak, technological determinism, Ted Nelson, the built environment, the Cathedral and the Bazaar, The Death and Life of Great American Cities, the medium is the message, Thomas L Friedman, Turing machine, Turing test, urban planning, urban renewal, Vannevar Bush, walkable city, Watson beat the top human players on Jeopardy!, William Shockley: the traitorous eight

These WYMIWYM objects obviously figure informationalism in their production process, but as they themselves become linked into larger networks, through the incorporation of sensors, transmitters, and augmentation, they begin to attain autonomy. From mute objects and closed spaces, they become nodes in the network, aware of their place and time, and capable of communication from the minimal to the maximal. The incorporation of radio frequency identification devices (RFIDs) and microcontrollers into formerly quotidian objects enlivens them in an almost magical way. Like the animated brooms in Walt Disney’s Fantasia that come alive when Mickey Mouse accidentally enchants them as the Sorcerer’s Apprentice, there is a glamour, in its magical rather than fashionable sense, inherent in these new, augmented objects and spaces.

., 109, 109–110 PBS, 68 PDP minicomputer, 71 Peer-to-peer networks, 15, 54, 92, 116, 126 Perot, Ross, 145 Perpetual beta, 36 Personal digital assistants (PDAs), 17 Petrini, Carlo, 5–6 Photography, 15, 40–42, 46–47, 64, 109, 150, 176 Photoshop, 131 Picasso, Pablo, 93 210 INDEX Pico Swap Mart, 105 Pirate Bay, 92 Pixar, 167 Pizza Hut, 5 Plagiarism, 41 Play, 188n25 bespoke futures and, 110–111, 130–131 culture machine and, 143, 153, 160–163 gaming and, 15, 23, 33–34, 57, 67, 70–74, 72, 188n25 meaningfulness and, 32–34 modders and, 69–70 power and, 32–34 rejuveniles and, 67 running room and, 74–77 stickiness and, 13, 15, 32–34, 70–74 toggling and, 33–34, 43, 102, 197n30 tweaking and, xvi, 32–35, 185n22, 185n23 unimodernism and, 39, 53, 55, 62, 64, 67–77 video games and, 15, 23, 33–34, 57, 67, 72, 188n25 Web n.0 and, 85, 88 Play space, 74–77 Plug-in Drug, The (Winn), xii Plutocrats culture machine and, 144, 152–159, 163–166, 170 description of term, xv Hewlett and, 145, 157 Moore and, 156 Noyce and, 156 Packard and, 145, 157 profit and, xv Watsons and, 144, 153–157, 165–166 Plutopian meliorism, xvi, 127–129, 133, 137–138 Poetry, 14, 18–19, 136, 145 Politics African National Congress and, 113 211 Berlin Wall and, xvi, 85, 97, 99, 104 Communism and, 97–98, 103 copyright and, 88–93 Cuban Missile Crisis and, xi fantasies of, 104 New Economy and, 104 propaganda and, 31, 103, 124 scenario planning and, 111–119, 191n19, 192n20 Slow Food and, 5–7 Soviet Union and, xi, 31, 49–52, 59, 73, 85, 88, 97, 102–107, 146 Tiananmen Square and, 104 Velvet Revolution and, 104 Pong, 71 Popper, Karl, 107 Popular Mechanics magazine, 69 Pop-up ads, 23 Positivism, 10, 125 Postmodernism, 29–30, 39–41, 74, 79, 130, 135 PostScript World, 55–56, 102 Poststructuralism, 29–30 Power, 8 bespoke futures and, 98–103, 112– 116, 119–126, 129–130, 136–137 culture machine and, 143, 147, 150– 151, 155–156, 163, 166, 169, 175 meaningfulness and, 32–34 play and, 32–34 stickiness and, 13, 17, 22, 30–34 toggling and, 33–34, 43, 102, 197n30 tweaking and, xvi, 32–35, 185nn22,23 unimodernism and, 39, 49–50, 62, 71–75 Web n.0 and, 81–87, 90–95 PowerBook, 39 Pro bono work, 111 Production appropriation and, 28, 31, 35, 41 balance and, 13 collaborative, 30 INDEX Production (continued) continuous partial, 34 DIY movements and, 67–70 fan culture and, 28–32, 48 mashing and, 25, 54–55, 57, 74 mechanization and, 44–45 modders and, 69–70 open source, 36, 61, 69, 74–75, 91–92, 116, 121–126, 144, 170– 173, 177, 189n12 plagiarism and, 41 remixing and, 27, 35, 39, 53–54, 62–63, 70, 92–94, 129, 189n12 toggling and, 33–34, 43, 102, 197n30 tweaking and, xvi, 32–35, 185nn22,23 unfinish and, xvi, 34–37, 51, 67, 70, 76–79, 92, 127–129, 136 WYMIWYM (What You Model Is What You Manufacture) and, 64–67, 74, 131 Propaganda, 31, 103, 124 Prosumers, 120–121 Psychology culture machine and, 151, 161 Gestalt, 42–43 Licklider and, 151 propaganda and, 31, 103, 124 scenario planning and, 111–119, 191n19, 192n20 stickiness and, 16, 21–22 unimodernism and, 42–44, 56 Public domain, 91 Publishing, 31, 190n8 bespoke future and, 109–110, 112 culture machine and, 146, 148–149, 168 DIY movement and, 67–69 Gutenberg press and, 11, 137–138 unimodernism and, 55–65, 68 Puccini, Giacomo, 61 Punk aesthetic, 46, 67–68, 87, 110 Quantum theory, 148 Radio, 8 Radio frequency identification devices (RFIDs), 65 Radiohead, 39 Ramayana, 28 Rand, Paul, 43 Raymond, Eric, 172 Raytheon, 149 Rear Window (film), 44 Relativity, 49–50, 186n4 Religion, xi, 1, 13, 76, 130–135, 138 Remixing, 27, 94, 129, 189n12 appropriation and, 28, 31, 35, 41 Creative Commons and, 92 Moulin Rouge and, 60–63 unimodernism and, 39, 53–54, 53–55, 62–63, 70 Renaissance, 60 Rent (Larson), 61 Reperceiving, 112–113 Reuters Spectracolor Board, 9 Revivalism, 60 Reyner Banham Loves Los Angeles (BBC documentary), 10 Rheingold, Howard, 145 Rick’s Café, 90 Roberts, Alwyn “Lord Kitchener,” 25–27 Robot butlers, xiv Rockefeller, John D., 166 Rolling Stone magazine, 67 Romanticism, 103 Romeo and Juliet (hip-hop version), 61 Roosevelt, Franklin D., 148 Rope (film), 44 Roux, A., 11 Royal Dutch Shell, 112, 112–113 Royal Library of Alexandria, 89 R-PR (Really Public Relations), xvi, 123–127 RSS feeds, xvii Rumsfeld, Donald, 99 Running room, 74–77 Run time, 57 212 INDEX environmental perception and, 16 memes and, 19, 53–54, 76, 87, 91, 98, 113, 143–144, 149–150, 156–162, 165–170, 178, 194n1 mimicry and, xvii MP3s and, 27 participation and, 15–17 stickiness and, 15–19, 27, 32, 35 unimodernism and, 39, 49, 53–54, 57, 71–76 Sinatra, Frank, 63 Skype, 15 Skyscrapers, xiv Slow movements, 5–7, 181n7 Slurpees, 4 “Smells Like Teen Spirit” (Nirvana), 62 Smith & Hawken, 113 Snakes on a Plane (film), 30 Snow White (Disney film), 20 Social issues advertisement and, 23, 52, 57, 59, 107, 175–177, 184nn12,15 Aquarians and, xv, 144, 152, 157, 159–169 atomic age and, xi (see also Atomic age) Berlin Wall and, 85, 97, 99, 104 bespoke futures and, xvi, 97–139 blogosphere and, xvii, 30, 34, 49, 68, 80, 92–93, 101, 175, 177, 181n7 capitalism and, 4, 13, 66, 75, 90, 97–100, 103–105 capitulationism and, 7, 24, 182n1 cell phones and, xiii, 23, 42, 53, 56, 76, 101 Communism and, 97–98, 103 computers and, xvi, 5, 15–19 (see also Computers) Cuban Missile Crisis and, xi dangers of overabundance and, 7–10 desk jobs and, 3 89/11 and, xvi, 97, 100–102, 105, 130 Enlightenment and, xvi, 129–139 Sacred texts, 28 Saint Laurent, Yves, 60 Saks Fifth Avenue, 31 Samizdat, 59 Scenario planning bespoke futures and, 111–119, 191n19, 192n20 chaos theory and, 117–119 crafting of, 113–116 Ogilvy and, 113–114 Schwartz and, 113–114 Scènes de la vie Bohème (Murger), 61 Schindler, Rudolph, 45 Schrödinger, Erwin, 49 Schwartz, Peter, 113–115, 119 Scott, Ridley, 107 Scratching, 53 Searchers, 167, 177–178 Brin and, 144, 174–176 description of term, xv–xvi Page and, 144, 174–176 Sears, 103–105 September 11, 2001, xvi–xvii, 99–101, 130 SETI@home, 122 Sex, 7, 19, 88, 129–130, 167 Shakespeare, William, 28, 44 Shannon, Claude, 148 Shockley, William, 156 Shockley Semiconductor Laboratory, 156 Silicon Valley, 149, 161, 164 Silly Symphonies (Disney film), 88 Simon, John, Jr., 39 Simulation, xvi, 2, 11 affordances and, 16–17 bespoke futures and, 98, 121, 124, 126–127 buttons/knobs and, 16 communication devices and, 15–16 culture machine and, 143–144, 147– 152, 156–160, 166–168, 175–178 downloading and, 143, 168 emulation and, 183n3 213 INDEX Social issues (continued) figure/ground and, xvi, 42–43, 46, 102 folksonomies and, 80–81 hackers and, 22–23, 54, 67, 69, 162, 170–173 Holocaust and, 107 Hosts and, xv, 144, 167, 175 hypercontexts and, xvi, 7, 48, 76–77 information overload and, 22, 149 MaSAI and, xvi, 112, 120–123, 127, 193nn32 meaningfulness and, xvi, 14, 17, 20, 23–29, 42, 67, 77, 79, 119, 123, 128–129, 133, 173 narrative and, xv, 2, 7–8, 58–59, 67, 71, 76, 108, 110, 130–132, 143– 145, 174, 178, 180n4, 188n25, 193n34 personal grounding and, xiv–xv play and, xvi, 13, 15, 32–34, 39, 53, 55, 62, 64, 67–77, 85, 88, 110–111, 130–131, 143, 153, 160–163, 185n22, 188n25 Plutocrats and, xv, 144, 152–159, 163–166, 170 plutopian meliorism and, xvi, 127–129, 133, 137–138 power and, xvi, 8, 13, 17, 22 (see also Power) relationship with data and, 32 religion and, xi, 1, 13, 76, 130–135, 138 R-PR (Really Public Relations) and, xvi, 123–127 Searchers and, xv–xvi, 144, 167, 174–178 suburbs and, 3, 8 television and, xii (see also Television) terrorism and, 99–101, 130–131, 134, 137 unfinish and, xvi, 34–37, 51, 67, 70, 76–79, 92, 127–129, 136 urban planning and, 84–86 utopia and, 36, 73, 97, 101, 104, 108, 110, 120, 127–129, 138 wants vs. needs and, 13, 37, 57 wicked problems and, 158 World War I era and, 21, 107, 123, 146, 190n1 World War II era and, xi, 18, 25, 32, 47, 73, 107–108, 144–150, 157, 170 Socialists, 102–105 Software platforms, 15, 164, 170 Sontag, Susan, 135 Sopranos, The (TV show), 7 Soundscapes, 53–55 Soviet Union, 31, 85, 88, 146 Berlin Wall and, 85, 97, 99, 104 Cuban Missile Crisis and, xi Exhibition of the Achievement of the Soviet People’s Economy (VDNX) and, 102–105 fall of, 104 gulags of, 107 samizdat and, 59 unimodernism and, 49–52, 73 Space Invaders, 71 Spacewar!

, 71 Spielraum (play space), 75 Spin, 124 Stallman, Richard, 170–171 Stanford, 144, 149, 158–159, 162, 175 Stardust@home, 122–123 Stardust Interstellar Dust Collector (SIDC), 193n33 Sterling, Bruce, 101–102 Stewart, Jimmy, 44 Stickiness defining, 28, 184n15 downloading and, 13–17, 20–23, 27–29, 184n15 duration and, 28 fan culture and, 28–32, 48, 49, 87 gaming and, 70–74 214 INDEX Systems theory, 151 Stickiness (continued) information and, 22–23, 32–35 markets and, 13, 16, 24, 30–33, 37 modernism and, 36 networks and, 16–17, 22, 24, 29–36 obsessiveness and, 28 play and, 32–34, 70–74 power and, 32–34 simulation and, 15–19, 27, 32, 35 Teflon objects and, 28–32, 49, 87 toggling and, 33–34, 43, 102, 197n30 tweaking and, xvi, 32–35, 185nn22,23 unfinish and, 34–37, 76–77 unimodernism and, 70–74 uploading and, 13–17, 20, 23–24, 27–29 Web n.0 and, 79, 87 Stock options, 98 Stone, Linda, 34 Storage, 47, 60, 153, 196n17 Strachey, Christopher, 18–19 Strachey, Lytton, 19 Strange attractors, xvi, 117–120, 192n27 Sturges, Preston, 88 Stutzman, Fred, 22 Stewart, Martha, 49 Suburbs, 3, 8 Suicide bombers, 100–101 Sullivan’s Travels (Sturges), 88 Sun Microsystems, 172, 176 Superflat art, xi, 49 Supersizing, 3–4 Suprematism, 117 Surfing, 20, 80, 180n2 Surrealism, 31 Sutherland, Ivan, 160–161 Swiss Army Knife theory, 17 Symbiosis, 151–152 Synthetism, 117 Systems of Survival: A Dialogue on the Moral Foundations of Commerce and Politics (Jacobs), 85–86 Take-home consumption, 3 Tarantino, Quentin, 49 Taxonomies, 80–83 Technology analog, 18, 53, 150 anticipated, 108–110 bespoke futures and, 98–104, 107–113, 116, 119, 125–127, 131– 133, 136–139 broadband, 9, 57 cell phones, xiii, xvii, 17, 23, 42, 53, 56, 76, 101 commercial networks and, 4–5 compact discs (CDs), 2, 48, 53 computer mouse, 158–159 culture machine and, 143–163, 173–174 cyberpunk maxim on, 87 determinism and, 131–132 difference engine, 149 digital video discs (DVDs), 2, 7–8, 15, 58 dot-com bubble and, 79, 174 Dynabook, 161–162, 196n17 Ethernet, 161 Exhibition of the Achievement of the Soviet People’s Economy (VDNX) and, 102–105 film cameras, 15 Gutenberg press, 11, 137–138 hierarchical structures and, 123, 155, 175–176, 189n8 historical perspective on computer, 143–178 hypertext and, 158 information overload and, 22, 149 Jacquard loom, 11 mechanical calculator, 149 Metcalfe’s corollary and, 86–87 microfilm, 149–150 215 INDEX Technology (continued) Moore’s law and, 156, 195n13 New Economy and, 97, 99, 104, 131, 138, 144–145, 190n3 personal digital assistants (PDAs), 17 Photoshop, 131 progress and, 132 RFID, 65 secular culture and, 133–139 storage, 47, 60, 153, 196n17 technofabulism and, 99–100 teleconferencing, 158–159 3–D tracking, 39 tweaking and, 32–35, 185nn22,23 videocassette recorders (VCRs), 15, 23 wants vs. needs and, 4 woven books, 10–11 Teflon objects, 28–32, 49, 87 Teleconferencing, 158–159 Television as defining Western culture, 2 aversion to, xii bespoke futures and, 101, 108, 124, 127–129, 133–137 delivery methods for, 2 dominance of, xii, 2–10 downloading and, 2 as drug, xii, 7–9 general audiences and, 8–9 habits of mind and, 9–10 Internet, 9 junk culture and, 5–10 Kennedy and, xi macro, 56–60 marketing fear and, xvii overusage of, 7–9 as pedagogical boon, 14 quality shows and, 7 rejuveniles and, 67 Slow Food and, 6–7 spin-offs and, 48 as time filler, 67 U.S. ownership data on, 180n2 Telnet, 169 “Ten Tips for Successful Scenarios” (Schwartz and Ogilvy), 113 Terrorism, 99–101, 130–131, 134, 137 Textiles, 11 Text-messaging, 82 3COM, 86 3–D tracking, 39 Tiananmen Square, 104 Timecode (Figgis), 58 Time magazine, xii, 145 Time Warner, 63, 91 Tin Pan Alley, 28, 63 Tintin, 90 Toggling, xvi, 33–34, 43, 102, 197n30 Tools for Thought (Rheingold), 145 Torvalds, Linus, 144, 167–173 Tracy, Dick, 108 Traitorous Eight, 156 Trilling, Lionel, 79 Turing, Alan, 17–20, 52, 148 Turing Award, 17, 156 Tweaking, xvi, 32–35, 185nn22,23 20,000 Leagues beneath the Sea (Verne), 108 Twins paradox, 49–50 Twitter, 34, 180n2 2001 (film), 107 Ubiquity, xiii bespoke futures and, 125, 128 culture machine and, 144, 166, 177–178 folksonomies and, 80–81 Freedom software and, 22–23 hotspots and, xiv information overload and, 22, 149 isotypes and, 125 stickiness and, 22–23 unimodernism and, 39, 53, 57–59, 62, 74 216 INDEX simulation and, 39, 49, 53–54, 57, 71–76 soundscape and, 53–55 stickiness and, 70–74 twins paradox and, 49–50 unconscious and, 43–44 unfinish and, 51, 67, 70, 76–78 unimedia and, 39–40 uploading and, 42, 49, 53, 57, 67, 77 WYMIWYM (What You Model Is What You Manufacture) and, 64–67 WYSIWYG (What You See Is What You Get) and, 55–56, 64–65 United States Cuban Missile Crisis and, xi September 11, 2001 and, 99–101, 130 television’s dominance and, 2, 180n2 Universal Resource Locator (URL), 168–169 Universal Turing Machine, 18–19 University of Pennsylvania, 148 University of Utah, 160 UNIX, 170–171 “Untitled (After Walker Evans)” (Levine), 41 Uploading, xiii–xiv, 180nn1,2 activity levels and, 5 animal kingdom and, 1 bespoke futures and, 97, 120–123, 128–129, 132 commercial networks and, 4–5 communication devices and, 15–16 conversation and, 13 cultural hierarchy of, 1–2 culture machine and, 143, 168, 173, 175 disproportionate amount of to downloading, 13 humans and, 1–2 information and, 1, 4, 11 meaningfulness and, xvi, 29 stickiness and, 13–17, 20, 23–24, 27–29 Ubiquity (continued) Web n.0 and, 79–95 Ublopia, 101 Ulysses (Joyce), 94–95 Uncertainty principle, 37 Unfinish, xvi bespoke futures and, 127–129, 136 continuous partical attention and, 34 perpetual beta and, 36 stickiness and, 34–37, 76–77 unimodernism and, 51, 67, 70, 76–78 Web n.0 and, 79, 92 Unimedia, 39–40 Unimodernism Burroughs and, 40–42 common sense and, 44–45 DIY movements and, 67–70 downloading and, 41–42, 49, 54–57, 66–67, 76–77 figure/ground and, 42–43, 46 gaming and, 70–74 hypertextuality and, 51–53 images and, 55–56 information and, 45–49, 55, 60, 65–66, 74 Krikalev and, 50–51 macrotelevision and, 56–60 markets and, 45, 48, 58–59, 71, 75 mashing and, 25, 54–55, 57, 74 mechanization and, 44–45 microcinema and, 56–60 modders and, 69–70 Moulin Rouge and, 60–63 narrative and, 58–59, 67, 71, 76 networks and, 39, 47–48, 54–57, 60, 64–65, 68–69, 73–74 participation and, 54, 66–67, 74–77 perception pops and, 43–49 play and, 67–77 postmodernism and, 39–41, 74 remixing and, 39, 53–54, 62–63, 70 running room and, 74–77 217 INDEX Uploading (continued) unimodernism and, 42, 49, 53, 57, 67, 77 Web n.0 and, 79–83, 86–87, 91 Urban planning, 84–86 U.S.


pages: 350 words: 107,834

Halting State by Charles Stross

augmented reality, book value, Boris Johnson, call centre, forensic accounting, game design, Google Earth, hiring and firing, illegal immigration, impulse control, indoor plumbing, Intergovernmental Panel on Climate Change (IPCC), invention of the steam engine, Ken Thompson, lifelogging, Necker cube, no-fly zone, operational security, Potemkin village, RFID, Schrödinger's Cat, Vernor Vinge, zero day

Now if only you had a life, too, eh? The office opens its doors and swallows you off the street. Once upon a time it started life as an unassuming Georgian town house; but today, the garden is overgrown with Foster Associates geodesics, the roof is covered in solar tiles, and the door scanned your RFIDs and worked out who you were while you were still halfway up the street. The HQ of Dietrich-Brunner Associates is probably worth more than some Third World countries. You hole up in the ladies’ for a minute to freshen up, then it’s up the lift to the third floor, where the junior associates swelter under the low eaves.

Meanwhile, over here we have a patch on the work-top where you’ll see there’s a faint outline—matches a microwave oven. Why the hell anyone would leave the electronics in the living room but take the microwave oven is, well, your guess is as good as mine. But that’s what they did: They scrubbed the fridge out and lifted the microwave. Maybe they’d been using it for toasting RFID tags or something. But the whole thing’s been thoroughly sanitized.” “Sanitized?” Verity explodes. “Are you telling us you can’t get anything?” “Yes, I am—at least, so far.” Tweed nods like a dashboard ornament. He starts counting off fingers. “There are no human traces in the place that haven’t been thoroughly cleaned or scrambled.

Elaine is wandering along behind you with the slightly stunned expression of a Mormon missionary at a Pagan Federation summer camp—it obviously looks like a target-rich environment—but the set of co-ordinates attached to Wu Chen’s badge (which, like all the attendee badges at this shindig is bugged with seven flavours of RFID—you checked your privacy at the door when you filled out that marketing questionnaire, unless you remembered to pack a tinfoil wallet) is moving slowly through the huge auditorium at the back of the building. You lock Wu Chen into the map widget hovering over to the left, then simultaneously log all your Zone IDs on simultaneously, collapsing their various shards into a single mish-mash view.


Programming Android by Zigurd Mednieks, Laird Dornin, G. Blake Meike, Masumi Nakamura

anti-pattern, business process, conceptual framework, create, read, update, delete, database schema, Debian, domain-specific language, en.wikipedia.org, fault tolerance, general purpose technology, Google Earth, interchangeable parts, iterative process, loose coupling, MVC pattern, revision control, RFID, SQL injection, systems thinking, web application

It is a standard that extends the Radio Frequency Identification (RFID) standard by combining the interface of a smartcard and a reader into a single device. This standard is primarily built for mobile phone use, and thus is attracting a lot of attention among vendors that are interested in contactless data transmission (such as credit card sales). The standard enables NFC to be used in three specific ways: Card emulation The device is a contactless card (and thus can be read by other readers). Reader mode The device can read RFID tags. P2P mode Two devices can communicate back and forth and exchange data.

To use NFC functionality in your application, you need to declare the following permission in your manifest: <uses-permission android:name="android.permission.NFC" /> To restrict the installation of the application to devices that can use NFC, add the following to your manifest as well: <uses-feature android:name="android.hardware.nfc" /> Reading a Tag Reader mode is for receiving notices when an RFID/NFC tag is scanned. In Android 2.3 (API level 9), the only means to do this is to create an Activity that listens for the android.nfc.action.TAG_DISCOVERED intent, which is broadcast when a tag is read. Android 2.3.3 (API level 10) offers a more comprehensive means to receive this notice, following the process shown in Figure 16-2.

as signing certificates, Creating a self-signed certificate private keyword, Access Modifiers and Encapsulation, Getters and setters projects, Making an Android Project, Making an Android Project, Making an Android Project, The Android Manifest Editor, Projects, Organizing Java Source about, Projects, Organizing Java Source additional information, Making an Android Project creating, Making an Android Project, Making an Android Project manifest files, The Android Manifest Editor protected keyword, Access Modifiers and Encapsulation proximity sensors, Other Sensors public key encryption, Public Key Encryption and Cryptographic Signing, Public Key Encryption and Cryptographic Signing public keyword, Access Modifiers and Encapsulation, Getters and setters publishing, Uploading Applications in the Market, Concurrency in Android Android applications, Uploading Applications in the Market references, Concurrency in Android Q QEMU, QEMU queries, Additional Database Concepts, Database Queries and Reading Data from the Database, Using the query method, A Networked Query Method, YouTubeHandler, Account Contacts account contacts, Account Contacts compound, Additional Database Concepts MJAndroid application example, Database Queries and Reading Data from the Database, Using the query method networked method, A Networked Query Method, YouTubeHandler quotation marks ("), Example Database Manipulation Using sqlite3 R R class, Resources Radio Frequency Identification, Near Field Communication (NFC) (see RFID) raw directory, Resources RCP (Rich Client Platform), The Eclipse Integrated Development Environment (IDE) RDBMSs (relational database management systems), Relational Database Overview REAL type (SQLite), SQLite types recording multimedia, Recording Audio and Video, Audio Recording, AudioRecorder audio recording, Video Recording audio methods, Audio Recording, AudioRecorder audio recording life cycle states, Recording Audio and Video video methods, Video Recording RECORD_AUDIO permission, Recording Audio and Video RECORD_VIDEO permission, Recording Audio and Video refactoring, Refactoring, Organizing Java Source relational database management systems (RDBMSs), Relational Database Overview relational databases, Relational Database Overview, Database constraints, Database constraints, Additional Database Concepts, Additional Database Concepts, Additional Database Concepts, Additional Database Concepts, Database Transactions, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3, The Android Database Classes, Database Design for Android Applications, Basic Structure of the SimpleVideoDbHelper Class, Basic Structure of the SimpleVideoDbHelper Class, Basic Structure of the SimpleVideoDbHelper Class, Using the Database API: MJAndroid, Database Queries and Reading Data from the Database, Using the execSQL method, The simple video database, Declaring Column Specification Strings, Creating the Database about, Relational Database Overview additional information, Additional Database Concepts compound queries, Additional Database Concepts database constraints, Database constraints, Database constraints, Declaring Column Specification Strings database manipulation example, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3 database transactions, Database Transactions design for Android applications, Database Design for Android Applications, Basic Structure of the SimpleVideoDbHelper Class inner joins, Additional Database Concepts MJAndroid application example, Using the Database API: MJAndroid, Database Queries and Reading Data from the Database, Using the execSQL method SimpleFinchVideoContentProvider example, The simple video database SimpleVideoDbHelper class example, Basic Structure of the SimpleVideoDbHelper Class, Basic Structure of the SimpleVideoDbHelper Class SQLite supported classes, The Android Database Classes triggers, Additional Database Concepts YouTube video example, Creating the Database RelativeLayout class, Creating a Fragment, Layout remote procedure calls, AIDL and, Java Serialization Renderer interface, OpenGL Graphics res directory, Resources, Organizing Java Source resource qualifiers, Resource Qualifiers and Screen Sizes Resources.getDrawable method, Bitmaps ResponseHandler interface, RESTfulContentProvider: A REST helper, RESTfulContentProvider: A REST helper, UriRequestTask about, RESTfulContentProvider: A REST helper handleResponse method, RESTfulContentProvider: A REST helper, UriRequestTask REST (Representational State Transfer), Content Providers, Content Providers, Content Providers, Content Providers, Content Providers, Content Providers, Exploring Content Providers, Developing RESTful Android Applications, A “Network MVC”, Summary of Benefits, Constants and Initialization, Creating the Database, A Networked Query Method, YouTubeHandler, insert and ResponseHandlers, insert and ResponseHandlers, File Management: Storing Thumbnails about, Content Providers additional information, Content Providers constants and initialization, Constants and Initialization content providers and, Exploring Content Providers creating database, Creating the Database DELETE operation, Content Providers developing Android applications, Developing RESTful Android Applications file management, File Management: Storing Thumbnails GET operation, Content Providers insert and ResponseHandlers, insert and ResponseHandlers, insert and ResponseHandlers network MVC and, A “Network MVC”, Summary of Benefits networked query method, A Networked Query Method, YouTubeHandler POST operation, Content Providers UPDATE operation, Content Providers RFID (Radio Frequency Identification), Near Field Communication (NFC), Reading a Tag, Reading a Tag about, Near Field Communication (NFC) reading tags, Reading a Tag, Reading a Tag Rich Client Platform (RCP), The Eclipse Integrated Development Environment (IDE) RotateAnimation class, Animation, Transition animation RotateDrawable class, Drawables rotation vector, Rotation vector Runnable interface, Advanced Wiring: Focus and Threading runtime environment, The Android Application Runtime Environment, Sandboxing: Processes and Users, The application runtime, The Android Libraries, The Android Libraries about, The Android Application Runtime Environment, Sandboxing: Processes and Users, The application runtime Android libraries and, The Android Libraries, The Android Libraries RuntimeException, Exceptions, Advanced Wiring: Focus and Threading S sandboxing, Sandboxing: Processes and Users, Self-signed certificates for Android software ScaleAnimation class, Animation, Transition animation ScaleDrawable class, Drawables ScheduledThreadPoolExecutor class, The Android Libraries scope, Scope, Java Packages, Access Modifiers and Encapsulation about, Scope access modifiers and encapsulation, Access Modifiers and Encapsulation Java packages and, Java Packages SDK and AVD Manager, Adding Build Targets to the SDK, Adding Build Targets to the SDK, Making an Android Virtual Device (AVD), Android Virtual Devices, The SDK and AVD Manager, android, Testing for Screen Size Compatibility, Eclipse and Android about, Adding Build Targets to the SDK, The SDK and AVD Manager configuring AVDs, Android Virtual Devices creating AVDs, Making an Android Virtual Device (AVD) invoking, Adding Build Targets to the SDK, android, Eclipse and Android screen configurations, Testing for Screen Size Compatibility search application example, Step 1: Our UI Collects User Input, Step 2: Our Controller Listens for Events, Step 4: Implementing the RESTful Request, File Management: Storing Thumbnails controller collecting user input, Step 2: Our Controller Listens for Events implementing RESTful request, Step 4: Implementing the RESTful Request, File Management: Storing Thumbnails UI collecting user input, Step 1: Our UI Collects User Input security, Sandboxing: Processes and Users, Self-signed certificates for Android software additional information, Sandboxing: Processes and Users self-signed certificates and, Self-signed certificates for Android software SELECT statement (SQL), SQL Data Manipulation Commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands, Extending ContentProvider about, SQL Data Manipulation Commands ContentProvider class and, Extending ContentProvider FROM clause, SQL Data Manipulation Commands GROUP BY clause, SQL Data Manipulation Commands HAVING clause, SQL Data Manipulation Commands LIMIT clause, SQL Data Manipulation Commands ORDER BY clause, SQL Data Manipulation Commands WHERE clause, SQL Data Manipulation Commands self-signed certificates, Self-signed certificates for Android software, Creating a self-signed certificate, Using a self-signed certificate to sign an application, Using a self-signed certificate to sign an application about, Self-signed certificates for Android software creating, Creating a self-signed certificate signing applications, Using a self-signed certificate to sign an application, Using a self-signed certificate to sign an application semicolon (;), SQL Data Definition Commands Sensor.getMaximumRange method, Other Sensors SensorEvent class, Sensors SensorEventListener interface, Sensors, Sensors onAccuracyChanged method, Sensors onSensorChanged method, Sensors SensorManager class, Sensors, Sensors, Sensors, Sensors, Sensors, Sensors, Sensors about, Sensors getDefaultSensor method, Sensors getSensorList method, Sensors SENSOR_DELAY_FASTEST constant, Sensors SENSOR_DELAY_GAME constant, Sensors SENSOR_DELAY_NORMAL constant, Sensors SENSOR_DELAY_UI constant, Sensors sensors, Sensors, Sensors, Position, Linear acceleration, Accelerometer, Gyroscope, Rotation vector, Linear acceleration, Gravity, Other Sensors, Other Sensors, Other Sensors, Other Sensors, Other Sensors about, Sensors, Sensors accelerometers, Accelerometer gravity, Gravity gyroscopes, Gyroscope light, Other Sensors linear acceleration, Linear acceleration magnetic, Other Sensors phone coordinate systems, Position, Linear acceleration pressure, Other Sensors proximity, Other Sensors rotation vector, Rotation vector temperature, Other Sensors Serial Port Protocol (SPP), Bluetooth and related I/O classes Serializable interface, Java Serialization, Java Serialization, Classes That Support Serialization serialization, Serialization, Serialization, Java Serialization, Parcelable, Parcelable, Classes That Support Serialization, Serialization and the Application Life Cycle, Saving and restoring instance state application life cycle and, Serialization and the Application Life Cycle classes supporting, Classes That Support Serialization, Saving and restoring instance state common uses for, Serialization defined, Serialization Java support, Java Serialization Parcelable interface, Parcelable, Parcelable Service class, Other Android Components, Service, Static Application Resources and Context, Application Manifests, The Activity Class and Well-Behaved Applications, Developing RESTful Android Applications about, Other Android Components, Service Context class and, Static Application Resources and Context manifest files and, Application Manifests RESTful applications and, Developing RESTful Android Applications well-behaved applications and, The Activity Class and Well-Behaved Applications Set interface, Collection interface types, The Android Libraries setClickable attribute, MapView and MyLocationOverlay Initialization setEnabled attribute, MapView and MyLocationOverlay Initialization setSatellite attribute, MapView and MyLocationOverlay Initialization setStreetView attribute, MapView and MyLocationOverlay Initialization setter methods, Getters and setters setTraffic attribute, MapView and MyLocationOverlay Initialization Shader class, Shadows, Gradients, and Filters shaders (drawing graphics), Shadows, Gradients, and Filters ShadowLayer class, Shadows, Gradients, and Filters shadows (drawing graphics), Shadows, Gradients, and Filters short type, Primitive Types, Conventions on the Native Method Side Show View dialog, Visualizing the Activity Life Cycle signing, application, Application Signing (see application signing) SimpleCursorAdapter class, Account Contacts, Account Contacts SimpleFinchVideoContentProvider example, Browsing Video with Finch, The simple video database, Structure of the simple version of the code, Defining a Provider Public API, Defining the CONTENT_URI, Creating the Column Names, Declaring Column Specification Strings, Declaring Column Specification Strings, Extending ContentProvider, Extending ContentProvider, A Complete Content Provider: The SimpleFinchVideoContentProvider Code, The SimpleFinchVideoContentProvider Class and Instance Variables, The SimpleFinchVideoContentProvider Class and Instance Variables, Implementing the onCreate Method, Implementing the getType Method, The query method, The query method, The insert method, The update method, The delete method, Determining How Often to Notify Observers about, Browsing Video with Finch, A Complete Content Provider: The SimpleFinchVideoContentProvider Code column names, Creating the Column Names column specification strings, Declaring Column Specification Strings, Declaring Column Specification Strings creating database, The simple video database defining provider public API, Defining a Provider Public API, Defining the CONTENT_URI extending ContentProvider class, Extending ContentProvider, Extending ContentProvider implementing delete method, The delete method implementing getType method, Implementing the getType Method implementing insert method, The insert method implementing onCreate method, Implementing the onCreate Method implementing query method, The query method, The query method implementing update method, The update method instance variables and, The SimpleFinchVideoContentProvider Class and Instance Variables, The SimpleFinchVideoContentProvider Class and Instance Variables notifying observers, Determining How Often to Notify Observers source code structure, Structure of the simple version of the code SimpleVideoDbHelper class (example), Basic Structure of the SimpleVideoDbHelper Class, Basic Structure of the SimpleVideoDbHelper Class skeleton applications, The Android Framework, Visualizing the Activity Life Cycle, Minor life cycle methods of the Activity class, Visualizing the Fragment Life Cycle, Visualizing the Fragment Life Cycle, The Activity Class and Well-Behaved Applications, The Activity Life Cycle and the User Experience, Life Cycle Methods of the Application Class, Life Cycle Methods of the Application Class, A Flowing and Intuitive User Experience Across Activities, Modifying task behavior with intent flags, Understanding Content Providers, Declaring Column Specification Strings, Writing and Integrating a Content Provider, File Management and Binary Data, File Management and Binary Data, Android MVC and Content Observation, Android MVC and Content Observation, A Complete Content Provider: The SimpleFinchVideoContentProvider Code, Determining How Often to Notify Observers, Declaring Your Content Provider, Exploring Content Providers, Developing RESTful Android Applications, A “Network MVC”, Summary of Benefits, Code Example: Dynamically Listing and Caching YouTube Video Content, File Management: Storing Thumbnails about, The Android Framework Activity class life cycles, Visualizing the Activity Life Cycle, Minor life cycle methods of the Activity class Application class life cycles, Life Cycle Methods of the Application Class, Life Cycle Methods of the Application Class binary data, File Management and Binary Data building content providers, Understanding Content Providers, Declaring Column Specification Strings content providers and REST, Exploring Content Providers declaring content providers, Declaring Your Content Provider developing RESTful, Developing RESTful Android Applications file management, File Management and Binary Data flowing/intuitive user experience, A Flowing and Intuitive User Experience Across Activities, Modifying task behavior with intent flags Fragment class life cycles, Visualizing the Fragment Life Cycle, Visualizing the Fragment Life Cycle MVC and content observation, Android MVC and Content Observation, Android MVC and Content Observation network MVC and, A “Network MVC”, Summary of Benefits SimpleFinchVideoContentProvider example, A Complete Content Provider: The SimpleFinchVideoContentProvider Code, Determining How Often to Notify Observers well-behaved, The Activity Class and Well-Behaved Applications, The Activity Life Cycle and the User Experience writing/integrating content providers, Writing and Integrating a Content Provider YouTube video example, Code Example: Dynamically Listing and Caching YouTube Video Content, File Management: Storing Thumbnails SmallTalk language, Eclipse Concepts and Terminology social networking, Android and Social Networking software development, Modular Programming in Java (see application development) SPP (Serial Port Protocol), Bluetooth and related I/O classes SQL (Standard Query Language), Relational Database Overview, The SQL Language, The SQL Language, SQL Data Definition Commands, Database constraints, Database constraints, Database constraints, SQL Data Manipulation Commands, SQL Data Manipulation Commands, SQL and the Database-Centric Data Model for Android Applications about, Relational Database Overview additional information, The SQL Language Android applications and, The SQL Language data definition commands, SQL Data Definition Commands, Database constraints data manipulation commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands database constraints, Database constraints, Database constraints MVC model and, SQL and the Database-Centric Data Model for Android Applications SQLite database system, sqlite3, Serialization, SQLite, SQLite, The SQL Language, The SQL Language, SQLite types, Database constraints, Database constraints, Additional Database Concepts, Database Transactions, The Android Database Classes, Declaring Column Specification Strings about, SQLite, The SQL Language additional information, SQLite, The SQL Language compound queries, Additional Database Concepts data types supported, SQLite types database classes, The Android Database Classes database constraints, Database constraints, Database constraints, Declaring Column Specification Strings database transactions, Database Transactions persistence and, Serialization sqlite3 command, sqlite3 sqlite3 command, sqlite3, SQL Data Definition Commands, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3 about, sqlite3 balancing quotes, Example Database Manipulation Using sqlite3 database manipulation example, Example Database Manipulation Using sqlite3, Example Database Manipulation Using sqlite3 percent sign in, Example Database Manipulation Using sqlite3 period in, Example Database Manipulation Using sqlite3 pipe character in, Example Database Manipulation Using sqlite3 semicolon in, SQL Data Definition Commands SQLiteDatabase class, The Android Database Classes, Database Queries and Reading Data from the Database, Database Queries and Reading Data from the Database, Using the query method, Using the query method, Modifying the Database, Modifying the Database, Modifying the Database, Modifying the Database, Modifying the Database, Using the insert method, Using the execSQL method, Using the update method, Using the execSQL method, Using the delete method, Using the execSQL method, The query method, The insert method about, The Android Database Classes delete method, Modifying the Database, Using the delete method execSQL method, Modifying the Database, Using the execSQL method, Using the execSQL method, Using the execSQL method insert method, Modifying the Database, Using the insert method, The insert method query method, Using the query method, Modifying the Database, The query method rawQuery method, Database Queries and Reading Data from the Database rawQueryWithFactory method, Database Queries and Reading Data from the Database, Using the query method update method, Modifying the Database, Using the update method SQLiteOpenHelper class, The Android Database Classes, Basic Structure of the SimpleVideoDbHelper Class, Basic Structure of the SimpleVideoDbHelper Class, Database Queries and Reading Data from the Database about, The Android Database Classes extending, Database Queries and Reading Data from the Database onCreate method, Basic Structure of the SimpleVideoDbHelper Class onUpgrade method, Basic Structure of the SimpleVideoDbHelper Class SQLiteQueryBuilder class, The Android Database Classes src directory, Organizing Java Source Standard Query Language, Relational Database Overview (see SQL) static analysis, Static Analyzers, FindBugs, FindBugs, FindBugs, Applying Static Analysis to Android Code, Applying Static Analysis to Android Code, Limitations of Static Analysis about, Static Analyzers, FindBugs applying to Android code, Applying Static Analysis to Android Code, Applying Static Analysis to Android Code FindBugs tool and, FindBugs, FindBugs limitations of, Limitations of Static Analysis static declarations, Final and Static Declarations String class, Final and Static Declarations, Drawing text Canvas class and, Drawing text as final declaration, Final and Static Declarations subclasses, Objects and Classes, Modular Programming in Java, Extending Android classes defined, Objects and Classes programming considerations, Modular Programming in Java, Extending Android classes superclasses, defined, Objects and Classes SurfaceHolder class, Surface view animation, Surface view animation Callback interface, Surface view animation unlockCanvasAndPost method, Surface view animation SurfaceView class, Animation, Surface view animation, OpenGL Graphics about, OpenGL Graphics animation support, Animation, Surface view animation Synaptic Package Manager utility, The Java Development Kit (JDK) synchronization, Synchronization and Thread Safety, Synchronization and Thread Safety, Synchronization and Data Structures, Synchronization account data, Synchronization data structures and, Synchronization and Data Structures thread safety and, Synchronization and Thread Safety, Synchronization and Thread Safety synchronized keyword, Synchronization and Thread Safety, Synchronization and Thread Safety System.loadLibrary method, Conventions on the Java Side T .table command (SQLite), Example Database Manipulation Using sqlite3 tables, Relational Database Overview, SQL Data Definition Commands, Database constraints, Database constraints, Database constraints, SQL Data Manipulation Commands, SQL Data Manipulation Commands database constraints, Database constraints, Database constraints defined, Relational Database Overview SQL data definition commands, SQL Data Definition Commands, Database constraints SQL data manipulation commands, SQL Data Manipulation Commands, SQL Data Manipulation Commands TagTechnology interface, Reading a Tag, Writing to a Tag, Writing to a Tag, Writing to a Tag, Writing to a Tag close method, Writing to a Tag connect method, Writing to a Tag isConnected method, Writing to a Tag reading tags, Reading a Tag writing tags, Writing to a Tag tasks, Multitasking in a Small-Screen Environment, Tasks and Applications, Specifying Launch and Task Behavior, Modifying task behavior with intent flags applications and, Tasks and Applications specifying behavior, Specifying Launch and Task Behavior, Modifying task behavior with intent flags tracking, Multitasking in a Small-Screen Environment temperature sensors, Other Sensors TEXT type (SQLite), SQLite types text, drawing, Drawing text, Drawing text TextToSpeech class, Accessibility, Accessibility, Accessibility about, Accessibility shutdown method, Accessibility speak method, Accessibility TextView class, Rolling Your Own Widgets, Location Without Maps, Connecting to a Location Provider and Getting Location Updates location without maps example, Location Without Maps, Connecting to a Location Provider and Getting Location Updates widgets and, Rolling Your Own Widgets TextWatcher interface, Overrides and callbacks, Overrides and callbacks, Overrides and callbacks afterTextChanged method, Overrides and callbacks beforeTextChanged method, Overrides and callbacks onTextChanged method, Overrides and callbacks Thread class, Basic Multithreaded Concurrent Programming in Java thread confinement, Threads in an Android Process thread safety violations, Synchronization and Thread Safety threads, Basic Multithreaded Concurrent Programming in Java, Basic Multithreaded Concurrent Programming in Java, Synchronization and Thread Safety, Synchronization and Thread Safety, Thread Control with wait() and notify() Methods, Concurrency in Android, AsyncTask and the UI Thread, AsyncTask and the UI Thread, AsyncTask and the UI Thread, Threads in an Android Process Android GUI and, AsyncTask and the UI Thread, AsyncTask and the UI Thread in Android processes, Threads in an Android Process concurrent, Basic Multithreaded Concurrent Programming in Java, Concurrency in Android monitoring, AsyncTask and the UI Thread Object class support, Thread Control with wait() and notify() Methods spawning, Basic Multithreaded Concurrent Programming in Java synchronization and, Synchronization and Thread Safety, Synchronization and Thread Safety Threads view (Eclipse), Eclipse and Android Throwable class, Exceptions TimerTask class, The Android Libraries TimeZone class, The Android Libraries touch events, Listening for Touch Events, Listening for Touch Events, Gesture Input gesture input, Gesture Input listening for, Listening for Touch Events, Listening for Touch Events trackballs, Listening for Touch Events transactions, Fragment Transactions, Fragment Transactions, Database Transactions database, Database Transactions fragment, Fragment Transactions, Fragment Transactions transformations, matrix, Matrix transformations, Matrix transformations transition animations, Animation, Transition animation TranslateAnimation class, Animation, Transition animation TreeMap class, Collection implementation types triangulation, Location-Based Services triggers, database, Additional Database Concepts troubleshooting, Troubleshooting SDK Problems: No Build Targets, The Menu OnKeyListener interface, The Menu SDK problems, Troubleshooting SDK Problems: No Build Targets try-catch block, Exceptions tweened animations, Animation U Ubuntu Linux environment, The Java Development Kit (JDK), The Eclipse Integrated Development Environment (IDE) installing Eclipse, The Eclipse Integrated Development Environment (IDE) installing JDK, The Java Development Kit (JDK) unchecked exceptions, Exceptions UNIQUE constraint, Database constraints unmarshaling data, Serialization unpublishing Android applications, Uploading Applications in the Market UPDATE operation (REST), Content Providers UPDATE statement (SQL), SQL Data Manipulation Commands, SQL Data Manipulation Commands, Extending ContentProvider about, SQL Data Manipulation Commands ContentProvider class and, Extending ContentProvider WHERE clause, SQL Data Manipulation Commands uploading applications in Android Market, Uploading Applications in the Market, Uploading Applications in the Market UriMatcher class, Using a content provider, Extending ContentProvider, Extending ContentProvider, The SimpleFinchVideoContentProvider Class and Instance Variables, The SimpleFinchVideoContentProvider Class and Instance Variables about, Using a content provider, Extending ContentProvider addURI method, Extending ContentProvider initializing, The SimpleFinchVideoContentProvider Class and Instance Variables NO_MATCH constant, The SimpleFinchVideoContentProvider Class and Instance Variables URLEncoder.encode method, A Networked Query Method USB, Running a Program on an Android Device, Running a Program on an Android Device accessing Android devices, Running a Program on an Android Device debugging Android devices, Running a Program on an Android Device user experience, The Activity Life Cycle and the User Experience, A Flowing and Intuitive User Experience Across Activities, Modifying task behavior with intent flags Activity life cycle and, The Activity Life Cycle and the User Experience flowing and intuitive, A Flowing and Intuitive User Experience Across Activities, Modifying task behavior with intent flags uses-sdk attribute, Making an Android Project UUID class, The Android Libraries V values directory, Resources Vector class, The Java Collections Framework, The Android Libraries Vibrator class, Accessibility video, Audio and Video, Video Playback, Video Playback, Video Recording, MediaRecorder video recording, Intent video recording Android supported formats, Audio and Video Intent recording, Intent video recording MediaPlayer playback, Video Playback MediaRecorder recording, MediaRecorder video recording playback methods, Video Playback recording methods, Video Recording VideoView class, Video Playback View class, Using Anonymous Classes, Using Anonymous Classes, Threads in an Android Process, Threads in an Android Process, The Controller, Assembling a Graphical Interface, Wiring Up the Controller, Listening for Touch Events, Listening for Touch Events, Listening for Touch Events, Listening for Key Events, Alternative Ways to Handle Events, Alternative Ways to Handle Events, Alternative Ways to Handle Events, Alternative Ways to Handle Events, Alternative Ways to Handle Events, Alternative Ways to Handle Events, Advanced Wiring: Focus and Threading, Advanced Wiring: Focus and Threading, Advanced Wiring: Focus and Threading, Advanced Wiring: Focus and Threading, Advanced Wiring: Focus and Threading, The Menu, The Menu, The Menu, Fragments and Multiplatform Support, Creating a Fragment, Rolling Your Own Widgets, Rolling Your Own Widgets, Layout, Measurement, Measurement, Measurement, Measurement, Measurement, Measurement, Measurement, Measurement, Arrangement, Arrangement, Canvas Drawing, Canvas Drawing, Drawables, Transition animation, Background animation, Background animation, Background animation, Background animation, Background animation (see also widgets) about, Using Anonymous Classes assembling GUI, Assembling a Graphical Interface background animation, Background animation dispatchKeyEvent method, The Controller DispatchKeyEvent method, Alternative Ways to Handle Events dispatchTrackballEvent method, Listening for Touch Events draw method, Canvas Drawing findViewById method, Creating a Fragment getBackground method, Background animation getMeasuredHeight method, Measurement getMeasuredWidth method, Measurement getSuggestedMinimumHeight method, Measurement getSuggestedMinimumWidth method, Measurement handling events, Alternative Ways to Handle Events invalidate method, Canvas Drawing isFocusableInTouchMode method, Advanced Wiring: Focus and Threading isInTouchMode method, Advanced Wiring: Focus and Threading measure method, Measurement OnClickListener interface, Wiring Up the Controller OnCreateContextMenuListener interface, The Menu, Fragments and Multiplatform Support onDraw method, Drawables, Background animation OnFocusChangeListener interface, Advanced Wiring: Focus and Threading onKeyDown method, Alternative Ways to Handle Events OnKeyListener interface, Using Anonymous Classes, Alternative Ways to Handle Events, The Menu onLayout method, Arrangement onMeasure method, Measurement, Arrangement onTouchEvent method, Alternative Ways to Handle Events OnTouchListener interface, Listening for Touch Events, Alternative Ways to Handle Events onTrackballEvent method, Listening for Touch Events post method, Threads in an Android Process postDelayed method, Threads in an Android Process requestFocus method, Advanced Wiring: Focus and Threading requestLayout method, Layout setBackgroundDrawable method, Background animation setBackgroundResource method, Background animation setFocusable method, Advanced Wiring: Focus and Threading setMeasuredDimensions method, Measurement, Measurement setOnCreateContextMenuListener method, The Menu setOnKeyListener method, Listening for Key Events startAnimation method, Transition animation widgets and, Rolling Your Own Widgets View component (MVC), The View, Rolling Your Own Widgets, Rolling Your Own Widgets (see also drawing graphics) view model, Canvas Drawing ViewGroup class, Assembling a Graphical Interface, Advanced Wiring: Focus and Threading, Advanced Wiring: Focus and Threading, Fragments and Multiplatform Support, Rolling Your Own Widgets, Measurement, Measurement, Measurement, Canvas Drawing container views and, Assembling a Graphical Interface dispatchDraw method, Canvas Drawing Fragment class and, Fragments and Multiplatform Support measureChild method, Measurement measureChildren method, Measurement measureChildWithMargins method, Measurement requestChildFocus method, Advanced Wiring: Focus and Threading requestFocus method, Advanced Wiring: Focus and Threading widgets and, Rolling Your Own Widgets virtual machines, The Dalvik Debug Monitor Server (DDMS) (see Dalvik virtual machines (VMs)) VisualAge tool, Eclipse Concepts and Terminology VMs (virtual machines), The Dalvik Debug Monitor Server (DDMS) (see Dalvik virtual machines (VMs)) W whatami example, JNI, NDK, and SDK: A Sample App widgets, Assembling a Graphical Interface, Advanced Wiring: Focus and Threading, Rolling Your Own Widgets, Rolling Your Own Widgets, Rolling Your Own Widgets, Rolling Your Own Widgets, Layout, Arrangement, Arrangement, Arrangement, Canvas Drawing, Matrix transformations, Canvas Drawing, Canvas Drawing, Canvas Drawing, Matrix transformations, Drawables, Drawables, Drawables, Bitmaps, Bling, OpenGL Graphics (see also View class) Bitmap class, Bitmaps canvas drawing, Canvas Drawing, Matrix transformations defined, Assembling a Graphical Interface, Rolling Your Own Widgets Drawable class, Drawables, Drawables focusable attribute, Advanced Wiring: Focus and Threading fully functional example, Canvas Drawing graphics effects examples, Bling, OpenGL Graphics layout process, Layout, Arrangement onDraw method, Rolling Your Own Widgets, Arrangement, Canvas Drawing, Canvas Drawing, Matrix transformations, Drawables onLayout method, Arrangement onMeasure method, Rolling Your Own Widgets Windows environment, The Java Development Kit (JDK), Running a Program on an Android Device, Sandboxing: Processes and Users, Setting Up the NDK Environment installing JDK, The Java Development Kit (JDK) NDK requirements, Setting Up the NDK Environment running programs on Android devices, Running a Program on an Android Device sandboxing and, Sandboxing: Processes and Users workspaces, Making an Android Project, Workspaces, Eclipse Views and Perspectives, Organizing Java Source defined, Making an Android Project, Workspaces depicted, Eclipse Views and Perspectives projects and, Organizing Java Source X XML editors, XML editors for other Android XML files Y YouTube video example, Code Example: Dynamically Listing and Caching YouTube Video Content, Structure of the Source Code for the Finch YouTube Video Example, Step 1: Our UI Collects User Input, Step 2: Our Controller Listens for Events, Constants and Initialization, Creating the Database, A Networked Query Method, YouTubeHandler, insert and ResponseHandlers, insert and ResponseHandlers, File Management: Storing Thumbnails about, Code Example: Dynamically Listing and Caching YouTube Video Content constants and initialization, Constants and Initialization controller collecting user input, Step 2: Our Controller Listens for Events creating database, Creating the Database file management, File Management: Storing Thumbnails insert and ResponseHandlers, insert and ResponseHandlers, insert and ResponseHandlers networked query method, A Networked Query Method, YouTubeHandler structure of source code, Structure of the Source Code for the Finch YouTube Video Example UI collecting user input, Step 1: Our UI Collects User Input Z Zipalign tool, Zipalign zooming in Android maps, MapView and MyLocationOverlay Initialization Zygote process, Zygote: Forking a New Process About the Authors Zigurd Mednieks is a consultant to leading OEMs, enterprises, and entrepreneurial ventures creating Android-based systems and software.


pages: 629 words: 142,393

The Future of the Internet: And How to Stop It by Jonathan Zittrain

A Declaration of the Independence of Cyberspace, algorithmic bias, Amazon Mechanical Turk, Andy Kessler, barriers to entry, behavioural economics, book scanning, Brewster Kahle, Burning Man, c2.com, call centre, Cass Sunstein, citizen journalism, Citizen Lab, Clayton Christensen, clean water, commoditize, commons-based peer production, corporate governance, Daniel Kahneman / Amos Tversky, digital divide, disruptive innovation, distributed generation, en.wikipedia.org, end-to-end encryption, Firefox, folksonomy, Free Software Foundation, game design, Hacker Ethic, Howard Rheingold, Hush-A-Phone, illegal immigration, index card, informal economy, information security, Internet Archive, jimmy wales, John Markoff, John Perry Barlow, license plate recognition, loose coupling, mail merge, Morris worm, national security letter, old-boy network, One Laptop per Child (OLPC), OSI model, packet switching, peer-to-peer, post-materialism, pre–internet, price discrimination, profit maximization, radical decentralization, Ralph Nader, RFC: Request For Comment, RFID, Richard Stallman, Richard Thaler, risk tolerance, Robert Bork, Robert X Cringely, SETI@home, Silicon Valley, Skype, slashdot, software patent, Steve Ballmer, Steve Jobs, Ted Nelson, Telecommunications Act of 1996, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, The Wisdom of Crowds, Tragedy of the Commons, web application, wikimedia commons, Yochai Benkler, zero-sum game

Privacy scholarship also looks to the latest advances in specific technologies that could further weaken day-to-day informational privacy13 One example is the increasing use of radio frequency identifiers (RFIDs) in consumer items, allowing goods to be scanned and tracked at a short distance. One promise of RFID is that a shopper could wheel her shopping cart under an arch at a grocery store and obtain an immediate tally of the price of its contents; one peril is that a stranger could drive by a house with an RFID scanner and instantly inventory its contents, from diapers to bacon to flat-screen TVs, immediately discerning the sort of people who live within.

Soon, the price of a loaf of bread at the store becomes indeterminate: there is a sticker price, but when the shopper takes the bread up front, the store can announce a special individualized discount based on her relationship with the store. The sticker price then becomes only that, providing little indication of the price that shoppers are actually paying. Merchants can also vary service. Customer cards augmented with RFID tags can serve to identify those undesirable customers who visit a home improvement store, monopolize the attention of the attendants, and exit without having bought so much as a single nail. With these kinds of cards, the store would be able to discern the “good” (profitable) customers from the “bad” (not profitable) ones and appropriately alert the staff to flee from bad customers and approach good ones.

., 18, 29, 57–59; and Internet compatibility, 28–29; lockdown of, 4, 5, 57, 102, 155–56, 164, 165; model of computing, 17; modularization of, 156; PC revolution, 3, 18; potential functionality sold with, 13; regulability of, 106; search across computers, 185; security dilemma of, 241; in sites where users are not owners, 4; and third-party storage, 186–88; “trapped,” 77; unsecured on Internet, 45; users as programmers for, 14, 15; virtual, 156; zombies, 46, 52, 54, 57, 166 personal identity management, 32–33 Pew Internet & American Life Project, 51 phishing, 47, 53, 99 photo recognition, 214–15 physical layer, 67–69 placeholders, 56 plagiarism, 244 plastic, adaptability of, 72 PlayMedia, 104, 108 Pledgebank, 148, 243 pornography, child, 111 Posner, Eric, 213 Post, David, 123 Postel’s Law, 134 post hoc remedies, 122 post hoc scrubs, 116 Postman, Neil, 93 preemption, 108 press conference behavior, 212–13, 229 prime time, being ready for (and the generative Net), 153–54 prior restraints, 115, 122 Privacy Act (1974), 202 privacy: administrative burdens of, 221–22; and captchas, 208; and cheap sensors, 206, 208–9, 210, 216, 221; code-backed norms, 223–28; Constitutional support of, 112, 185–86, 188; and consumer protection law, 177; contextualization, 229–31; data genealogy, 225–28; enforceability of, 112–14; and generation gap, 231–34; and government power, 117–19, 186–88; HEW report (1973) on, 201–5, 222, 233–34; and industry self-regulation, 203; involuntary celebrities, 210–14; “just deal with it,” 111–12; and peer production, 206–16; personal information security, 203–4; Privacy 1.0, 201–5, 208, 215, 216, 222, 232; Privacy 2.0, 205–34; as proxies for other limitations, 112; public vs. private behavior, 212–16; and reputation, 216–21, 228–29; search and seizure, 112; sensitivity identified with, 202; and third-party storage, 185–88; and ubiquitous surveillance, 109–10, 206, 209–16; on Web sites, 203, 226 privacy “tags,” 227 procrastination principle: and Digital Millennium Copyright Act, 119–20; in generative systems, 152, 164, 180, 242, 245; in Internet design, 33, 34; and Morris worm, 39–40; in networks, 31, 33, 99, 164; in operating systems, 69; and Wikipedia, 134, 135; in XO, 237, 240 Prodigy, 7, 23, 24, 81, 157 proprietary rights thickets, 188–92 protocol layer, 39, 67–69 punch card system, 11 QTel, 157 quasi-contracts, 184 Radin, Margaret, 233 radio broadcasts, jamming of, 106 radio frequency identifiers (RFIDs), 203 Radio Shack, 75-in-1 Electronic Project Kit, 14, 73 Rand, Ayn, 143 Raymond, Eric, 137 “Realtime Blackhole List,” 169 reCAPTCHA, 208, 227 Reed, David, 31 Reidenberg, Joel, 104 reputation bankruptcy, 228–29 reputationdefender.com, 230 reputation systems, 216–21; buddy lists, 219–20; correcting or identifying mistakes on, 220; identity systems, 220; search engines, 217, 220–21; user rankings, 146, 217–18, 221; whole-person ratings, 218–19 RFC 1135, “The Helminthiasis of the Internet,” 39 robots, spam messages from, 207–8 robot signaling, 223 robots.txt, 223–25, 227, 243 Rosen, Jeffrey, 216 RSS (really simple syndication), 56 Saltzer, Jerry, 31 Samuelson, Pamela, 225–26 Sanger, Larry, 133, 142–43, 145 Sapphire/Slammer worm, 47 satellite TV, 181, 182 Saudi Arabia, information control in, 113, 180 Scherf, Steve, 145–46 search engines, 220–21, 223, 226, 227; creation of, 224; user rankings, 217 Second Amendment, 117 SEC v.


pages: 717 words: 150,288

Cities Under Siege: The New Military Urbanism by Stephen Graham

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", addicted to oil, airport security, Alan Greenspan, Anthropocene, anti-communist, autonomous vehicles, Berlin Wall, call centre, carbon footprint, clean tech, clean water, congestion charging, creative destruction, credit crunch, DARPA: Urban Challenge, defense in depth, deindustrialization, digital map, disinformation, Dr. Strangelove, driverless car, edge city, energy security, European colonialism, export processing zone, failed state, Food sovereignty, gentrification, Gini coefficient, global supply chain, Global Witness, Google Earth, illegal immigration, income inequality, knowledge economy, late capitalism, Lewis Mumford, loose coupling, machine readable, market fundamentalism, mass incarceration, McMansion, megacity, military-industrial complex, moral panic, mutually assured destruction, Naomi Klein, New Urbanism, offshore financial centre, one-state solution, pattern recognition, peak oil, planetary scale, post-Fordism, private military company, Project for a New American Century, RAND corporation, RFID, Richard Florida, Scramble for Africa, Seymour Hersh, Silicon Valley, SimCity, smart transportation, surplus humans, The Bell Curve by Richard Herrnstein and Charles Murray, urban decay, urban planning, urban renewal, urban sprawl, Washington Consensus, white flight, white picket fence

Hayes, of the organization Statewatch, argues that the EU’s efforts to establish a continent-wide Security Research Programme is best described as ‘“Big Brother” meets market fundamentalism’.58 The programme’s large development and supply contracts are organized by a network of ‘EU officials and Europe’s biggest arms and IT companies’.59 As in the US, moreover, EU security policy and research are heavily influenced by intensive lobbying by the main corporate-security companies (many of which are recently privatized state operations). Rather than the ethics of massive securitization, the prime EU concern has been how European corporation could take a bigger chunk of booming global markets for a ‘myriad of local and global surveillance systems; the introduction of biometric identifiers; RFID, electronic tagging and satellite monitoring; “less-lethal weapons”; paramilitary equipment for public order and crisis management; and the militarization of border controls’.60 Urban securization may thus become a shop-window for industrial policy within the burgeoning security marketplace. COLONIZING TRANSNATIONAL URBANISM The recalibration of an inside-outside problematique from the point of view of the United States is full of explosive contradictions.61 Our fifth component is this: in a rapidly urbanizing world marked by intensifying transnational migration, transport, capital and media flows, all attempts at constructing a mutually exclusive binary – a securitized ‘inside’ enclosing the urban places of the US homeland, and an urbanizing ‘outside’ where US military power can pre-emptively attack sources of terrorist threats –are inevitably both ambivalent and ridden with contradiction.

Thus, ‘national security, at least in the ports, is conceptualized as almost interchangeable with the security of international trade flows’.171 GLOBAL BIOMETRIC REGIME The globe shrinks for those who own it; for the displaced or the dispossessed, the migrant or refugee, no distance is more awesome than the few feet across borders or frontiers.172 In the airline and airport sectors, US homeland security efforts are meant to ensure that the ‘border guard [is] the last line of defense, not the first, in identifying potential threats’.173 The dream system features interoperable ‘smart’ borders, globalized border control, and pre-emptive risk management.174 To this end, the US has developed the US-VISIT programme – US Visitor and Immigrant Status Indicator Technology – for air travel, another application of biometric attempts to ‘objectively’ fix bodies and identities while coercing key US partner nations to adjust their passport systems to biometric standards defined by the US.175 In the Enhanced Border Security and Visa Act of 2002, for example, the US Congress imposed a requirement that the twenty-seven countries within the US Visa Waiver Program (VWP) begin using machine-readable passports that incorporate both biometric and radio-frequency tag (RFID) technology. Nations or blocs that fail to undertake these radical shifts are threatened with losing their coveted status within the VWP. ‘Our leveraging of America’s visa aiver partners, in order to promote the use of the new ID technologies for purposes of national security’, Richard Pruett and Michael Longarzo of the US Army War College write, ‘may prove to be a paradigm for the coming age’.176 The passage-point architectures of overseas airports thus now display symbols of both US and domestic sovereignty (Figure 4.20). 4.20 The ‘global homeland’ orchestrated through the extension of US sovereignty as part of the US visit initiative: Frankfurt airport, Germany.

APPROPRIATION A third strategy for the building of countergeographies involves the very technologies of control that are so central to the new military urbanism and that offer excellent potential for appropriation and reverse engineering. Indeed, a whole universe of experiments in what are called ‘locative’ or ‘ambient’ media seek to challenge contemporary cultures of militarized urbanism by exploring new uses of infrastructures and technologies such as GPS, radio frequency (RFID) chips, unmanned drones, digital mapping, satellite surveillance, video simulation, data mining, Internet communications and wireless communications–all of which more or less originated through military research. The emphasis here is first to demystify and make visible the invisible technologies of control, tracking, and surveillance which now thoroughly permeate everyday objects, architectures, environments and infrastructures, and then to redeploy them in counter-hegemonic ways.


pages: 252 words: 74,167

Thinking Machines: The Inside Story of Artificial Intelligence and Our Race to Build the Future by Luke Dormehl

"World Economic Forum" Davos, Ada Lovelace, agricultural Revolution, AI winter, Albert Einstein, Alexey Pajitnov wrote Tetris, algorithmic management, algorithmic trading, AlphaGo, Amazon Mechanical Turk, Apple II, artificial general intelligence, Automated Insights, autonomous vehicles, backpropagation, Bletchley Park, book scanning, borderless world, call centre, cellular automata, Charles Babbage, Claude Shannon: information theory, cloud computing, computer vision, Computing Machinery and Intelligence, correlation does not imply causation, crowdsourcing, deep learning, DeepMind, driverless car, drone strike, Elon Musk, Flash crash, Ford Model T, friendly AI, game design, Geoffrey Hinton, global village, Google X / Alphabet X, Hans Moravec, hive mind, industrial robot, information retrieval, Internet of things, iterative process, Jaron Lanier, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John von Neumann, Kickstarter, Kodak vs Instagram, Law of Accelerating Returns, life extension, Loebner Prize, machine translation, Marc Andreessen, Mark Zuckerberg, Menlo Park, Mustafa Suleyman, natural language processing, Nick Bostrom, Norbert Wiener, out of africa, PageRank, paperclip maximiser, pattern recognition, radical life extension, Ray Kurzweil, recommendation engine, remote working, RFID, scientific management, self-driving car, Silicon Valley, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, social intelligence, speech recognition, Stephen Hawking, Steve Jobs, Steve Wozniak, Steven Pinker, strong AI, superintelligent machines, tech billionaire, technological singularity, The Coming Technological Singularity, The Future of Employment, Tim Cook: Apple, Tony Fadell, too big to fail, traumatic brain injury, Turing machine, Turing test, Vernor Vinge, warehouse robotics, Watson beat the top human players on Jeopardy!

CHAPTER 3 Intelligence Is all Around Us IN 1998, THE year in which Apple unveiled its bulbous iMac computer, Harry Potter was introduced to the world and the first portable MP3 player went on sale, a 44-year-old professor from the University of Cybernetics in Reading underwent an unusual operation. The aim of Professor Kevin Warwick’s elective surgery was to have a silicon chip encased in a glass tube inserted under the skin on his left arm. Once implanted, this radio-frequency identification device (RFID) chip then sent radio signals, via antennae located around his laboratory, to a central computer able to control Warwick’s immediate surroundings. ‘At the main entrance [of my lab], a voice box operated by the computer said “Hello” when I entered,’ Kevin Warwick later wrote of his experience. ‘The computer detected my progress through the building, opening the door to my lab for me as I approached it and switching on the lights.

While it is still easy to balk at the reason someone would willingly undergo such an invasive procedure, the question of why someone should want such a thing has receded into the background. As I write this, I have on my wrist an Apple Watch. It is the 42 mm stainless steel model with Apple’s Milanese Loop band. It cost £599 and can do far, far more than Kevin Warwick ever dreamed his RFID implant would achieve. If I receive a text message or a phone call, or if one of my friends posts a new photo to Instagram, I can view it simply by glancing at my wrist. In supermarkets, I can pay for my groceries by tapping my wrist against the card reader. I can do the same to unlock the door to my room at hundreds of hotels around the world.

(TV show) 135–9, 162, 189–90, 225, 254 Jobs, Steve 6–7, 32, 35, 108, 113, 181, 193, 231 Jochem, Todd 55–6 judges 153–4 Kasparov, Garry 137, 138–9, 177 Katz, Lawrence 159–60 Keck, George Fred 81–2 Keynes, John Maynard 139–40 Kjellberg, Felix (PewDiePie) 151 ‘knowledge engineers’ 29, 37 Knowledge Narrator 110–11 Kodak 238 Kolibree 67 Koza, John 188–9 Ktesibios of Alexandria 71–2 Kubrick, Stanley 2, 228 Kurzweil, Ray 213–14, 231–3 Landauer, Thomas 201–2 Lanier, Jaron 156, 157 Laorden, Carlos 100, 101 learning 37–9, 41–4, 52–3, 55 Deep 11–2, 56–63, 96–7, 164, 225 and email filters 88 machine 3, 71, 84–6, 88, 100, 112, 154, 158, 197, 215, 233, 237, 239 reinforcement 83, 232 and smart homes 84, 85 supervised 57 unsupervised 57–8 legal profession 145, 188, 192 LegalZoom 145 LG 132 Lickel, Charles 136–7 ‘life logging’ software 200 Linden, David J. 213–14 Loebner, Hugh 102–3, 105 Loebner Prize 102–5 Lohn, Jason 182, 183–5, 186 long-term potentiation 39–40 love 122–4 Lovelace, Ada 185, 189 Lovelace Test 185–6 Lucas, George 110–11 M2M communication 70–71 ‘M’ (AI assistant) 153 Machine Intelligence from Cortical Networks (MICrONS) project 214–15 machine learners 38 machine learning 3, 71, 84–6, 88, 100, 112, 154, 158, 197, 215, 233, 237, 239 Machine Translator 8–9, 11 ‘machine-aided recognition’ 19–20 Manhattan Project 14, 229 MARK 1 (computer) 43–4 Mattersight Corporation 127 McCarthy, John 18, 19, 20, 27, 42, 54, 253 McCulloch, Warren 40–2, 43, 60, 142–3 Mechanical Turk jobs 152–7 medicine 11, 30, 87–8, 92–5, 187–8, 192, 247, 254 memory 13, 14, 16, 38–9, 42, 49 ‘micro-worlds’ 25 Microsoft 62–3, 106–7, 111–12, 114, 118, 129 mind mapping the 210–14, 217, 218 ‘mind clones’ 203 uploads 221 mindfiles 201–2, 207, 212 Minsky, Marvin 18, 21, 24, 32, 42, 44–6, 49, 105, 205–7, 253–4 MIT 19–20, 27, 96–7, 129, 194–5 Mitsuku (chatterbot) 103–6, 108 Modernising Medicine 11 Momentum Machines, Inc. 141 Moore’s Law 209, 220, 231 Moravec’s paradox 26–7 mortgage applications 237–8 MTurk platform 153, 154, 155 music 168, 172–7, 179 Musk, Elon 149–50, 223–4 MYCIN (expert system) 30–1 nanobots 213–14 nanosensors 92 Nara Logics 118 NASA 6, 182, 184–5 natural selection 182–3 navigational aids 90–1, 126, 127, 128, 241 Nazis 15, 17, 227 Negobot 99–102 Nest Labs 67, 96, 254 Netflix 156, 198 NETtalk 51, 52–3, 60 neural networks 11–12, 38–9, 41, 42–3, 97, 118, 164–6, 168, 201, 208–9, 211, 214–15, 218, 220, 224–5, 233, 237–8, 249, 254, 256–7 neurons 40, 41–2, 46, 49–50, 207, 209–13, 216 neuroscience 40–2, 211, 212, 214, 215 New York World’s Fair 1964 5–11 Newell, Alan 19, 226 Newman, Judith 128–9 Nuance Communications 109 offices, smart 90 OpenWorm 210 ‘Optical Scanning and Information Retrieval’ 7–8, 10 paedophile detection 99–102 Page, Larry 6–7, 34, 220 ‘paperclip maximiser’ scenario 235 Papert, Seymour 27, 44, 45–6, 49 Paro (therapeutic robot) 130–1 patents 188–9 Perceiving and Recognising Automation (PARA) 43 perceptrons 43–6 personality capture 200–4 pharmaceuticals 187–8 Pitts, Walter 40–2, 43, 60 politics 119–2 Pomerlau, Dean 54, 55–6, 90 prediction 87, 198–9 Profound Hypothermia and Circulatory Arrest 219–20 punch-cards 8 Qualcomm 93 radio-frequency identification device (RFID) 65–6 Ramón y Cajal, Santiago 39–40 Rapidly Adapting Lateral Position Handler (RALPH) 55 ‘recommender system’ 198 refuse collection 142 ‘relational agents’ 130 remote working 238–9 reverse engineering 208, 216, 217 rights for AIs 248–51 risks of AI 223–40 accountability issues 240–4, 246–8 ethics 244–8 rights for AIs 248–51 technological unemployment 139–50, 163, 225, 255 robots 62, 74–7, 89–90, 130–1, 141, 149, 162, 217, 225, 227, 246–7, 255–6 Asimov’s three ethical rules of 244–8 robotic limbs 211–12 Roomba robot vacuum cleaner 75–7, 234, 236 Rosenblatt, Frank 42–6, 61, 220 rules 36–7, 79–80 Rumelhart, David 48, 50–1, 63 Russell, Bertrand 41 Rutter, Brad 138, 139 SAINT program 20 sampling (music) 155, 157 ‘Scheherazade’ (Ai storyteller) 169–70 scikit-learn 239 Scripps Health 92 Sculley, John 110–11 search engines 109–10 Searle, John 24–5 Second Life (video game) 194 Second World War 12–13, 14–15, 17, 72, 227 Sejnowski, Terry 48, 51–3 self-awareness 77, 246–7 self-driving 53–6, 90, 143, 149–50 Semantic Information Retrieval (SIR) 20–2 sensors 75–6, 80, 84–6, 93 SHAKEY robot 23–4, 27–8, 90 Shamir, Lior 172–7, 179, 180 Shannon, Claude 13, 16–18, 28, 253 shipping systems 198 Simon, Herbert 10, 19, 24, 226 Sinclair Oil Corporation 6 Singularity, the 228–3, 251, 256 Siri (AI assistant) 108–11, 113–14, 116, 118–19, 125–30, 132, 225–6, 231, 241, 256 SITU 69, 93 Skynet 231 smart devices 3, 66–7, 69–71, 73–7, 80–8, 92–7, 230–1, 254 and AI assistants 116 and feedback 73–4 problems with 94–7 ubiquitous 92–4 and unemployment 141–2 smartwatches 66, 93, 199 Sony 199–200 Sorto, Erik 211, 212 Space Invaders (video game) 37 spectrometers 93 speech recognition 59, 62, 109, 111, 114, 120 SRI International 28, 89–90, 112–13 StarCraft II (video game) 186–7 story generation 169–70 strategy 36 STUDENT program 20 synapses 209 Synthetic Interview 202–3 Tamagotchis 123–5 Tay (chatbot) 106–7 Taylorism 95–6 Teknowledge 32, 33 Terminator franchise 231, 235 Tetris (video game) 28 Theme Park (video game) 29 thermostats 73, 79, 80 ‘three wise men’ puzzle 246–7 Tojan Room, Cambridge University 69–70 ‘tortoises’ (robots) 74–7 toys 123–5 traffic congestion 90–1 transhumanists 205 transistors 16–17 Transits – Into an abyss (musical composition) 168 translation 8–9, 11, 62–3, 155, 225 Turing, Alan 3, 13–17, 28, 35, 102, 105–6, 227, 232 Turing Test 15, 101–7, 229, 232 tutors, remote 160–1 TV, smart 80, 82 Twitter 153–4 ‘ubiquitous computing’ 91–4 unemployment, technological 139–50, 163, 225, 255 universal micropayment system 156 Universal Turing Machine 15–16 Ursache, Marius 193–7, 203–4, 207 vacuum cleaners, robotic 75–7, 234, 236 video games 28–9, 35–7, 151–2, 186–7, 194, 197 Vinge, Vernor 229–30 virtual assistants 107–32, 225–6, 240–1 characteristics 126–8 falling in love with 122–4 political 119–22 proactive 116–18 therapeutic 128–31 voices 124–126, 127–8 Viv Labs 132 Vladeck, David 242–4 ‘vloggers’ 151–2 von Neumann, John 13–14, 17, 100, 229 Voxta (AI assistant) 119–20 waiter drones 141 ‘Walking Cities’ 89–90 Walter, William Grey 74–7 Warwick, Kevin 65–6 Watson (Blue J) 138–9, 162, 189–92 Waze 90–91, 126 weapons 14, 17, 72, 224–5, 234–5, 247, 255–6 ‘wetware’ 208 Wevorce 145 Wiener, Norbert 72–3, 227 Winston, Patrick 49–50 Wofram Alpha tool 108–9 Wozniak, Steve 35, 114 X.ai 116–17 Xbox 360, Kinect device 114 XCoffee 70 XCON (expert system) 31 Xiaoice 129, 130 YouTube 151 Yudkowsky, Eliezer 237–8 Zuckerberg, Mark 7, 107–8, 230–1, 254–5 Acknowledgments WRITING A BOOK is always a bit of a solitary process.


pages: 477 words: 75,408

The Economic Singularity: Artificial Intelligence and the Death of Capitalism by Calum Chace

"World Economic Forum" Davos, 3D printing, additive manufacturing, agricultural Revolution, AI winter, Airbnb, AlphaGo, Alvin Toffler, Amazon Robotics, Andy Rubin, artificial general intelligence, augmented reality, autonomous vehicles, banking crisis, basic income, Baxter: Rethink Robotics, Berlin Wall, Bernie Sanders, bitcoin, blockchain, Boston Dynamics, bread and circuses, call centre, Chris Urmson, congestion charging, credit crunch, David Ricardo: comparative advantage, deep learning, DeepMind, Demis Hassabis, digital divide, Douglas Engelbart, Dr. Strangelove, driverless car, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Fairchild Semiconductor, Flynn Effect, full employment, future of work, Future Shock, gender pay gap, Geoffrey Hinton, gig economy, Google Glasses, Google X / Alphabet X, Hans Moravec, Herman Kahn, hype cycle, ImageNet competition, income inequality, industrial robot, Internet of things, invention of the telephone, invisible hand, James Watt: steam engine, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Maynard Keynes: technological unemployment, John von Neumann, Kevin Kelly, Kiva Systems, knowledge worker, lifelogging, lump of labour, Lyft, machine translation, Marc Andreessen, Mark Zuckerberg, Martin Wolf, McJob, means of production, Milgram experiment, Narrative Science, natural language processing, Neil Armstrong, new economy, Nick Bostrom, Occupy movement, Oculus Rift, OpenAI, PageRank, pattern recognition, post scarcity, post-industrial society, post-work, precariat, prediction markets, QWERTY keyboard, railway mania, RAND corporation, Ray Kurzweil, RFID, Rodney Brooks, Sam Altman, Satoshi Nakamoto, Second Machine Age, self-driving car, sharing economy, Silicon Valley, Skype, SoftBank, software is eating the world, speech recognition, Stephen Hawking, Steve Jobs, TaskRabbit, technological singularity, TED Talk, The future is already here, The Future of Employment, Thomas Malthus, transaction costs, Two Sigma, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber for X, uber lyft, universal basic income, Vernor Vinge, warehouse automation, warehouse robotics, working-age population, Y Combinator, young professional

My favourite alternative name for the IoT is Ambient Intelligence,[cxxxv] which comes nearest to capturing the essence of the idea, which is that so many sensors, chips and transmitters are embedded in objects around us that our environment becomes intelligent – or at least, intelligible. When originally conceived, the IoT was based on Radio Frequency Identification tags (RFID), tiny devices about the size of a grain of rice which can be “read” remotely without being visible to the device which “reads” them. The RFID is a passive device, and this concept does not involve any AI. Later, technologies like Near Field Communication (NFC) were developed, which allow for two-way data exchange. Android phones have been NFC-enabled since 2011, and it powers the Apple Pay system which was launched with the iPhone 6.

As these general stores firms grew bigger and more sophisticated they built large stores where shoppers fetched their own items, and presented them for processing at checkouts, like components on a car assembly line. Later on, self-service tills were installed, where shoppers could scan the bar codes of their goods themselves, speeding up the process considerably. Soon, RFID tags[xvii] on goods will enable you to wheel your trolley full of items out of the store and to your car without the fuss of unloading and re-loading them at a checkout. At each stage of this evolution, the involvement of the consumer in selecting and transporting each item increases, and the requirement for shop staff involvement reduces.


pages: 265 words: 74,000

The Numerati by Stephen Baker

Berlin Wall, Black Swan, business process, call centre, correlation does not imply causation, Drosophila, full employment, illegal immigration, index card, information security, Isaac Newton, job automation, job satisfaction, junk bonds, McMansion, Myron Scholes, natural language processing, off-the-grid, PageRank, personalized medicine, recommendation engine, RFID, Silicon Valley, Skype, statistical model, surveillance capitalism, Watson beat the top human players on Jeopardy!, workplace surveillance

In time, perhaps a store will recognize us by our movements in the aisles as likely butterflies or barnacles, or even potential shoplifters. And as the facial recognition systems improve, they may spot the barnacles among us the moment we enter the store. If cameras don't pick us up, a radio technology known as RFID just might. These are little computer chips fastened to a piece of merchandise, a shopping cart, or even a customer loyalty card. Each chip has a unique number, identifying the item or the shopper. But unlike a bar code, which has to be passed under a scanner, these chips can be read by radio signals sent by an automatic reader in the area.

See Carnegie Mellon University Code-breaking, [>]–[>] Cold War, [>]–[>] Community, [>], [>], [>], [>], [>]–[>] Computers and algorithms, [>]–[>] on animals, [>]–[>], [>] brains compared to, [>] chips in, [>]–[>] cookies on, [>] cost of, [>] data produced using, [>]–[>] history of uses of, [>]–[>] speed of calculations by, [>]–[>], [>] teaching, to recognize "tribes," [>]–[>] weaknesses of, [>]–[>] and workers, [>]–[>], [>]–[>], [>], [>] See also Algorithms; Computer scientists; Data; Internet; Machine learning; Mathematical models; Mathematicians; Privacy; RFID Computer scientists competition over hiring of, [>]–[>] as making sense of data, [>], [>], [>]–[>], [>] and math, [>] myths about, [>]–[>] See also Computers; Numerati comScore (company), [>] Consumers. See Shoppers Cookies (on computers), [>] Corporations electronic résumés for, [>] interest of, in collecting data about people, [>], [>]–[>], [>], [>] interest of, in collecting data about their employees, [>]–[>], [>]–[>], [>], [>], [>], [>] marketing research by, [>], [>] See also Names of specific corporations Counterterrorism.

See Medications Privacy not a concern in animal testing, [>] concerns about loss of, [>], [>], [>]–[>], [>] as issue in Europe, [>] people's voluntary lifting of, [>]–[>], [>] personal details as violating, [>] and phones, [>], [>]–[>], [>]–[>] policies regarding shoppers', [>] protections for, [>]–[>], [>]–[>], [>]–[>], [>]–[>] of workers, [>]–[>], [>] Probability, [>]–[>], [>], [>], [>] Probst, Katharina, [>] Proxies, [>], [>]–[>], [>] Psychology, [>], [>], [>] Pulleyblank, William, [>] Quantification, [>] See also Mathematical models Quants, [>], [>] Raghavan, Prabhakar, [>]–[>], [>], [>] Remy, Martin, [>] Republican Party, [>], [>]–[>], [>], [>], [>]–[>], [>] "Resourcefuls" tribe, [>], [>] Retail store data, [>]–[>], [>], [>], [>], [>], [>] See also Advertisers RFID technology, [>] "Right Clicks" tribe, [>]–[>], [>]–[>], [>], [>], [>] Romantic-movie lovers, i—[>], [>]–[>], [>], [>] Root, Mabel, [>] Rosenberger, Larry, [>] Rove, Karl, [>], [>] Sandia National Labs (New Mexico), [>]–[>] Schatz, James, [>], [>], [>]–[>], [>], [>] Scholes, Myron, [>] The Sea, the Sea (Murdoch), [>] Search engine optimization (SEO), [>] Second Life (virtual world), [>] Sensors in animals, [>]–[>] medical, [>], [>]–[>], [>]–[>], [>], [>], [>] SEO (search engine optimization), [>] Serotonin, [>], [>] [>]-Hour Task Force, [>] Shakespeare, William, [>], [>], [>] Shoppers (consumers) averaging of, [>] bloggers as, [>]–[>], [>] choices available to, [>]—ii, [>], [>] data collected about, [>], [>], [>], [>], [>]–[>], [>], [>], [>], [>]–[>], [>], [>]–[>], [>], [>], [>], [>] lists of, [>], [>], [>]–[>], [>] targeting of individual, by advertisers, [>], [>], [>]–[>], [>], [>], [>], [>] See also Advertisers; Credit Sifry, David, [>]–[>] Silverstein, Craig, [>]–[>] Simplex algorithms, [>]–[>] Simplex triangle, [>]–[>] Singapore, [>], [>] Small Blue search engine, [>] "Smart bombs" (medical), [>] "Smart carts," [>]–[>], [>], [>]–[>] Smith, J.


pages: 137 words: 36,231

Information: A Very Short Introduction by Luciano Floridi

agricultural Revolution, Albert Einstein, bioinformatics, Bletchley Park, carbon footprint, Claude Shannon: information theory, Computing Machinery and Intelligence, conceptual framework, digital divide, disinformation, double helix, Douglas Engelbart, Douglas Engelbart, George Akerlof, Gordon Gekko, Gregor Mendel, industrial robot, information asymmetry, intangible asset, Internet of things, invention of writing, John Nash: game theory, John von Neumann, Laplace demon, machine translation, moral hazard, Nash equilibrium, Nelson Mandela, Norbert Wiener, Pareto efficiency, phenotype, Pierre-Simon Laplace, prisoner's dilemma, RAND corporation, RFID, Thomas Bayes, Turing machine, Vilfredo Pareto

In the (fast-approaching) future, more and more objects will be ITentities able to learn, advise, and communicate with each other. A good example (but it is only an example) is provided by Radio Frequency IDentification (RFID) tags, which can store and remotely retrieve data from an object and give it a unique identity, like a barcode. Tags can measure 0.4 millimetres square and are thinner than paper. Incorporate this tiny microchip in everything, including humans and animals, and you have created ITentities. This is not science fiction. According to a report by market research company InStat, the worldwide production of RFID will have increased more than 25-fold between 2005 and 2010 and reached 33 billion. Imagine networking these 33 billion ITentities together with all the hundreds of millions of PCs, DVDs, iPods, and other ICT devices available and you see that the infosphere is no longer `there' but `here' and it is here to stay.


pages: 457 words: 112,439

Zero History by William Gibson

augmented reality, business intelligence, dark matter, edge city, hive mind, invisible hand, messenger bag, new economy, pattern recognition, Pepto Bismol, placebo effect, Ponzi scheme, RFID, too big to fail

It would remain on the plane, at Heathrow. Nothing to be carried through customs. His passport lay against his chest, beneath his shirt, in a Faraday pouch protecting the information on its resident RFID tag. RFID snooping was an obsession of Sleight’s. Radio-frequency identification tags. They were in lots of things, evidently, and definitely in every recent U.S. passport. Sleight himself was quite fond of RFID snooping, which Milgrim supposed was one reason he worried about it. You could sit in a hotel lobby and remotely collect information from the passports of American businessmen. The Faraday pouch, which blocked all radio signals, made this impossible.

If Milgrim spoke now, he wondered for the very first time, would Sleight hear him? It suddenly seemed entirely likely to him that Sleight could. He sat back in his white-enameled aluminum chair, aware again of that emotion he supposed was anger. He could feel the Faraday pouch, containing his passport, slung on its cord, under his shirt. Blocking radio waves. Preventing the RFID in his U.S. passport from being read. He looked at the Neo. Without consciously making any decision, he undid the top button of his shirt, fished the pouch out, opened it, and slid the Neo in with his passport. He tucked it back into his shirt and buttoned up. The pouch was bulkier now, visible under his shirt.


pages: 421 words: 110,406

Platform Revolution: How Networked Markets Are Transforming the Economy--And How to Make Them Work for You by Sangeet Paul Choudary, Marshall W. van Alstyne, Geoffrey G. Parker

3D printing, Affordable Care Act / Obamacare, Airbnb, Alvin Roth, Amazon Mechanical Turk, Amazon Web Services, Andrei Shleifer, Apple's 1984 Super Bowl advert, autonomous vehicles, barriers to entry, Benchmark Capital, big data - Walmart - Pop Tarts, bitcoin, blockchain, business cycle, business logic, business process, buy low sell high, chief data officer, Chuck Templeton: OpenTable:, clean water, cloud computing, connected car, corporate governance, crowdsourcing, data acquisition, data is the new oil, data science, digital map, discounted cash flows, disintermediation, driverless car, Edward Glaeser, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, financial innovation, Free Software Foundation, gigafactory, growth hacking, Haber-Bosch Process, High speed trading, independent contractor, information asymmetry, Internet of things, inventory management, invisible hand, Jean Tirole, Jeff Bezos, jimmy wales, John Markoff, Kevin Roose, Khan Academy, Kickstarter, Lean Startup, Lyft, Marc Andreessen, market design, Max Levchin, Metcalfe’s law, multi-sided market, Network effects, new economy, PalmPilot, payday loans, peer-to-peer lending, Peter Thiel, pets.com, pre–internet, price mechanism, recommendation engine, RFID, Richard Stallman, ride hailing / ride sharing, Robert Metcalfe, Ronald Coase, Salesforce, Satoshi Nakamoto, search costs, self-driving car, shareholder value, sharing economy, side project, Silicon Valley, Skype, smart contracts, smart grid, Snapchat, social bookmarking, social contagion, software is eating the world, Steve Jobs, TaskRabbit, The Chicago School, the long tail, the payments system, Tim Cook: Apple, transaction costs, Travis Kalanick, two-sided market, Uber and Lyft, Uber for X, uber lyft, vertical integration, winner-take-all economy, zero-sum game, Zipcar

In the end, of course, the choice of a sponsorship/management model comes down to the purposes for which the platform is being developed and the goals of those designing it. The wireless radio frequency identification (RFID) technology is used to create smart tags that can be attached by the millions to products for inventory control. In effect, the RFID system is an inventory management platform that retailers can access to interact with the goods they distribute. The RFID platform was sponsored by a huge consortium of retailers, and the tags themselves are now manufactured by many companies which compete on the basis of price as well as design. The shared model of sponsorship and management means that the RFID technology itself doesn’t generate enormous profits for anyone—the tags sell for just a few cents apiece.


pages: 133 words: 42,254

Big Data Analytics: Turning Big Data Into Big Money by Frank J. Ohlhorst

algorithmic trading, bioinformatics, business intelligence, business logic, business process, call centre, cloud computing, create, read, update, delete, data acquisition, data science, DevOps, extractivism, fault tolerance, information security, Large Hadron Collider, linked data, machine readable, natural language processing, Network effects, pattern recognition, performance metric, personalized medicine, RFID, sentiment analysis, six sigma, smart meter, statistical model, supply-chain management, warehouse automation, Watson beat the top human players on Jeopardy!, web application

Furthermore, the increasing volume and detail of information acquired by businesses and government agencies—paired with the rise of multimedia, social media, instant messaging, e-mail, and other Internet-enabled technologies—will fuel exponential growth in data for the foreseeable future. Some of that growth can be attributed to increased compliance requirements, but a key factor in the increase in data volumes is the increasingly sensor-enabled and instrumented world. Examples include RFID tags, vehicles equipped with GPS sensors, low-cost remote sensing devices, instrumented business processes, and instrumented web site interactions. The question may soon arise of whether Big Data is too big, leading to a situation in which determining value may prove more difficult. This will evolve into an argument for the quality of the data over the quantity.

Many industries fall under the umbrella of new data creation and digitization of existing data, and most are becoming appropriate sources for Big Data resources. Those industries include the following: Transportation, logistics, retail, utilities, and telecommunications. Sensor data are being generated at an accelerating rate from fleet GPS transceivers, RFID (radio-frequency identification) tag readers, smart meters, and cell phones (call data records); these data are used to optimize operations and drive operational BI to realize immediate business opportunities. Health care. The health care industry is quickly moving to electronic medical records and images, which it wants to use for short-term public health monitoring and long-term epidemiological research programs.


pages: 252 words: 78,780

Lab Rats: How Silicon Valley Made Work Miserable for the Rest of Us by Dan Lyons

"Friedman doctrine" OR "shareholder theory", "Susan Fowler" uber, "World Economic Forum" Davos, Airbnb, Amazon Robotics, Amazon Web Services, antiwork, Apple II, augmented reality, autonomous vehicles, basic income, Big Tech, bitcoin, blockchain, Blue Ocean Strategy, business process, call centre, Cambridge Analytica, Clayton Christensen, clean water, collective bargaining, corporate governance, corporate social responsibility, creative destruction, cryptocurrency, data science, David Heinemeier Hansson, digital rights, Donald Trump, Elon Musk, Ethereum, ethereum blockchain, fake news, full employment, future of work, gig economy, Gordon Gekko, greed is good, Hacker News, hiring and firing, holacracy, housing crisis, impact investing, income inequality, informal economy, initial coin offering, Jeff Bezos, job automation, job satisfaction, job-hopping, John Gruber, John Perry Barlow, Joseph Schumpeter, junk bonds, Kanban, Kevin Kelly, knowledge worker, Larry Ellison, Lean Startup, loose coupling, Lyft, Marc Andreessen, Mark Zuckerberg, McMansion, Menlo Park, Milgram experiment, minimum viable product, Mitch Kapor, move fast and break things, new economy, Panopticon Jeremy Bentham, Parker Conrad, Paul Graham, paypal mafia, Peter Thiel, plutocrats, precariat, prosperity theology / prosperity gospel / gospel of success, public intellectual, RAND corporation, remote working, RFID, ride hailing / ride sharing, Ronald Reagan, Rubik’s Cube, Ruby on Rails, Sam Altman, San Francisco homelessness, Sand Hill Road, scientific management, self-driving car, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, six sigma, Skinner box, Skype, Social Responsibility of Business Is to Increase Its Profits, SoftBank, software is eating the world, Stanford prison experiment, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, stock buybacks, super pumped, TaskRabbit, tech bro, tech worker, TechCrunch disrupt, TED Talk, telemarketer, Tesla Model S, Thomas Davenport, Tony Hsieh, Toyota Production System, traveling salesman, Travis Kalanick, tulip mania, Uber and Lyft, Uber for X, uber lyft, universal basic income, web application, WeWork, Whole Earth Catalog, work culture , workplace surveillance , Y Combinator, young professional, Zenefits

MarketWatch, May 14, 2018. https://www.marketwatch.com/story/why-one-third-of-american-working-age-men-could-be-displaced-by-robots-2018-05-14. Brookings. “The Future of Work: Robots, AI, and Automation.” Event held May 14, 2018. https://www.brookings.edu/events/the-future-of-work-robots-ai-and-automation. Buchanan, Jeff. “Wisconsin Company Offers to Put RFID Chips in Employees’ Bodies.” Xconomy, July 26, 2017. https://www.xconomy.com/wisconsin/2017/07/26/wisconsin-company-offers-to-put-rfid-chips-in-employees-bodies. Burt, Chris. “Nuance Voice Biometrics Solution Hits Milestone.” Biometric Update.com, January 31, 2018. https://www.biometricupdate.com/201801/nuance-voice-biometrics-solution-hits-milestone. Christoff, Kalina.

Keep that in mind next time you feel the urge to fire off a message bashing your CEO to a work buddy. Companies monitor our social media activity, too. Some even spy on us through the cameras in our computers. They listen to and record our phone calls, and they track our location with ID badges, wristbands, and mobile phones. A Wisconsin company called Three Square Market has put RFID implants into employees’ hands so they can swipe into the building just by waving their hand. Some collect biometric information about workers, like their voiceprints, iris scans, and fingerprints. A common application is requiring fingerprints for “time and attendance” systems, making employees prove when they clock in and clock out.


pages: 247 words: 81,135

The Great Fragmentation: And Why the Future of All Business Is Small by Steve Sammartino

3D printing, additive manufacturing, Airbnb, augmented reality, barriers to entry, behavioural economics, Bill Gates: Altair 8800, bitcoin, BRICs, Buckminster Fuller, citizen journalism, collaborative consumption, cryptocurrency, data science, David Heinemeier Hansson, deep learning, disruptive innovation, driverless car, Dunbar number, Elon Musk, fiat currency, Frederick Winslow Taylor, game design, gamification, Google X / Alphabet X, haute couture, helicopter parent, hype cycle, illegal immigration, index fund, Jeff Bezos, jimmy wales, Kickstarter, knowledge economy, Law of Accelerating Returns, lifelogging, market design, Mary Meeker, Metcalfe's law, Minecraft, minimum viable product, Network effects, new economy, peer-to-peer, planned obsolescence, post scarcity, prediction markets, pre–internet, profit motive, race to the bottom, random walk, Ray Kurzweil, recommendation engine, remote working, RFID, Rubik’s Cube, scientific management, self-driving car, sharing economy, side project, Silicon Valley, Silicon Valley startup, skunkworks, Skype, social graph, social web, software is eating the world, Steve Jobs, subscription business, survivorship bias, The Home Computer Revolution, the long tail, too big to fail, US Airways Flight 1549, vertical integration, web application, zero-sum game

Even when we look at our own homes, we can see the momentum building: personal technology and gadgets, cars, bicycles, televisions, white goods, light globes, thermostats, athletic shoes, clothing, pillows, beds, door locks, toys and wearables — not to mention our phone (the smart hub). Will everything be connected? We know from technology deflation, which was discussed in chapter 7, how cheap the augmentation of technology has become. Many of the widgets used to create this connectivity are cheaper than the packaging they’re sold in. A radio-frequency identification (RFID) chip, for example, is cheaper than the glass bottle Coca-Cola comes in. Other more complex connectivity elements come at the cost of a few dollars. The price of technology is not the issue. If we add to this people’s desire for everything to be connected to the web, there’s no stopping it from becoming a mainstream communications phenomenon that will dwarf the impact of the social web.

In essence it will become our globally displaced technological assistance system. And it’s already being installed by innovative yet fragmented industries and startups. The ‘smart home’ will be where it first gains wide acceptance. Start making sense The types of sensor we can expect to use include microprocessors, RFIDs, accelerometers, altimeters, gauges, and audio and visual scanners of every type. If you can think of it and measure it, then a sensor can do it. Sensors can measure and record temperature, light, pressure, moisture, water level, movement, proximity, density, patterns, faces, brands and everyday things in the environment.

Even though I have a perfectly fine car and a free car space at my office, I do this because the incentive makes it worth the effort. The government of the day has a combined incentive for increased usage of public transport to reduce traffic congestion and to assist in the meeting of their carbon treaty targets. I check in while travelling using my registered smartphone app or RFID-enabled government issue transport card so that I’m tracked and get my tax credits. Local food retail. For my mid-morning coffee I walk past three cafés to get my java fix. The one a little further down the street offers a free coffee for every fifth check-in with my smartphone using a geo-locating app.


pages: 348 words: 97,277

The Truth Machine: The Blockchain and the Future of Everything by Paul Vigna, Michael J. Casey

3D printing, additive manufacturing, Airbnb, altcoin, Amazon Web Services, barriers to entry, basic income, Berlin Wall, Bernie Madoff, Big Tech, bitcoin, blockchain, blood diamond, Blythe Masters, business process, buy and hold, carbon credits, carbon footprint, cashless society, circular economy, cloud computing, computer age, computerized trading, conceptual framework, content marketing, Credit Default Swap, cross-border payments, crowdsourcing, cryptocurrency, cyber-physical system, decentralized internet, dematerialisation, disinformation, disintermediation, distributed ledger, Donald Trump, double entry bookkeeping, Dunbar number, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, failed state, fake news, fault tolerance, fiat currency, financial engineering, financial innovation, financial intermediation, Garrett Hardin, global supply chain, Hernando de Soto, hive mind, informal economy, information security, initial coin offering, intangible asset, Internet of things, Joi Ito, Kickstarter, linked data, litecoin, longitudinal study, Lyft, M-Pesa, Marc Andreessen, market clearing, mobile money, money: store of value / unit of account / medium of exchange, Network effects, off grid, pets.com, post-truth, prediction markets, pre–internet, price mechanism, profit maximization, profit motive, Project Xanadu, ransomware, rent-seeking, RFID, ride hailing / ride sharing, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sharing economy, Silicon Valley, smart contracts, smart meter, Snapchat, social web, software is eating the world, supply-chain management, Ted Nelson, the market place, too big to fail, trade route, Tragedy of the Commons, transaction costs, Travis Kalanick, Turing complete, Uber and Lyft, uber lyft, unbanked and underbanked, underbanked, universal basic income, Vitalik Buterin, web of trust, work culture , zero-sum game

Each company can inquire with the others, but just as banks in a sequence of payment processors maintain separate ledgers that are closed to everyone else, there is no visibility across these different siloes of information. That means that a company like Chipotle has no way to check whether the work records at the Australian slaughterhouse show the staff fulfilling compliance requirements and carrying out mandated procedures. Barcodes and RFID chips have in some respect improved traceability of goods across the world, but the real problem in visibility lies behind the closed doors of each supplier. End-producers, and just as importantly, consumers, are flying blind. Blockchain technology, with its capacity to get groups of potentially mistrusting people to coordinate around a common interest, offers a potential solution to this problem.

The startup Everledger has uploaded unique identifying data on a million individual diamonds to a blockchain ledger system to build quality assurances and help jewelers comply with regulations barring “blood diamond” products. These solutions are also IoT blockchain plays because they are intrinsically linked to the sensors, barcodes, and RFID chips that are increasingly used in manufacturing and shipping to trace goods, trigger actions, and prompt payment. Once again, there will be a need for “know-your-machine” systems that can “identify” these devices and assure they are operating in a trustworthy way. Once smart contracts are added in, signals from these devices can automatically execute pre-established rights and obligations for payment and delivery that all signatories have agreed to.

The concept is only loosely formed at this stage but we raise it here to point out that the assets a blockchain can register go far beyond land. In fact, other assets may be much easier to quantify, with less politics and less ambiguity over ownership. People are talking about blockchain registries of movable assets such as cars, potentially with signals from embedded RFID chips that record unique serial numbers into a blockchain. Blockchain registries could be built up at the point of sale, with loans collateralized right there and then against the asset, a process that would not need the same level of intervention as an official registry. In yet another project from MIT Media Lab, this one led by Michael Casey’s Digital Currency Initiative colleague Mark Weber, a team is working with Inter-American Development Bank to lay a blockchain-based technical foundation for an open-source public asset registry that could support claims on a variety of assets.


pages: 309 words: 96,168

Masters of Scale: Surprising Truths From the World's Most Successful Entrepreneurs by Reid Hoffman, June Cohen, Deron Triff

"Susan Fowler" uber, 23andMe, 3D printing, Airbnb, Anne Wojcicki, Ben Horowitz, bitcoin, Blitzscaling, Broken windows theory, Burning Man, call centre, chief data officer, clean water, collaborative consumption, COVID-19, crowdsourcing, data science, desegregation, do well by doing good, Elon Musk, financial independence, fulfillment center, gender pay gap, global macro, growth hacking, hockey-stick growth, Internet of things, knowledge economy, late fees, Lean Startup, lone genius, Marc Benioff, Mark Zuckerberg, minimum viable product, move fast and break things, Network effects, Paul Graham, Peter Thiel, polynesian navigation, race to the bottom, remote working, RFID, Ronald Reagan, Rubik’s Cube, Ruby on Rails, Salesforce, Sam Altman, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, social distancing, Steve Jobs, Susan Wojcicki, TaskRabbit, TechCrunch disrupt, TED Talk, the long tail, the scientific method, Tim Cook: Apple, Travis Kalanick, two and twenty, work culture , Y Combinator, zero day, Zipcar

So Eventbrite invested in RFID technology to allow festival planners to scan tickets electronically as people passed by a chip reader. But rather than investing in tech and declaring the problem solved, Julia’s team went out to observe this new technology in action. It turns out that the RFID chip readers were themselves embedded in huge immovable gates that created more bottlenecks. So Eventbrite made a bold move for a company that had, until that point, been an entirely digital platform. They went hardware and actually made something: a small, specially designed RFID reader that could be clamped to any existing gate.


Mastering Blockchain, Second Edition by Imran Bashir

3D printing, altcoin, augmented reality, autonomous vehicles, bitcoin, blockchain, business logic, business process, carbon footprint, centralized clearinghouse, cloud computing, connected car, cryptocurrency, data acquisition, Debian, disintermediation, disruptive innovation, distributed ledger, Dogecoin, domain-specific language, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, full stack developer, general-purpose programming language, gravity well, information security, initial coin offering, interest rate swap, Internet of things, litecoin, loose coupling, machine readable, MITM: man-in-the-middle, MVC pattern, Network effects, new economy, node package manager, Oculus Rift, peer-to-peer, platform as a service, prediction markets, QR code, RAND corporation, Real Time Gross Settlement, reversible computing, RFC: Request For Comment, RFID, ride hailing / ride sharing, Satoshi Nakamoto, seminal paper, single page application, smart cities, smart contracts, smart grid, smart meter, supply-chain management, transaction costs, Turing complete, Turing machine, Vitalik Buterin, web application, x509 certificate

Once this initial check passes, further detailed biometric verification can be performed by traditional systems and eventually when a decision is made regarding the entry of the passport holder that decision can be propagated back to the blockchain, thus enabling all participants on the network to immediately share the outcome of the decision. A high-level approach to building a blockchain-based border control system can be visualized as shown in the following diagram. In this scenario, the passport is presented for scanning to an RFID and page scanner which reads the data page and extracts machine-readable information along with a hash of the biometric data stored in the RFID chip. At this stage, a live photo and retina scan of the passport holder is also taken. This information is then passed on to the blockchain where a smart contract is responsible for verifying the legitimacy of the travel document by first checking its list of blacklisted passports and then requesting more data from the backend IPFS database for comparison.

It includes people, animals, cars, trees, fridges, trains, factories, homes, and in fact anything that is required to be monitored and controlled can be connected to the IoT. Device layer This layer contains things that make up the IoT such as sensors, transducers, actuators, smartphones, smart devices, and Radio-Frequency Identification (RFID) tags. There can be many categories of sensors such as body sensors, home sensors, and environmental sensors based on the type of work they perform. This layer is the core of an IoT ecosystem where various sensors are used to sense real-world environments. This layer includes sensors that can monitor temperature, humidity, liquid flow, chemicals, air, pressure, and much more.

A simple contract in Solidity can have an array defined for storing identities and associated biometric records. This array can be used to store the identifying information about a passport. The identity can be a hash of MRZ of the passport or travel document concatenated with the biometric record from the RFID chip. A simple Boolean field can be used to identify blacklisted passports. Once this initial check passes, further detailed biometric verification can be performed by traditional systems and eventually when a decision is made regarding the entry of the passport holder that decision can be propagated back to the blockchain, thus enabling all participants on the network to immediately share the outcome of the decision.


pages: 215 words: 55,212

The Mesh: Why the Future of Business Is Sharing by Lisa Gansky

"World Economic Forum" Davos, Airbnb, Amazon Mechanical Turk, Amazon Web Services, banking crisis, barriers to entry, Bear Stearns, bike sharing, business logic, carbon footprint, carbon tax, Chuck Templeton: OpenTable:, clean tech, cloud computing, credit crunch, crowdsourcing, diversification, Firefox, fixed income, Google Earth, impact investing, industrial cluster, Internet of things, Joi Ito, Kickstarter, late fees, Network effects, new economy, peer-to-peer lending, planned obsolescence, recommendation engine, RFID, Richard Florida, Richard Thaler, ride hailing / ride sharing, sharing economy, Silicon Valley, smart grid, social web, software as a service, TaskRabbit, the built environment, the long tail, vertical integration, walkable city, yield management, young professional, Zipcar

Are there other brands that you’re keen on? How else can we make your life simpler, less costly, and more enjoyable? from the digital to the physical. Every day, more parts of the physical world join data networks. Increasingly, usage and location information from multiple sources—including embedded chips, mobile GPS, RFID tracking of goods, and UPC codes—can be fused with data collected from the Web to create digital portraits of customer preferences, including what brands they trust. Adding location data is a critical step. The new networks do not manage only strictly digital products, such as e-books; they can now connect you to physical products and services, like a hot meal (which to date can only be digitalized on Star Trek).

Other Meshy transportation companies help consumers trade cars and boats, share taxicabs, and gain access to information about public transportation. Interested in starting your own car-sharing service? The Paris-based company Eileo will steer you down the right road. It offers customized tools—including GPS, RFID, full Web-based car-sharing software, and noninvasive hardware installation—to cover all your car-sharing technology needs, from registration to invoicing. Eileo’s team of engineers is available 24/7 to help you continuously improve your car-sharing business. And their complete solutions will enable you to partner with other car-sharing services worldwide.


pages: 189 words: 57,632

Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future by Cory Doctorow

AltaVista, AOL-Time Warner, book scanning, Brewster Kahle, Burning Man, cognitive load, drop ship, en.wikipedia.org, general purpose technology, informal economy, information retrieval, Internet Archive, invention of movable type, Jeff Bezos, John Gilmore, John Perry Barlow, Law of Accelerating Returns, machine readable, Metcalfe's law, mirror neurons, Mitch Kapor, moral panic, mutually assured destruction, Neal Stephenson, new economy, optical character recognition, PalmPilot, patent troll, pattern recognition, peer-to-peer, Ponzi scheme, post scarcity, QWERTY keyboard, Ray Kurzweil, RFID, Sand Hill Road, Skype, slashdot, Snow Crash, social software, speech recognition, Steve Jobs, the long tail, Thomas Bayes, Turing test, Vernor Vinge, Wayback Machine

Futurists — consultants, technology columnists, analysts, venture capitalists, and entrepreneurial pitchmen — spill a lot of ink, phosphors, and caffeinated hot air in describing a vision for a future where we'll get more and more of whatever it is they want to sell us or warn us away from. Tomorrow will feature faster, cheaper processors, more Internet users, ubiquitous RFID tags, radically democratic political processes dominated by bloggers, massively multiplayer games whose virtual economies dwarf the physical economy. There's a lovely neologism to describe these visions: "futurismic." Futurismic media is that which depicts futurism, not the future. It is often self-serving — think of the antigrav Nikes in Back to the Future III — and it generally doesn't hold up well to scrutiny.

They knew who was telling subversive jokes—but missed the fact that the Wall was about to come down. When you watch everyone, you watch no one. This seems to have escaped the operators of the digital surveillance technologies that are taking over our cities. In the brave new world of doorbell cams, wi-fi sniffers, RFID passes, bag searches at the subway and photo lookups at office security desks, universal surveillance is seen as the universal solution to all urban ills. But the truth is that ubiquitous cameras only serve to violate the social contract that makes cities work. The key to living in a city and peacefully co-existing as a social animal in tight quarters is to set a delicate balance of seeing and not seeing.


pages: 385 words: 111,113

Augmented: Life in the Smart Lane by Brett King

23andMe, 3D printing, additive manufacturing, Affordable Care Act / Obamacare, agricultural Revolution, Airbnb, Albert Einstein, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apollo 11, Apollo Guidance Computer, Apple II, artificial general intelligence, asset allocation, augmented reality, autonomous vehicles, barriers to entry, bitcoin, Bletchley Park, blockchain, Boston Dynamics, business intelligence, business process, call centre, chief data officer, Chris Urmson, Clayton Christensen, clean water, Computing Machinery and Intelligence, congestion charging, CRISPR, crowdsourcing, cryptocurrency, data science, deep learning, DeepMind, deskilling, different worldview, disruptive innovation, distributed generation, distributed ledger, double helix, drone strike, electricity market, Elon Musk, Erik Brynjolfsson, Fellow of the Royal Society, fiat currency, financial exclusion, Flash crash, Flynn Effect, Ford Model T, future of work, gamification, Geoffrey Hinton, gig economy, gigafactory, Google Glasses, Google X / Alphabet X, Hans Lippershey, high-speed rail, Hyperloop, income inequality, industrial robot, information asymmetry, Internet of things, invention of movable type, invention of the printing press, invention of the telephone, invention of the wheel, James Dyson, Jeff Bezos, job automation, job-hopping, John Markoff, John von Neumann, Kevin Kelly, Kickstarter, Kim Stanley Robinson, Kiva Systems, Kodak vs Instagram, Leonard Kleinrock, lifelogging, low earth orbit, low skilled workers, Lyft, M-Pesa, Mark Zuckerberg, Marshall McLuhan, megacity, Metcalfe’s law, Minecraft, mobile money, money market fund, more computing power than Apollo, Neal Stephenson, Neil Armstrong, Network effects, new economy, Nick Bostrom, obamacare, Occupy movement, Oculus Rift, off grid, off-the-grid, packet switching, pattern recognition, peer-to-peer, Ray Kurzweil, retail therapy, RFID, ride hailing / ride sharing, Robert Metcalfe, Salesforce, Satoshi Nakamoto, Second Machine Age, selective serotonin reuptake inhibitor (SSRI), self-driving car, sharing economy, Shoshana Zuboff, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart grid, smart transportation, Snapchat, Snow Crash, social graph, software as a service, speech recognition, statistical model, stem cell, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, synthetic biology, systems thinking, TaskRabbit, technological singularity, TED Talk, telemarketer, telepresence, telepresence robot, Tesla Model S, The future is already here, The Future of Employment, Tim Cook: Apple, trade route, Travis Kalanick, TSMC, Turing complete, Turing test, Twitter Arab Spring, uber lyft, undersea cable, urban sprawl, V2 rocket, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, white picket fence, WikiLeaks, yottabyte

The IEM varies the current flow between the two materials to generate a digital signal which can be detected…The IEM contains no battery, antenna or radio, but rather uses the body to power the device and to pass along the unique, pill-specific signal in a private manner that is far superior to complicated, expensive and privacy-challenged approaches like RFID.” Mark Zdeblick, CTO at Proteus and co-inventor Applying Moore’s Law to implants like this, within five to ten years, this sensor will be reduced to a twentieth of its existing size, injectable and move throughout your bloodstream transmitting health data. Combined with AI, such sensors will be able to anticipate emerging issues and, in tandem with either a wearable device or your personal smartphone, could contact medical authorities to help you in times of distress.

However, to accomplish that, we will need a new technology infrastructure underpinning store experiences. Third: Augmented by Beacons For smartphones, smart glasses, a personal AI or smart wearables to respond in the retail space, something must be listening. Today, sensors and Bluetooth connected beacons surround us. iBeacons, NFC chips, radio frequency identification tags (RFID) and more sense our presence and communicate with our devices in real time. Most of the time, we’re unaware that this is happening. Connecting to millions of phones in millions of pockets, with their connected location-based services, they signal the opportunity to deliver extremely tightly focused, personalised messages, offers and promotions in real time.

Technology consulting firm Frost & Sullivan forecasts that nearly half a billion people will be using a smartphone equipped with biometrics by 2017. Figure 12.4: Smart changing rooms and mirrors allow a crossover between physical and digital. (Credit: Nordstroms-ebay fitting room) Retailers and brands like Ugg Australia, Uniqlo and Burberry are already using “magic” or “memory” mirror technologies that utilise individual profiles. RFID tags identify the product while cameras capture your image and body shape, enabling you to try on virtual outfits in different colours and styles. Once you’ve had a shopping experience in-store, that profile can then be used at home for you to make sure online goods fit you properly and see how they’ll look in a virtual fitting room experience.


pages: 230 words: 61,702

The Internet of Us: Knowing More and Understanding Less in the Age of Big Data by Michael P. Lynch

Affordable Care Act / Obamacare, Amazon Mechanical Turk, big data - Walmart - Pop Tarts, bitcoin, Cass Sunstein, Claude Shannon: information theory, cognitive load, crowdsourcing, data science, Edward Snowden, Firefox, Google Glasses, hive mind, income inequality, Internet of things, John von Neumann, meta-analysis, Nate Silver, new economy, Nick Bostrom, Panopticon Jeremy Bentham, patient HM, prediction markets, RFID, sharing economy, Steve Jobs, Steven Levy, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Twitter Arab Spring, WikiLeaks

In essence, the “Internet of Things” is a way of describing the phenomenon of networked objects—objects that are embedded with data-streaming sensors and software that connect them to the Net. The “things” in question run the gamut from autonomous connected devices like smartphones to the tiny radio-frequency identification (RFID) microchips and other sorts of sensors attached to everything from UPS trucks and cargo containers to pets, farm animals, cars, thermostats, and NFL helmets. By 2007 there were already 10 million sensors of all sorts connected to the Internet, and some projections have that number rising to 100 trillion by 2030 if not before.4 These sensors are being used not only for economic purposes but for scientific ones (to track migratory animals, for example), and for security and military purposes (such as tracking human beings).

., 182–83 markets, 122–23 searches, 155, 158–59, 183 prejudices, 72–73 primary qualities, defined, 68, 70, 74 printing press, 35, 134 Internet compared to, xv prisons, 105, 106 fishbowl strategy for, 91 Pritchard, Duncan, 132, 203 privacy: and autonomy, 89–109 as basic to human dignity, 101–9 changing concept of, 73 control and, 94–95, 186 devaluing of, 89–93, 99–100, 105 of information, 94–100 justification for invasion of, 107–9 right to, 89, 101–2 threat to, 4, 6, 89–109, 186 traded for security, 105, 108 U.S. legislation on, 93, 95–96, 108 values of, 93–95, 109 privacy policies, 105–6 prize competitions, 136–37 problem-solving sites, 136–37 procedural knowledge, 167–74 Professional Journalists’ Code of Ethics, 84 professors, 152–53 propaganda: Internet as tool for, 66, 81 political, 82–83 property, changing concept of ownership of, 73 Proposition 8 legislation, 53 prosthetics, 191 pro tanto, 198 public life, defined, 63 questioning, skill in, 16–17, 171–72 race, 72, 157, 162 racism, 147 radio-frequency identification (RFID) microchips, 7 raft metaphor, for foundation of beliefs, 129 rationalist delusion, 50–55 Rawls, John, 49 reasonableness, 40, 41–63, 90, 125, 179, 196 as anchor for belief, 132, 195 defined, 50, 55 democracy and, 55–63 devaluing of, 147–48 as rationalist’ delusion, 50–55 reasons, reasoning: arbitrary basis for, 47–48 circular, 130–32 common currency for, 50, 63 defined, 39 exchange of, 50–55 fragmentation in, 4, 41–63 Glauconian view of, 54–55, 56–58 individual sensitivity to, 84–85 knowledge based on, 15, 33, 36–40 rules of, 40 shifting the geography of, 147–48 in value judgment, 57 receptive knowledge, 26–31, 37, 48, 60–61, 153–54, 179–80, 187, 194, 203 as anchor for belief, 131–32 in motor skills, 169 reflective vs., 39, 51, 131, 154, 196 Reddit, 24, 116 reflective knowledge, 39, 51, 131, 154, 196 reliability, 14, 27–31, 39–40, 44–45, 114–16, 119–20, 123–25, 130, 194–95 religion: marriage and, 58–59 science vs., 47–49, 66 values of, 44 Republic, The (Plato), 54, 83 Republican Party, 61–62 research sharing, 135–36 responsibility, individual vs. group, 117–19 Rifkin, Jeremy, 7–8, 92, 140–41, 145, 151, 180 ring of invisibility, 54 robots: cyborg, 5–6, 191–92 as socialbots, 81–82 Rogers, Mike, 96 Romney, Mitt, 200 Rorty, Richard, 62 Rove, Karl, 50 Rudder, Christian, 157–60 Russell, Bertrand, ix, xvii–xviii, 186 Ryle, Gilbert, 168 St.


pages: 181 words: 62,775

Half Empty by David Rakoff

airport security, Buckminster Fuller, dark matter, double helix, gentrification, global pandemic, Google Earth, Herbert Marcuse, phenotype, RFID, subprime mortgage crisis, twin studies, urban planning, urban renewal, wage slave, Wall-E, Y2K

“Lillian” (Lillian was the name of Mrs. Disney) can read the radio frequency identification tag on a bag of flour, for example, and suggest recipes. She knows when one has run out of an ingredient and can connect to an online grocer and order more. That seems convenient enough, but does it require that one affix these RFID tags to all of one’s ingredients so that they fall within Lillian’s purview? That seems like a lot more work than writing a shopping list. More likely such items will be purchased already tagged by the supermarket. But will Lillian know, for example, when I’m down to three cloves of garlic? Enough for a sauce but a woefully short supply if I were contemplating making a gazpacho (he worried faggily).

At one point I park myself near one of the control panels and unilaterally select Grandpa’s Andrews Sisters playlist, not giving anyone who approaches even the slimmest of chances of changing the music for a few blessed minutes. This is just one of the many dispiriting aspects of 360 Tomorrowland Way: it would be just as jangling even without visitors, if it was only the family here. Rooms reassemble themselves upon the arrival of a new Elias, responding to RFID tags sewn into their soccer jerseys (although if two people enter the room at the same time, Mom’s preferences prevail, the Peace of the Hearth being of paramount importance). Things chez Elias are both adversarial and negligent, as though a family with shared interests who might agree upon what to hang on the walls of the dining room was somewhat laughable, as though we have all of us, up until now, been living lives of quiet desperation, muffling our desires and personal preferences in ambient music, lighting, cuisine, and artwork.


pages: 632 words: 166,729

Addiction by Design: Machine Gambling in Las Vegas by Natasha Dow Schüll

airport security, Albert Einstein, Build a better mousetrap, business intelligence, capital controls, cashless society, commoditize, corporate social responsibility, deindustrialization, dematerialisation, deskilling, emotional labour, Future Shock, game design, impulse control, information asymmetry, inventory management, iterative process, jitney, junk bonds, large denomination, late capitalism, late fees, longitudinal study, means of production, meta-analysis, Nash equilibrium, Panopticon Jeremy Bentham, Paradox of Choice, post-industrial society, postindustrial economy, profit motive, RFID, scientific management, Silicon Valley, Skinner box, Slavoj Žižek, statistical model, the built environment, yield curve, zero-sum game

“Think of the data—it would be fascinating, the stream of people and their flows.” Six years later, during an industry meeting at Station’s Red Rock Casino, Radiofrequency Identification (RFID)—originally devised to monitor the peripatetic movements of criminal offenders and soon thereafter employed by retail operations to trace the purchase of consumer products—was given a trial run among conference participants.21 Applied in casinos, RFID uses tracking tags embedded in player cards to follow patrons as they move through a space, in real time.22 By integrating transactional data and flow of movement, casinos can “analyze their customers’ every move.”23 Yet how, exactly, to make that analysis?

The Total Rewards program began as Total Gold in 1998 and changed names in 2000 with the addition of “player tiers.” By 2004, 30 million cardholders were signed up in the program, and today the number stands at 40 million. 21. Press release for G2E institute conference, February 7, 2006. 22. See Andrejevic 2007 for a discussion of the use of RFID in the domain of commerce (89–90, 122–23). 23. Barrett and Gallagher 2004. 24. Brock, Fussell, and Corney 1992. 25. Compudigm International website (www.compudigm.com, accessed June 2007). 26. Javier Saenz of Mariposa (who would become vice president of “strategy for network systems” at IGT), panelist for “Increasing Slot Revenue: New Techniques,” G2E 2007. 27.

Reith, Gerda relationship management repeat players research process Responsible Gaming Device responsible gaming: codes of conduct; director of at IGT;; inherent contradiction of; gambling industry’s campaign for; global diffusion of; and individualized risk-management return to player (RTP). See payout percentage. revenue per available customer (REVPAC) Reward and Punishment RadioFrequency Identification (RFID) RGD. See Responsible Gaming Device. Riesman, David risk society. See also Ulrich Beck. risk management: individualized; and choice making; as a logic of gambling regulation. See also actuarial self; harm minimization; self–governance; risk society. Ritzer, George RNG. See random number generator.


pages: 233 words: 67,596

Competing on Analytics: The New Science of Winning by Thomas H. Davenport, Jeanne G. Harris

always be closing, Apollo 13, big data - Walmart - Pop Tarts, business intelligence, business logic, business process, call centre, commoditize, data acquisition, digital map, en.wikipedia.org, fulfillment center, global supply chain, Great Leap Forward, high net worth, if you build it, they will come, intangible asset, inventory management, iterative process, Jeff Bezos, job satisfaction, knapsack problem, late fees, linear programming, Moneyball by Michael Lewis explains big data, Netflix Prize, new economy, performance metric, personalized medicine, quantitative hedge fund, quantitative trading / quantitative finance, recommendation engine, RFID, search inside the book, shareholder value, six sigma, statistical model, supply-chain management, text mining, The future is already here, the long tail, the scientific method, traveling salesman, yield management

Procter & Gamble, for example, used a variety of analytical techniques before its acquisition of Gillette, including those for logistics and supply chains, drivers of stock market value, and human resources. In a few years, firms that do not employ extensive analytics in making a major acquisition will be considered irresponsible. Indeed, trends point to a more analytical future for virtually every firm. The amount of data available will only continue to increase. Radio frequency identification (RFID) devices will be put on virtually every pallet or carton that moves through the supply chain, generating vast amounts of new data for companies to collect and analyze. In retail, every shopping cart will be intelligent enough to gather data on “pickstreams,” or a record of which products are taken off the shelves in what order.

Data can also come from the sources popularized in the movies: e-mail, voice applications, images (maps and photos available through the Internet), and biometrics (fingerprints and iris identification). The further the data type is from standard numbers and letters, however, the harder it is to integrate with other data and analyze. More data about the physical world, through sensor technology and radio frequency identification (RFID) tags, is becoming available as well. Some packages can communicate their physical condition—for example, a case of wine could be monitored to see whether it is being kept at the proper temperature. It can be difficult and expensive to capture some highly valuable data. (In some cases, it might even be illegal—for example, sensitive customer information or competitor intelligence about new product plans or pricing strategies.)


The Future of Technology by Tom Standage

air freight, Alan Greenspan, barriers to entry, business process, business process outsourcing, call centre, Clayton Christensen, computer vision, connected car, corporate governance, creative destruction, disintermediation, disruptive innovation, distributed generation, double helix, experimental economics, financial engineering, Ford Model T, full employment, hydrogen economy, hype cycle, industrial robot, informal economy, information asymmetry, information security, interchangeable parts, job satisfaction, labour market flexibility, Larry Ellison, Marc Andreessen, Marc Benioff, market design, Menlo Park, millennium bug, moral hazard, natural language processing, Network effects, new economy, Nicholas Carr, optical character recognition, PalmPilot, railway mania, rent-seeking, RFID, Salesforce, seminal paper, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, six sigma, Skype, smart grid, software as a service, spectrum auction, speech recognition, stem cell, Steve Ballmer, Steve Jurvetson, technological determinism, technology bubble, telemarketer, transcontinental railway, vertical integration, Y2K

Whether railways, cars or even electricity, all are relatively limited technologies compared with it, which in time is likely to embrace the whole of business and society. Currently, wireless technologies are all the rage, although again nobody knows how much money will be in it for vendors and carriers. Optimists hope that surfers will soon be able to roam around freely and remain continuously connected to the internet. And small radio chips called rfid tags will make it possible to track everything and anything, promising to make supply chains much more efficient. But even a new killer application is unlikely to bring back the good old times. “After a crash, much of the glamour of the new technology is gone,” writes Brian Arthur, an economist at the Santa Fe Institute.

Currently, the ces technophiles are excited about two trends in particular. The first is that every single electronic device will soon be connected to the internet. This includes the obvious, such as mobile phones and tv sets, and the less obvious, such as shirts and nappies that carry tiny radio-frequency identification (rfid) tags. Microsoft talks about its “connected-car” project, which conjures up images of drivers rebooting on the motorway. But the direction is clear. In future, most people in rich countries will be “always on”, and will connect to the internet through something other than a pc. The other, and related, big idea concerns what some vendors call “the digital home” and others the “e-home”.

O’Neil, David 73 O’Neil, John 28, 30 OneSaf 197 online banks 37 online shopping viii, 37 open standards 7, 10, 22–7, 31, 38, 43, 85–7, 115, 118–19, 152 operating systems 9, 10, 23–5, 31, 38, 85, 101, 109 operators, mobile phones 157–61, 162–9 Opsware 8, 15 optical-character recognition 121 Oracle 5, 20–2, 33, 38, 39–40, 46, 56, 62, 86, 243 Orange 157–8 organic IT 13–16, 88 original design manufacturers (ODMs), mobile phones 156–7 O’Roarke, Brian 192 O’Roarke, John 96 Orr, Scott 187 orthogonal frequency-division multiplexing (OFDM) 212–13, 215–17 INDEX Otellini, Paul 11, 95 outshored developments, software 38, 115, 138–9 outsourcing viii, 9, 19–20, 22, 38, 68–9, 71, 72, 88–92, 112–46, 158–60 see also globalisation barriers 121–2, 143 concepts 112–46 costs 112–24, 131–5, 140–3 cultural issues 122, 142 Europe 140–6 historical background 119–20, 125–6, 133 India 38, 109, 112–15, 119–22, 125–35, 137–8, 140–6 legal agreements 121–4 mobile phones 155–6, 158–60 opportunities 144–6 protectionists 140–6 reasons 123–4, 143 services 113–30 social outsourcing 143 “overshoot” stage, industries 9, 10–11, 109 overview vii–x, 6–7 Ovi, Alessandro 275–6 Oxford GlycoSciences 243 P Pacific Cycle 140 Page, Larry 9 Pait, Rob 207 Palladium 74, 76 Palm Pilot 150 Palmisano, Samuel 22 Paltrow, Gwyneth 173 Panasonic 156 Papadopoulos, Greg 14, 78–9, 83–4, 91 Papadopoulos, Stelios 237 Parker, Andrew 143 Parks Associates 96, 203 Parr, Doug 319 particulate filters 296–7 passwords 53, 58–61, 67, 96–7 patents, nanotechnology 321–6, 329 Patriot Act, America 35 PCs 9–16, 78–81, 82–110, 151, 171–3, 202–18 see also digital homes; hardware commoditisation issues 9–16, 132–5, 203 complexity issues 78–81, 82–110 screen sizes 100–1 UWB 214–18 Wi-Fi 209–18 PDAs see personal digital assistants Peck, Art 203 PentaSafe Security 60 Pentium chips 199–200 PeopleSoft 39, 86, 119, 126, 132 Perez, Carlota 5–6, 134 performance issues see also processing power; returns cars 291–8 Cell chips 198–200 cost links 29–30 Perlegen 244 personal digital assistants (PDAs) 151, 277, 279 see also handheld computers personal video recorders (PVRs) 203, 205–6 perverse incentives, security issues 61–2 Pescatore, John 55 Pfizer 69, 240, 247, 312, 315 pharmaceutical companies 239–40, 241–50, 312 PHAs 260 Philippines 130 Philips 120, 217 “phishing” 76, 89 phonograph 82, 84 photo-voltaic cells 280 photos ix, 78, 95, 101, 179–83 Physiome 248 Picardi, Tony 79 Pick, Adam 156 Pink Floyd 225 Piper, H. 292 Pittsburgh convention centre 304 Pivotal 187 plasma screens 230–2 plastics 238–9, 259–64 PlayStation 191–2, 199–200, 206–7 plug-and-play devices 78 plug-in hybrid cars 295–6 Poland 120 police involvement, security breaches 72 polio 265 politics 32–5 see also governments Pollard, John 157 pollution 275, 296–7, 299–304, 319 Pop Idol (TV show) 225 Pope, Alexander 267 Porsche 292 “post-technology” period, IT industry vii, 5–7 Powell, Michael 98, 206 power grids 233, 285–90 PowerPoint presentations 4–5, 107 Predictive Networks 337 Presley, Elvis 225 prices, downward trends viii, 4–7 PricewaterhouseCoopers 38 printers 78, 96 privacy issues 27, 34, 42–8, 179–83 see also security... mobile phones 179–83 processing power see also computer chips 353 THE FUTURE OF TECHNOLOGY exponential growth 4–7, 8–14 Proctor, Donald 106 Prodi, Romano 274–5 profits, future prospects 7, 17–18, 37–40 proprietary technology 24, 26, 80, 86 protectionists, outsourcing 140–6 proteins, biotechnology 241–64 protocols, complexity issues 86 Proxim 210 Prozac 315 PSA Peugeot Citroën 293, 296–7 PSP, Sony 191–3 public accounts 44 Pullin, Graham 177–8 PVRs see personal video recorders Q Qualcomm 164 quantum dots 312, 317, 322, 325 R radiation fears, mobile phones 176 radio 34–5, 36, 39, 94–5, 108, 155–61, 164, 209–18, 223 see also wireless... chips 155–61, 164 “garbage bands” 209–10, 215 music industry 223 spectrum 34–5, 94–5, 209–18 UWB 96–7, 214–19 Radjou, Navi 333–4 railway age vii, 5, 7, 23, 36, 39, 134 Raleigh, Greg 211 RAND 195 rationalisation exercises 31 RCA 108–9, 206, 208, 220, 315 real-world skills, gaming comparisons 194–7 RealNetworks 203 rechargeable batteries 280–4 Recourse Technologies 62–3 Reed, Philip 177 regulations 35, 44, 209–10, 326–9 see also legal issues relational databases 101–2 reliability needs viii, 42–8 religion 19 renewable energy 275–6, 286, 289, 300, 310, 315 ReplayTV 205 Research in Motion (RIM) 152–3 resistance problems, employees 31 return on investment (ROI) 30–1 returns 20, 29–31, 329 see also performance issues risk 20, 30, 329 revenue streams biotechnology 237–8, 241–2 354 gaming 189–90, 191 GM 251–2 mobile phones 151, 154–5, 157, 162–3, 165–6, 174 nanotechnology 321–6 revolutionary ideas vii–viii, 5–7, 13–14, 36–40, 80–4, 107–10, 116, 134, 151–3, 198–200, 236–40, 326–9 RFID radio tags 39, 94–5 Rhapsody 203 Ricardo 296–7 Riley, James, Lieutenant-Colonel 195–7 RIM see Research in Motion ringtones 165–6 RISC chips 200 risk assessments 70–4, 76 attitudes 18 handling methods 71 insurance policies 71–3 management 70–4 mitigation 71–3 outsourced risk 71, 72, 88–92 returns 20, 30, 329 security issues 42–8, 49–69, 70–4 RNA molecules 241–2, 249–50, 265 Robinson, Shane 15–16 robotics x, 233, 316, 332–5 Roco, Mihail 309 Rodgers, T.J. 32 Rofheart, Martin 216–17 Rogers, Richard 300 ROI see return on investment Rolls, Steve 121 Romm, Joseph 298 Roomba 332, 334–5 “root kit” software 51 Rose, John 226 Roslin Institute 256 Roy, Raman 125–8 Russia 115, 130, 140, 142, 145, 319 Ryan, John 312 S S700 mobile phone 171 Saffo, Paul 83–4, 103, 182 Salesforce.com 19, 20, 84, 91–2, 109 Samsung 158–60, 181, 208, 217, 231, 277 Santa Fe Institute 39 SAP 22, 38, 86, 119, 126, 132 satellite television 205 Saudi Arabia 180 scandals 28 scanning tunnelling microscope (STM) 306 SCC see Sustainable Computing Consortium Schadler, Ted 95, 97 Schainker, Robert 285, 289 INDEX Scherf, Kurt 96–7 Schmelzer, Robert 91 Schmidt, Eric 9, 35, 36–8 Schmidt, Nathan 66 Schneider National 29–31 Schneier, Bruce 43, 58, 61–2, 65, 70, 73–4 schools, surveillance technology 181 Schwartz, John 46 Schwinn 140, 143 Scott, Tony 43, 68–9 screen sizes 100–1 screws 23–4 Seagate Technology 207 seamless computing 96–7 Sears, Roebuck & Co 36 Securities and Exchange Commission 321 security issues viii, 25–7, 32–5, 42–8, 49–74, 86–7 see also privacy... airport approach 68–9 anti-virus software 50–1, 60, 67–8 biometric systems 60, 64–5, 71, 74 breaches 43–4, 46, 49–52, 62, 72–3 civil liberties 74 concepts 42–74, 86–7 costs 45–6, 50–1, 62, 70–4 employees 58–63, 69 encryption 53–4 firewalls 51–3, 58, 60, 62, 66–8, 71, 86–7 hackers 4, 43, 47, 49, 51–3, 58–63 handheld computers 67–8 honeypot decoys 62–3 human factors 57–63, 69 identity management 69 IDSs 51, 53–4, 62, 87 impact assessments 70–1, 76 insider attacks 62–3 insurance policies 71–3 internet 35, 42–8, 49–57, 61–2, 66, 66–7, 71, 73–6, 179–83 job vacancies 46 joint ventures 67 major threats 35, 42, 43, 47, 49–63, 66–9 management approaches 60–3, 69 Microsoft 54–6, 72, 74, 76 misconceptions 46–8 networks 42–8, 49–65, 66–9 passwords 53, 58–61, 67, 96–7 patches 56–7, 76 perverse incentives 61–2 police involvement 72 risk assessments 70–4, 76 standards 71–3 terrorism 35, 42, 43, 50, 65, 74, 75–6, 265–6 tools 49–63, 86–7 viruses 45, 47, 49–56, 59–60, 67–8, 74, 86, 89 Wi-Fi 66–7, 93 sedimentation factors 8–9, 84 segmentation issues, mobile phones 167–9 self-configuration concepts 88–9 Sellers, William 23 Seminis 254 Sendo 160 Senegal 182 September 11th 2001 terrorist attacks 35, 42, 43, 50, 65, 75 servers 9–16, 37–8, 62–3, 85–7, 132–3, 203 services industry 14, 17–22, 25–7, 31, 36–40, 80, 88–92, 109, 113–35, 203 see also web services outsourcing 113–46 session initiation protocol (SIP) 104–6 sewing machines 82, 84 SG Cowen 237 shapes, mobile phones 170–6 Shapiro, Carl 24 Sharp 156, 231, 326 shelfware phenomenon 20 Shelley, Mary 267, 269 shipping costs 121 sick building syndrome 302 Siebel 86 Siemens 120, 130, 142, 156, 159, 170, 172, 174 SightSpeed 84, 98, 103 SilentRunner 62 Silicon Valley 9, 32–40, 45–6, 54, 69, 79, 96, 98, 101, 103, 152, 313–14, 321 silk 263, 269 Simon, Herbert 336 simplicity needs 78–81, 84, 87, 88–92, 98–110 SIP see session initiation protocol Sircam virus 45, 49 Sirkin, Hal 120, 140 “six sigma” methods 128 SK 169 Skidmore, Owings & Merrill 302 Sky 205 Skype 103–4, 110 Sloan School of Management, MIT 30 Slovakia 120 small screens 100 Smalley, Richard 311 smallpox 265–6 smart power grids 233, 285–90 smartcards 64, 69 smartphones 150–3, 157–61 see also mobile phones SMES devices 289 Smith Barney 37 Smith, George 307–8 Smith, Lamar 75 Smith, Vernon 17 SNP 243–4 SOAP 25–7 355 THE FUTURE OF TECHNOLOGY social issues mobile phones 177–8, 182–3 music players 220–1 social outsourcing 143 software see also information technology ASPs 19–20, 91–2, 109 bugs 20–1, 54–6 Cell chips 198–200 commoditisation issues 10–16, 25, 132–5, 159, 203 complexity issues 14–15, 78–81, 82–110, 117–22 firewalls 52–3, 58, 86–7 hackers 51–3, 58–63 Java programming language 21–2, 25, 86 management software 13–16, 21–2, 88, 117–18 mobile phones 158–9 natural-language search software 339–40 operating systems 9, 10, 23–5, 31, 38, 85, 101, 109 outsourcing 38, 115, 138–9 patches 56–7, 76 premature releases 20–1 shelfware phenomenon 20 viruses 45, 47, 49–56, 59–60, 67, 74, 89 solar power 275–6, 286, 289, 301–2, 310, 315, 325 Solectron 112–13, 119 solid-state storage media 204, 207, 219 SOMO... project, mobile phones 177–8 Sony 95, 108, 156, 191–3, 198–200, 203, 206–7, 217, 228, 231, 282–4, 332, 334, 338 Sony Ericsson 156, 158, 159–60, 171 Sony/BMG 222–3, 227, 229 Sood, Rahul 38 Sorrent 187 South Africa 309, 319, 334 South Korea 156, 158, 163–5, 167–9, 170–1, 181, 319 soyabean crops 252–4 spam 76, 89, 118 Spar, Debora 32–3 speculation vii speech recognition 102, 121, 336 SPH-V5400 mobile phone 208 Spider-Man 189–90 Spinks, David 60–1, 63 Spitzer, Eliot 223 Sprint 167–8, 180–1 SQL 53 @Stake 54 Standage, Ella 316 standards green buildings 300–4 open standards 7, 10, 22–7, 31, 38, 43, 85–7, 115, 118–19, 152 356 security issues 71–3 W-CDMA standard 163–4, 168 web services 90–1 Wi-Fi 210–13 Stanford University 82, 137 Star Wars (movie) 186 steam power ix, 5, 134 steel industry 134 steering committees 31 stem cells 268–9 Steven Winter Associates 302 Stewart, Martha 249 STM see scanning tunnelling microscope stop-start hybrid cars 293–4 storage problems, electricity 275–6, 289–90 StorageTek 85 strategy 30 stress-resistance, biotechnology 254 Studio Daniel Libeskind 302 Sturiale, Nick 45 Sun Microsystems 9, 13–15, 21–2, 25, 27, 37–8, 43, 56, 58, 78–9, 83, 85, 87, 91, 102 supercomputers 199–200 Superdome machines 21 supply chains 8, 37–40, 155 surveillance technology 35, 74, 179–83, 309 Sussex University 5, 220, 310 Sustainable Computing Consortium (SCC) 27 Sweden 109 Swiss Army-knife design, mobile phones 171–2 Swiss Re Tower, 30 St Mary Axe 299, 301–2, 304 swivel design, mobile phones 171 Symantec 39, 46, 50, 62–3, 67 Symbian 158 Symbol 210 synthetic materials 258–64, 317 systems analysts 137 T T-Mobile 167–8 Taiwan 156–7, 160 Talwar, Vikram 144 Taylor, Andy 226 Taylor, Carson 287 TCP/IP 25 TCS 132–5, 145–6 Teague, Clayton 314 TechNet 33 techniques, technology 17–18 techno-jewellery design, mobile phones 172–4 technology see also individual technologies concepts vii–x, 4–7, 17–18, 23–7, 32–3, 82–4, 134, 326–9 cultural issues 93–4, 142 INDEX geekiness problems 83–4 government links 7, 18, 27, 31–5, 43–8, 123–4, 179–83, 209–10 Luddites 327 surveillance technology 35, 74, 179–83, 309 Tehrani, Rich 105 telecommunications viii, 23, 26, 103–6, 134, 164–5 telegraph 32–3, 108 telephone systems 84, 103–6, 109–10, 212–13, 214 Telia 109 terrorism 35, 42, 43, 50, 65, 74, 75–6, 265–6 Tesco 168 Tetris 12 Texas Energy Centre 287 Texas Instruments 125–6, 217 text-messaging facilities 165, 167 Thelands, Mike 164 therapeutic antibodies 249–50, 256–7 Thiercy, Max 339–40 thin clients 102 third-generation mobile phone networks (3G) 151, 162–9, 212 Thomas, Jim 318 Thomson, Ken 59 Thornley, Tony 164 3G networks see third-generation mobile phone networks TIA see Total Information Awareness TiVo 203, 205–6 Tomb Raider (game/movie) 187–8 Toshiba 156, 198–200, 203 Total Information Awareness (TIA) 35 toxicity issues, nanotechnology 316–17, 319, 328–9 Toyota 291–5, 297, 300–1, 334 toys see also gaming robotics 334 transatlantic cable 36, 39 transistors 4–7, 8–12, 85–7, 109 see also computer chips Transmeta 313 Treat, Brad 84, 98 Tredennick, Nick 10–11 Treo 150, 153 “Trojan horse” software 51–2 True Crime (game) 187 TruSecure 52, 60, 63 TTPCom 155–6 Tuch, Bruce 210 TVs see also video recorders flat-panel displays ix, 94, 147, 202–3, 230–2, 311 hard disks 204–8 screens 202–3, 230–2 set-top boxes 203, 205–6 UWB 214–18 Wi-Fi 212–18 U UBS Warburg 31, 45, 80–1, 89, 170, 174 UDDI 25–7 ultrawideband (UWB) 96–7, 214–19 UMTS see W-CDMA standard “undershoot” stage, industries 9, 109 UNECE 332–4 Ungerman, Jerry 52 Unimate 332–3 United Airlines 27 Universal Music 222–3, 226–7 Unix 9, 25, 85, 108 USB ports 78 usernames 59 USGBC 300–2 utility companies, cyber-terrorism threats 75–6 utility factors 7, 16, 17, 19–22, 42–8 UWB see ultrawideband V V500 mobile phone 157 vaccines 265–6 Vadasz, Les 33 Vail, Tim 290 value added 5–7, 37–40, 133, 138–9 value transistors 11 van Nee, Richard 211 Varian, Hal 24 VC see venture capital Veeco Instruments 324 vendors complexity issues 84–110 consumer needs 94–7 Venter, Craig 262–3, 271 venture capital (VC) 12, 31, 45, 79, 92, 107, 126–7, 238, 308, 321–6 Verdia 254–5, 261 Veritas 39, 85 Vertex 247 vertical integration, mobile phones 156–61 Vertu brand 173–4 Viacom 224 video phone calls 84, 103–6, 164–5, 167–8 video recorders see also TVs DVRs 205–6 handheld video players 206 hard disks 204–8 PVRs 203, 205–6 Wi-Fi 212–13 video searches, Google 11 357 THE FUTURE OF TECHNOLOGY Video Voyeurism Prevention Act, America 180 video-game consoles see gaming Virgin 95, 160, 167–8 Virgin Mobile 160, 167–8 virtual private networks (VPNs) 54, 68, 86–7 virtual tissue, biotechnology 248 virtualisation concepts 15–16, 88–92 viruses 45, 47, 49–56, 59–60, 67–8, 74, 86, 89 anti-virus software 50–1, 60, 67–8 concepts 49–56, 59–60, 74 costs 50–1 double-clicking dangers 59–60 Vista Research 46, 62, 67 Vodafone 164–5 voice conversations internet 103–6 mobile phones 165–9, 171 voice mail 104–6 voice-over-internet protocol (VOIP) 103–6, 167 Vonage 104, 110 VPNs see virtual private networks W W3C see World Wide Web Consortium W-CDMA standard 163–4, 168 Waksal, Sam 249 Wal-Mart 95, 114–15, 131–2, 140, 224, 228 Walkman 192 warfare AI 338 biotechnology 265–6 gaming comparisons 195–7, 339 nanotechnology 319 Warner Music 222–3, 226–7 Watson, James 236, 247, 271 web services 21–2, 25–7, 31, 80, 88–92, 109, 203 see also internet; services... complexity issues 88–92, 109 standards 90–1 Webster, Mark 211 WECA see Wireless Ethernet Compatibility Alliance Weill, Peter 30 Welland, Mark 318 Western Union 33, 108 Westinghouse Electric 332 wheat 253 white page 99–100 Wi-Fi 34–5, 66–7, 93, 95–7, 153, 203, 209–18 concepts 209–18 forecasts 209, 212–13 historical background 209–13 hotspots 211–12 mobile phones 212 standards 210–13 358 threats 212–13 UWB 214–18 Wilkerson, John 237 Williams, Robbie 222, 226 Wilsdon, James 318 WiMax 212–13 WiMedia 213 Wimmer, Eckard 265 wind power 275–6, 286, 289–90, 302 Windows 15, 24–5, 55–6, 96, 101, 108, 152, 203 Windows Media Center 203 WinFS 101 Wipro 112, 115, 120–1, 125–9, 131–5, 138, 145–6 Wireless Ethernet Compatibility Alliance (WECA) 211 wireless technology ix, 11, 34–5, 39, 66–7, 93, 95–7, 109–10, 147, 150–3, 167, 168–9, 171–3, 203, 209–13, 334 see also Wi-Fi Bluetooth wireless links 171–2, 173, 214–15, 218 concepts 209–13, 334 historical background 209–13 Wladawsky-Berger, Irving vii, 5, 19, 22, 25, 38–9 Wolfe, Josh 323 Wong, Leonard 195 Wood, Ben 156–7, 160, 174 Woodcock, Steven 338–9 Word 84, 107 work-life balance 80–1, 94 see also employees World Wide Web Consortium (W3C) 25 worm viruses 49–50, 59, 86, 89 Wright, Myles 118 “ws splat” 90–1 WSDL 25–7 X x-ray crystallography 247–8 Xbox 189, 206–7 Xelibri mobile phones 170, 172, 174 Xerox 108–9 XML see extensible markup language XtremeSpectrum 216 Y Y2K crisis 76, 126, 128 Yagan, Sam 229 Yanagi, Soetsu 84 Yurek, Greg 288 Z ZapThink 91


pages: 410 words: 119,823

Radical Technologies: The Design of Everyday Life by Adam Greenfield

3D printing, Airbnb, algorithmic bias, algorithmic management, AlphaGo, augmented reality, autonomous vehicles, bank run, barriers to entry, basic income, bitcoin, Black Lives Matter, blockchain, Boston Dynamics, business intelligence, business process, Californian Ideology, call centre, cellular automata, centralized clearinghouse, centre right, Chuck Templeton: OpenTable:, circular economy, cloud computing, Cody Wilson, collective bargaining, combinatorial explosion, Computer Numeric Control, computer vision, Conway's Game of Life, CRISPR, cryptocurrency, David Graeber, deep learning, DeepMind, dematerialisation, digital map, disruptive innovation, distributed ledger, driverless car, drone strike, Elon Musk, Ethereum, ethereum blockchain, facts on the ground, fiat currency, fulfillment center, gentrification, global supply chain, global village, Goodhart's law, Google Glasses, Herman Kahn, Ian Bogost, IBM and the Holocaust, industrial robot, informal economy, information retrieval, Internet of things, Jacob Silverman, James Watt: steam engine, Jane Jacobs, Jeff Bezos, Jeff Hawkins, job automation, jobs below the API, John Conway, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Perry Barlow, John von Neumann, joint-stock company, Kevin Kelly, Kickstarter, Kiva Systems, late capitalism, Leo Hollis, license plate recognition, lifelogging, M-Pesa, Mark Zuckerberg, means of production, megacity, megastructure, minimum viable product, money: store of value / unit of account / medium of exchange, natural language processing, Network effects, New Urbanism, Nick Bostrom, Occupy movement, Oculus Rift, off-the-grid, PalmPilot, Pareto efficiency, pattern recognition, Pearl River Delta, performance metric, Peter Eisenman, Peter Thiel, planetary scale, Ponzi scheme, post scarcity, post-work, printed gun, proprietary trading, RAND corporation, recommendation engine, RFID, rolodex, Rutger Bregman, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, sharing economy, Shenzhen special economic zone , Sidewalk Labs, Silicon Valley, smart cities, smart contracts, social intelligence, sorting algorithm, special economic zone, speech recognition, stakhanovite, statistical model, stem cell, technoutopianism, Tesla Model S, the built environment, The Death and Life of Great American Cities, The Future of Employment, Tony Fadell, transaction costs, Uber for X, undersea cable, universal basic income, urban planning, urban sprawl, vertical integration, Vitalik Buterin, warehouse robotics, When a measure becomes a target, Whole Earth Review, WikiLeaks, women in the workforce

Behind the wheel, the learning algorithm and the multispectral sensor do for the human driver, moving vehicles across the land more swiftly, more reliably, and more safely than the most responsible flesh-and-blood operator, whether they are charged with the transportation of freight or of passengers. In the warehouse and the loading dock, the standardized container, the RFID tag, the autonomous pallet sled, and the development of sprawling big-box distribution centers that are very little other than enormous robotic systems in themselves—all these things sooner or later settle a quietus onto the prospect of unskilled employment in the fulfillment and logistics sector.

It is the skeletal, 3D-printed drone that supervises her eviction, and the gait-recognition and station-keeping algorithms that keep it locked on her until she’s safely offsite; the augmented reality interface that allows a security guard eight thousand miles away to watch her through that drone’s eyes, and the fact that he’ll do that work for fifty US cents an hour, grateful to have any job at all in the charnelhouse of his domestic economy. It’s the high-resolution immersive VR that keeps the neighbors twitching in their flats next door, docilized, politically decorticated and completely uninterested in what’s happening. It is the RFID tags ensuring that any moveable property belonging to her landlord remains on the premises. It is even the landlord itself—an autonomous parastatal enterprise without human shareholders, whose portfolio operates at such a narrow margin of profitability that her flat is already rented to a new tenant by the time she’s a metro stop away.

., 195 Ostrom, Elinor, 171 output neuron, 215 overtransparency, 240–1, 243 Pai, Sidhant, 98 Pandora music service, 220 Panmunjom Truce Village, 65 Pareto optimality, 55, 59 Paris, 1–6, 292 Pasquale, Frank, 244, 253 path dependence, 232, 299 PayPal, 120, 136, 220 PCWorld, 45 People Analytics, 198, 226, 232 perceptron, 214 Père Lachaise cemetery, 2, 5, 26 persoonskaart, Dutch identity card, 60 Pew Research Center, 41, 193 Pinellas County, Florida, 256 Placemeter, 51 polylactic acid plastic filament (PLA), 94, 98, 101 Pokémon Go, 63–5, 76, 79 Polari, 311 policy network, 264 Pollock, Jackson, 261 Pony Express, 256 porosity, 28, 173 POSIWID, 155, 302 Postcapitalism (Paul Mason), 88 power/knowledge, 62 predictive policing, 227, 230, 232, 235 PredPol, 229, 231, 236, 244, 254 proof-of-work, 128–30, 140–1, 143, 290 prosopagnosia. See faceblindness Protoprint, 99–100, 102 provisioning of mobile phone service, 17, 56 Průša, Josef, 105 psychogeography, 40, 51 Quantified Self movement, 33–6, 40 Radical Networks conference, 314 radio frequency identification (RFID), 200, 296 Radiohead, 35 RAND Corporation, 56–8 RATP, 5 recall, 217, 234–5 redboxing, 229–30 regtech, 157 Reich, Robert, 196 Relentless (AN and Omerod), 265 Rensi, Ed, 195 RepRap 3D printer, 86–7, 93, 104–5, 306 RER, 2, 5 Richelieu, Cardinal, 62 Rifkin, Jeremy, 88, 205, 312 RiteAid, 197 Riverton, Wyoming, 63 Royal Dutch Shell Long-Term Studies Group, 287 Samsung, 285–6 Sandvig, Christian, 252 “Satoshi Nakamoto,” 115, 118, 147, 303 scenario planning, 287 Schneier, Bruce, 45, 243 Scott, James C., 311 SCUM Manifesto (Valerie Solanas), 191 Seoul, 6, 18, 54, 264–5, 284 Metro, 54 Sennett, Richard, 111 sentiment analysis, 198 Serra, Richard, 70 SHA–256 hashing algorithm, 123 Shenzhen Special Economic Zone, 18–19, 43 Shodan search engine, 43 Shoreditch, London neighborhood, 136 Shteyngart, Gary, 246 Sidewalk Labs.


pages: 398 words: 120,801

Little Brother by Cory Doctorow

Aaron Swartz, airport security, Bayesian statistics, Berlin Wall, citizen journalism, Firefox, game design, Golden Gate Park, Haight Ashbury, Internet Archive, Isaac Newton, Jane Jacobs, Jeff Bezos, John Gilmore, John Perry Barlow, mail merge, Mitch Kapor, MITM: man-in-the-middle, Neal Stephenson, RFID, San Francisco homelessness, Sand Hill Road, Silicon Valley, slashdot, Steve Jobs, Steve Wozniak, Thomas Bayes, web of trust, zero day

The guru of "citizen journalism" is Dan Gillmor, who is presently running the Center for Citizen Media at Harvard and UC Berkeley -- he also wrote a hell of a book on the subject, "We, the Media" (O'Reilly, 2004). If you want to learn more about hacking arphids, start with Annalee Newitz's Wired Magazine article "The RFID Hacking Underground" (www.wirednews.com/wired/archive/14.05/rfid.html). Adam Greenfield's "Everyware" (New Riders Press, 2006) is a chilling look at the dangers of a world of arphids. Neal Gershenfeld's Fab Lab at MIT (fab.cba.mit.edu) is hacking out the world's first real, cheap "3D printers" that can pump out any object you can dream of.

She kissed me then, and I kissed her back, and it was some time before we went out for that burrito. &&& Afterword by Bruce Schneier I'm a security technologist. My job is making people secure. I think about security systems and how to break them. Then, how to make them more secure. Computer security systems. Surveillance systems. Airplane security systems and voting machines and RFID chips and everything else. Cory invited me into the last few pages of his book because he wanted me to tell you that security is fun. It's incredibly fun. It's cat and mouse, who can outsmart whom, hunter versus hunted fun. I think it's the most fun job you can possibly have. If you thought it was fun to read about Marcus outsmarting the gait-recognition cameras with rocks in his shoes, think of how much more fun it would be if you were the first person in the world to think of that.


pages: 291 words: 77,596

Total Recall: How the E-Memory Revolution Will Change Everything by Gordon Bell, Jim Gemmell

airport security, Albert Einstein, book scanning, cloud computing, Computing Machinery and Intelligence, conceptual framework, Douglas Engelbart, full text search, information retrieval, invention of writing, inventory management, Isaac Newton, Ivan Sutherland, John Markoff, language acquisition, lifelogging, Menlo Park, optical character recognition, pattern recognition, performance metric, RAND corporation, RFID, semantic web, Silicon Valley, Skype, social web, statistical model, Stephen Hawking, Steve Ballmer, Steve Bannon, Ted Nelson, telepresence, Turing test, Vannevar Bush, web application

In addition to giving you all the right reminders, it will not be too long before your e-memories will fill in your other absentminded gaps. Your increasingly location-aware cell phone will remind you where you parked your car. You will track where you have left things like your glasses, either by noting where your devices last detected their RFID tag, or by taking pictures of them. When your mind is absent, your e-memory will always be there. Having too much on my mind doesn’t just make me absentminded; it can make me feel mentally cluttered, impeding my productivity. David Allen’s popular book and seminar series Getting Things Done stands on the central premise that we are hindered by mental clutter: First of all, if it’s on your mind, your mind isn’t clear.

Their father, John, lies down in his bed, and a wireless unit underneath the mattress communicates with his pacemaker, downloading the story of his heart for the day. Almost every month, his medication is slightly adjusted based on pacemaker data. Several times, a trend of his weight combined with heart activity leads to messages from his e-Nurse. The e-Nurse remarks that these episodes seem to follow times the RFID sensor in the fridge has tracked chocolate ice-cream purchases. John has believed he could get away with a “little bit” of his favorite dessert, and is chagrined to learn he cannot. Our health care has been built on limited, spotty data. It reminds me of the guy building a house mostly by “eyeballing” it, with only rare use of his tape measure, level, or square.


pages: 252 words: 79,452

To Be a Machine: Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving the Modest Problem of Death by Mark O'Connell

"World Economic Forum" Davos, 3D printing, Ada Lovelace, AI winter, Airbnb, Albert Einstein, AlphaGo, Amazon Picking Challenge, artificial general intelligence, Bletchley Park, Boston Dynamics, brain emulation, Charles Babbage, clean water, cognitive dissonance, computer age, cosmological principle, dark matter, DeepMind, disruptive innovation, double helix, Edward Snowden, effective altruism, Elon Musk, Extropian, friendly AI, global pandemic, Great Leap Forward, Hans Moravec, impulse control, income inequality, invention of the wheel, Jacques de Vaucanson, John von Neumann, knowledge economy, Law of Accelerating Returns, Lewis Mumford, life extension, lifelogging, Lyft, Mars Rover, means of production, military-industrial complex, Nick Bostrom, Norbert Wiener, paperclip maximiser, Peter Thiel, profit motive, radical life extension, Ray Kurzweil, RFID, San Francisco homelessness, self-driving car, sharing economy, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Singularitarianism, Skype, SoftBank, Stephen Hawking, Steve Wozniak, superintelligent machines, tech billionaire, technological singularity, technoutopianism, TED Talk, The Coming Technological Singularity, Travis Kalanick, trickle-down economics, Turing machine, uber lyft, Vernor Vinge

“This guy’s like some kind of quote-generating machine,” I said to Marlo, as we waited for the panel to start. I was kneading my wrist, massaging its crude technology of ligament and cartilage, the seized carpal machinery beneath its casing of skin. “My writing hand’s fucked already,” I said. “Maybe you guys could fix me up with some kind of transcription upgrade.” Marlo chuckled, and showed me an RFID chip he’d implanted in the back of his own hand, probing it back and forth through the thin layer of flesh with an index finger. It was roughly the size and shape of a paracetamol capsule. In theory, it enabled him to wave his hand and unlock the front door of HackPittsburgh, the laboratory space downtown where they sometimes worked when they needed more high-grade equipment, but as a new employee he didn’t have clearance, so it basically just sat there, a dormant cell of technology awaiting its commands.

He was aware of the extent to which people found this idea repugnant, but again seemed basically untroubled. His response to concerns about this advocation of unprecedented intrusion of government into the lives—into the very bodies—of human beings was to say that “maybe Big Brother isn’t the bad guy, if he protects us from ISIS.” Besides, he himself had had an RFID chip implanted at a grinder event earlier in his campaign tour, and the procedure had been much less painful than you’d think. Once the refugees were deemed not to be a threat to public safety—after a probationary period of, say, three years—they might even choose not to have their microchips removed, given that the technology would soon enable them to pay for coffee in Starbucks by waving their hands at a chip reader.


Raw Data Is an Oxymoron by Lisa Gitelman

23andMe, collateralized debt obligation, computer age, continuous integration, crowdsourcing, disruptive innovation, Drosophila, Edmond Halley, Filter Bubble, Firefox, fixed income, folksonomy, Google Earth, Howard Rheingold, index card, informal economy, information security, Isaac Newton, Johann Wolfgang von Goethe, knowledge worker, Large Hadron Collider, liberal capitalism, lifelogging, longitudinal study, Louis Daguerre, Menlo Park, off-the-grid, optical character recognition, Panopticon Jeremy Bentham, peer-to-peer, RFID, Richard Thaler, Silicon Valley, social graph, software studies, statistical model, Stephen Hawking, Steven Pinker, text mining, time value of money, trade route, Turing machine, urban renewal, Vannevar Bush, WikiLeaks

Is data about you yours, or should it be, now that data collection has become an always-everywhere proposition? Try to spend a day “off the grid” and you’d better leave your credit and debit cards, transit pass, school or work ID, passport, and cell phone at home—basically, anything with a barcode, magnetic strip, RFID, or GPS receiver.2 In short, if World War II helped to usher in the era of so-called Big Science, the new millennium has arrived as the era of Big Data.3 For this reason, we think a book like “Raw Data” Is an Oxymoron is particularly timely. Its title may sound like an argument or a thesis, but we want it to work instead as a friendly reminder and a prompt.

Along the same lines, Matthew Fuller argues that surveillance is no longer about visual apprehension but is instead a “socio-algorithmic process” that captures and calculates “flecks of identity,” the data trails of our everyday actions, such as our browsing history, financial transactions, and our movements as they are recorded by GPS coordinates on our mobile devices and RFID tags in passports and identity cards.30 The “flecks” concept emerges in some respect from Gilles Deleuze’s outline of the emergence of the “dividual” in the context of the control society; if the individuated self was both product and figure of modernity, “dividuals” are rather fragmented and dispersed data bodies.


pages: 506 words: 133,134

The Lonely Century: How Isolation Imperils Our Future by Noreena Hertz

"Friedman doctrine" OR "shareholder theory", Airbnb, airport security, algorithmic bias, Asian financial crisis, autism spectrum disorder, Bernie Sanders, Big Tech, big-box store, Broken windows theory, call centre, Capital in the Twenty-First Century by Thomas Piketty, car-free, Cass Sunstein, centre right, conceptual framework, Copley Medal, coronavirus, correlation does not imply causation, COVID-19, dark matter, deindustrialization, Diane Coyle, digital divide, disinformation, Donald Trump, driverless car, emotional labour, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, fake news, Fellow of the Royal Society, future of work, gender pay gap, gentrification, gig economy, Gordon Gekko, greed is good, Greta Thunberg, happiness index / gross national happiness, housing crisis, illegal immigration, independent contractor, industrial robot, Jane Jacobs, Jeff Bezos, Jeremy Corbyn, Jessica Bruder, job automation, job satisfaction, karōshi / gwarosa / guolaosi, Kevin Roose, knowledge economy, labor-force participation, lockdown, longitudinal study, low interest rates, low skilled workers, Lyft, Mark Zuckerberg, mass immigration, means of production, megacity, meta-analysis, move fast and break things, Network effects, new economy, Pepto Bismol, QWERTY keyboard, Ray Oldenburg, remote working, rent control, RFID, robo advisor, Ronald Reagan, Salesforce, San Francisco homelessness, Second Machine Age, Shoshana Zuboff, side hustle, Silicon Valley, Skype, Snapchat, social distancing, Social Responsibility of Business Is to Increase Its Profits, SoftBank, Steve Jobs, surveillance capitalism, TaskRabbit, tech worker, The Death and Life of Great American Cities, The Future of Employment, The Great Good Place, the long tail, The Wealth of Nations by Adam Smith, TikTok, Tim Cook: Apple, Uber and Lyft, uber lyft, urban planning, Wall-E, warehouse automation, warehouse robotics, WeWork, work culture , working poor, workplace surveillance

California, North Dakota and Wisconsin – Three Square Market’s home state – already have similar laws against forcible chipping, though these are not workplace-specific; a ban had also been proposed in Florida though it failed to pass. See Mary Colleen Charlotte Fowler, ‘Chipping Away Employee Privacy: Legal Implications of RFID Microchip Implants for Employees’, National Law Review, 10 October 2019, https://www.natlawreview.com/article/chipping-away-employee-privacy-legal-implications-rfid-microchip-implants-employees. 66 Joshua Z. Wasbin, ‘Examining the Legality of Employee Microchipping Under the Lens of the Transhumanistic Proactionary Principle’, Washington University Jurisprudence Review 11, no. 2 (2019), 401, https://openscholarship.wustl.edu/law_jurisprudence/vol11/iss2/10. 67 European Parliament, ‘Gig economy: EU law to improve workers’ rights (infographic)’, 9 April 2019, https://www.europarl.europa.eu/news/en/headlines/society/20190404STO35070/gig-economy-eu-law-to-improve-workers-rights-infographic; Kate Conger and Noam Scheiber, ‘California Bill Makes App-Based Companies Treat Workers as Employees’, New York Times, 11 September 2019, https://www.nytimes.com/2019/09/11/technology/california-gig-economy-bill.html.

Lazzarotti and Maya Atrakchi, ‘Illinois Leads the Way on AI Regulation in the Workplace’, SHRM, 6 November 2019, https://www.shrm.org/resourcesandtools/legal-and-compliance/state-and-local-updates/pages/illinois-leads-the-way-on-ai-regulation-in-the-workplace.aspx; Gerard Stegmaier, Stephanie Wilson, Alexis Cocco and Jim Barbuto, ‘New Illinois employment law signals increased state focus on artificial intelligence in 2020’, Technology Law Dispatch, 21 January 2020, https://www.technologylawdispatch.com/2020/01/privacy-data-protection/new-illinois-employment-law-signals-increased-state-focus-on-artificial-intelligence-in-2020/. 63 This is especially the case outside of Europe, where the General Data Protection Regulation (GDPR) that entered into force in May 2018 goes some of the way to address the imbalance. 64 Radio-Frequency Identification, or RFID, is the technology embedded in almost all of the ‘contactless’ cards you’d use on a daily basis, from credit and debit cards to transit cards such as Oyster. 65 Maggie Astor, ‘Microchip Implants for Employees? One Company Says Yes’, New York Times, 25 July 2017, https://www.nytimes.com/2017/07/25/technology/microchips-wisconsin-company-employees.html.


pages: 411 words: 80,925

What's Mine Is Yours: How Collaborative Consumption Is Changing the Way We Live by Rachel Botsman, Roo Rogers

"World Economic Forum" Davos, Abraham Maslow, Airbnb, Apollo 13, barriers to entry, behavioural economics, Bernie Madoff, bike sharing, Buckminster Fuller, business logic, buy and hold, carbon footprint, Cass Sunstein, collaborative consumption, collaborative economy, commoditize, Community Supported Agriculture, credit crunch, crowdsourcing, dematerialisation, disintermediation, en.wikipedia.org, experimental economics, Ford Model T, Garrett Hardin, George Akerlof, global village, hedonic treadmill, Hugh Fearnley-Whittingstall, information retrieval, intentional community, iterative process, Kevin Kelly, Kickstarter, late fees, Mark Zuckerberg, market design, Menlo Park, Network effects, new economy, new new economy, out of africa, Paradox of Choice, Parkinson's law, peer-to-peer, peer-to-peer lending, peer-to-peer rental, planned obsolescence, Ponzi scheme, pre–internet, public intellectual, recommendation engine, RFID, Richard Stallman, ride hailing / ride sharing, Robert Shiller, Ronald Coase, Search for Extraterrestrial Intelligence, SETI@home, Simon Kuznets, Skype, slashdot, smart grid, South of Market, San Francisco, Stewart Brand, systems thinking, TED Talk, the long tail, The Nature of the Firm, The Spirit Level, the strength of weak ties, The Theory of the Leisure Class by Thorstein Veblen, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thorstein Veblen, Torches of Freedom, Tragedy of the Commons, transaction costs, traveling salesman, ultimatum game, Victor Gruen, web of trust, women in the workforce, work culture , Yochai Benkler, Zipcar

Real-time information about bike availability and station location is accessible from smart phones and on the Internet. BIXI also seems to be avoiding some of the theft and vandalism that have plagued other networks. The bikes are designed with sealed components to resist abuse and each bike contains a Radio Frequency Identification (RFID) chip. If rented and not returned, the bike will slow down and the brakes will lock automatically. The design and planning team estimated that three thousand bikes were the “critical mass” necessary to persuade enough people to switch from cars (and taxis) to bikes at first, enabling the city government to provide more bikes to get more people to switch.

Companies achieve this feeling of ownership through discreet branding of the service on the product itself (the Bag Borrow or Steal logo is never visible on the outside of the bag) or building common ownership quirks into the brand. Zipcar gives its cars affectionate names such as “Simpson” the Volvo or “Munselle” the Mazda. Technologies such as RFID (radio-frequency identification) membership cards that open the door to “your” car also help reconfigure the relationship between products and services and destigmatize the notion of sharing. People are realizing that ownership for the sake of exclusive possession is less important than the sense of belonging that ownership imparts.


pages: 485 words: 149,337

The Last Dance by Martin L. Shoemaker

Apollo 11, gravity well, low earth orbit, Neil Armstrong, orbital mechanics / astrodynamics, RFID, stem cell

Was it perhaps the woman scorned? And that brings us back to this cable.” Nick held up the cable for us all to see. “I had Bosun Smith bring me this cable from the lab because there was one piece of information missing from our earlier report: the RFID tag woven into the cable end. And guess what? It’s not one that Professor Azevedo packed in his gear.” “What do you mean?” “Ms. Wells, the RFID tag is clear, and your meticulous inventory is equally clear: this cable came from your personal supplies. You had it stowed in your tent each night before the climb. Oh, and Bosun Smith also searched the rest of the expedition’s supplies very carefully; and the professor’s cable is nowhere to be found.

Nick looked from Smith to the cable. Smith nodded. “It was in his cabin, sir, just like you said it would be. I found it coiled up in his pillowcase, crammed in between the bunk and the wall. You’d never notice it without a search. Well, you might, Captain, but not the average person.” She handed the cable to Nick. “The RFID tag confirms that it’s Professor Azevedo’s cable.” Nick stood slowly, came around his desk, and stood nose to nose with Riggs. He didn’t yell. That’s when I know Nick is really angry, not just domineering. He gets very calm. He looked at Riggs and said, “Get off my ship.” Riggs swallowed. “Sir?” “You lied to me, Mr.


pages: 569 words: 156,139

Amazon Unbound: Jeff Bezos and the Invention of a Global Empire by Brad Stone

activist fund / activist shareholder / activist investor, air freight, Airbnb, Amazon Picking Challenge, Amazon Robotics, Amazon Web Services, autonomous vehicles, Bernie Sanders, big data - Walmart - Pop Tarts, Big Tech, Black Lives Matter, business climate, call centre, carbon footprint, Clayton Christensen, cloud computing, Colonization of Mars, commoditize, company town, computer vision, contact tracing, coronavirus, corporate governance, COVID-19, crowdsourcing, data science, deep learning, disinformation, disintermediation, Donald Trump, Downton Abbey, Elon Musk, fake news, fulfillment center, future of work, gentrification, George Floyd, gigafactory, global pandemic, Greta Thunberg, income inequality, independent contractor, invisible hand, Jeff Bezos, John Markoff, Kiva Systems, Larry Ellison, lockdown, Mahatma Gandhi, Mark Zuckerberg, Masayoshi Son, mass immigration, minimum viable product, move fast and break things, Neal Stephenson, NSO Group, Paris climate accords, Peter Thiel, Ponzi scheme, Potemkin village, private spaceflight, quantitative hedge fund, remote working, rent stabilization, RFID, Robert Bork, Ronald Reagan, search inside the book, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, Snapchat, social distancing, SoftBank, SpaceX Starlink, speech recognition, Steve Ballmer, Steve Jobs, Steven Levy, tech billionaire, tech bro, techlash, TED Talk, Tim Cook: Apple, Tony Hsieh, too big to fail, Tragedy of the Commons, two-pizza team, Uber for X, union organizing, warehouse robotics, WeWork

An excited Bezos approved the approach in 2013, not knowing that it would take five arduous and expensive years of research to bring it to fruition. “I think in the beginning, even the scientists were a little suspicious whether or not they could actually pull the thing off,” said Doug Herrington, the Amazon senior vice president in charge of the North American e-commerce business. The Amazon Go engineers initially considered using RFID chips in the product packaging to track which items were removed from shelves or asking customers to use their smartphones to scan product barcodes. But Bezos didn’t want them to take an easy path; he wanted them to innovate in the field of computer vision, which he saw as important to Amazon’s future.

On one of his first conference calls with his direct reports after taking the top operations job from Onetto, Clark stunned his subordinates by casually recalling his old nickname from the East Coast FCs—the Sniper. Many later recalled with trepidation his notorious sayings, such as “There’s no room for art degrees here” (even though he himself was a music education major). At one memorable meeting to review a team’s proposal to put RFID chips into Amazon pallets and packages, to better track them through the FCs, Clark walked in, apparently unimpressed with the plan, and said: “Tell me why I shouldn’t just fire all of you right now.” But all of that was handily overshadowed by Clark’s strengths—a sharp, analytical mind and masterful ability to dive into the most intricate level of detail to identify problems and negative trends.

., 281 OnePlus, 77 Onetto, Marc, 166, 218–21, 224, 225 OneWeb, 279 Oracle, 97–99, 173, 360, 361 Oscars, 137, 322 OSHA, 224 Osowski, Lukasz, 28 Outcast Agency, 324 Overstock, 373 paddle boards, 170, 374–75 Paramount Pictures, 158 Paris climate accords, 2, 381 Parkland shooting, 301 Paull, Michael, 146 Pecker, David, 328, 331–32, 334, 337–39, 341, 342, 345 Pegasus, 344 Pelosi, Nancy, 1 Penner, Greg, 90 People’s Production Company, 142 Pérez Sagaón, Abril, 85–86 Perry, Katy, 325 Perticucci, Roy, 392 Peterson, Matt, 97 phatic speech, 34–35 philanthropy, 15, 16, 244, 288, 290, 402–4 Bezos Day 1 Fund, 49, 324, 406 Bezos Earth Fund, 402–4, 406 Blue Origin and, 269, 281–82 of MacKenzie Scott, 323–24, 346, 402–3 Piacentini, Diego, 71, 73, 77, 79, 80, 83, 100, 104 Pichai, Sundar, 359, 369 Pitt, Brad, 325 Plugable Technologies, 176, 375–76 Pluimer, Larry, 181 Poitier, Sidney, 141 Politico, 124 Poovalingam, Vinoth, 76 PopSockets, 367–68 Porter, Brad, 399 Portrait of a Nation Prize, 1–2 Prakash, Shailesh, 123, 129–30 Prasad, Rohit, 35–38, 42, 47, 52 presidential candidates in 2020 election, 351, 353–55, 364 Price, Frank, 140–41 Price, Roy, 136, 137, 140–57 Prione Business Services, 77 Prisoner (Rezaian), 131 privacy, 23, 51–52 ProPublica, 237, 240 Procter & Gamble, 202, 246, 251 Project Kuiper, 404 Puerini, Gianna, 55–57, 59, 62, 64–66, 68 Purohit, Jagdish Raj, 92 Quidsi, 9–10, 193, 209, 222 Quinn, Sally, 133 Rabbit, 195, 238–39 Raghavan, Bali, 56, 58, 62 Rakuten Intelligence, 240–41 Ramji, Shiven, 251 Rashid, Taimur, 99 Ratner, Brett, 337 Rawlings, Mike, 300, 308 Raytheon, 280 Reagan, Ronald, 124 Reddit, 52 Refn, Nicolas Winding, 152 Reid, Toni, 45, 46, 51 Reliance Industries, 93, 384 research and development (R&D) expenses, 67 Reuters, 77, 210 Reveal, 224 Rezaian, Jason, 131–32 RFID chips, 57, 225 Rhimes, Shonda, 154 Riggs, Conrad, 145 Ring, 319, 367 Rivian Automotive, 4 Robb, Walter, 185 Robertson, James, 330, 332, 333 robotics, 55, 56, 213, 222–24, 388, 389 Rodriguez, Alex, 325 Rogers, Ty, 120 Rolle, Nina, 30, 289 Rolls-Royce, 280 Romanoffs, The, 152 Ronen, Assaf, 258 Rosa, Mike, 299 Rose, Charlie, 54 Rosenstein, Barry, 186 RosettiStarr, 360 Rosseter, Megan, 207–8 Roth, Mike, 216–17, 225, 229–31, 233 Rubinstein, David, 350 Ruffin, Scott, 233 Rupp, Chris, 104–7, 112 Russell, David O., 152 Russia, 272 Ryan, Fred, 124–25, 131, 133, 343 Safeway, 186, 192, 196 St.


pages: 363 words: 94,139

Jony Ive: The Genius Behind Apple's Greatest Products by Leander Kahney

Apple II, banking crisis, British Empire, Chuck Templeton: OpenTable:, company town, Computer Numeric Control, Do you want to sell sugared water for the rest of your life?, Dynabook, Ford Model T, General Magic , global supply chain, interchangeable parts, John Markoff, Jony Ive, Kickstarter, Larry Ellison, PalmPilot, race to the bottom, RFID, Savings and loan crisis, side project, Silicon Valley, skeuomorphism, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, the built environment, thinkpad, Tim Cook: Apple, Tony Fadell, work culture

One of his early projects was the Macintosh Color Classic, an update of the original Mac that exuded character and was avidly collected by fans for years. He would later work on the MacBook Pro and the iPhones 4 and 5. His name appears on more than 560 patents. They’re vast and varied in scope, including innovations in 3-D cameras, multi-touch displays, location tracking, RFID transponders, nitriding stainless steel, magsafe charging mechanisms, the iPod and improved speaker enclosures. Later in his career, De Iuliis would receive top design awards for his work. Once Jony joined the team, the two developed a strong relationship. De Iuliis and Jony lived close to each other in San Francisco, and commuted together for more than twenty years.

By 2013, Andre had more patents to his name than any other Apple designer, including Jony. In 2009 alone, he received 92 patents; in 2010, his 114 set a record for an Apple designer. Most of the patent awards were for innovations on the phone, tablet and laptop lines. Andre worked on everything at ID, from circuit modules to RFID systems. He was credited with the design of Apple’s 035 design prototype of the first iPad, according to information released during the Apple v. Samsung trial in 2012. Along with other members of the team, he several times received the prestigious Red Dot Award, from Germany’s Design Zentrum Nordrhein Westfalen institute.


pages: 313 words: 92,053

Places of the Heart: The Psychogeography of Everyday Life by Colin Ellard

Apollo 11, augmented reality, Benoit Mandelbrot, Berlin Wall, Broken windows theory, Buckminster Fuller, carbon footprint, classic study, cognitive load, commoditize, crowdsourcing, data science, Dunbar number, Frank Gehry, gentrification, Google Glasses, Guggenheim Bilbao, haute couture, Howard Rheingold, Internet of things, Jaron Lanier, Lewis Mumford, mandelbrot fractal, Marshall McLuhan, Masdar, mass immigration, megastructure, mirror neurons, Mondo 2000, more computing power than Apollo, Oculus Rift, overview effect, Peter Eisenman, RFID, Richard Florida, risk tolerance, sentiment analysis, Skinner box, smart cities, starchitect, TED Talk, the built environment, theory of mind, time dilation, urban decay, urban planning, urban sprawl, Victor Gruen

The state-of-the-art for theme parks that incorporate a strong technological element is the Live Park in South Korea, still under development, with plans for new versions of Live Park in China, Singapore, and a site as yet to be selected in the United States. The Live Park is designed to envelop visitors in a completely immersive virtual reality experience from the moment that they enter the gates. Visitors are fitted with an RFID tag—a small and inexpensive device that allows the visitors’ movements and location to be tracked throughout the space—and they are invited to create an avatar for themselves in which they can customize their own appearance. From this point, it is actually the avatar that engages in the themed activities of the park.

Chapter 3 1Jack Katz, Seductions of Crime: Moral and Sensual Attractions in Doing Evil (Basic Book, New York, 1990). 2The Chromo11 website can be found at: http://www.chromo11.com/ 3Brendan Walker’s The Taxonomy of Thrill was published by Aerial Publishing, London, 2005. 4Rem Koolhaas’s provocative book Delirious New York: A Retroactive Manifesto for Manhattan, was published by Monacelli Press, New York, 1994. 5A short account of Seoul’s Live Park can be found online in the e-zine The Verge (January 26, 2012) Available at: http://www.theverge.com/2012/1/26/2736462/south-korea-live-park-kinect-rfid-interactive-attractions 6A celebrated condemnation of the Disney empire can be found in James Howard Kunstler’s polemic The Geography of Nowhere: The Rise and Decline of America’s Man-Made Landscape (Free Press, New York, 1994). 7A journalistic account of Celebration’s dark side can be found in the Daily Mail online article by Tom Leonard, titled “The Dark Heart of Disney’s Dream Town: Celebration Has Wife-Swapping, Suicide, Vandals . . . and Now Even a Brutal Murder,” published on December 9, 2010.


pages: 552 words: 168,518

MacroWikinomics: Rebooting Business and the World by Don Tapscott, Anthony D. Williams

"World Economic Forum" Davos, accounting loophole / creative accounting, airport security, Andrew Keen, augmented reality, Ayatollah Khomeini, barriers to entry, Ben Horowitz, bioinformatics, blood diamond, Bretton Woods, business climate, business process, buy and hold, car-free, carbon footprint, carbon tax, Charles Lindbergh, citizen journalism, Clayton Christensen, clean water, Climategate, Climatic Research Unit, cloud computing, collaborative editing, collapse of Lehman Brothers, collateralized debt obligation, colonial rule, commoditize, corporate governance, corporate social responsibility, creative destruction, crowdsourcing, death of newspapers, demographic transition, digital capitalism, digital divide, disruptive innovation, distributed generation, do well by doing good, don't be evil, en.wikipedia.org, energy security, energy transition, Evgeny Morozov, Exxon Valdez, failed state, fault tolerance, financial innovation, Galaxy Zoo, game design, global village, Google Earth, Hans Rosling, hive mind, Home mortgage interest deduction, information asymmetry, interchangeable parts, Internet of things, invention of movable type, Isaac Newton, James Watt: steam engine, Jaron Lanier, jimmy wales, Joseph Schumpeter, Julian Assange, Kevin Kelly, Kickstarter, knowledge economy, knowledge worker, machine readable, Marc Andreessen, Marshall McLuhan, mass immigration, medical bankruptcy, megacity, military-industrial complex, mortgage tax deduction, Netflix Prize, new economy, Nicholas Carr, ocean acidification, off-the-grid, oil shock, old-boy network, online collectivism, open borders, open economy, pattern recognition, peer-to-peer lending, personalized medicine, radical decentralization, Ray Kurzweil, RFID, ride hailing / ride sharing, Ronald Reagan, Rubik’s Cube, scientific mainstream, shareholder value, Silicon Valley, Skype, smart grid, smart meter, social graph, social web, software patent, Steve Jobs, synthetic biology, systems thinking, text mining, the long tail, the scientific method, The Wisdom of Crowds, transaction costs, transfer pricing, University of East Anglia, urban sprawl, value at risk, WikiLeaks, X Prize, Yochai Benkler, young professional, Zipcar

For example, SAS business analytics allow utilities such as Brazilian utility Cemig to precisely forecast electrical demand in both the long and very short term. Cemig can even predict how demand will change when a World Cup soccer game starts or ends and televisions are turned on or off. Others, like IBM, are piloting schemes to monitor entire systems such as supply chains and transportation networks. The company has developed sensors and RFID tags that can track foodstuffs such as meat or other horticultural products from the producer all the way to the supermarket shelf.16 Armed with this data, retailers can ensure the quality of supply while customers can make smarter purchasing decisions. The drive to make all things “smarter” by connecting electrified objects to the Internet will, within a few years, result in a flood of new data that can be aggregated and analyzed, providing a powerful engine for energy dashboards and trading platforms that help households and businesses optimize their consumption.

This account may be fictional, but it is not far-fetched. Like Paulos, technologists and science fiction writers have long envisioned a world where a seamless global network of Internet-connected sensors could capture every event, action, and change on earth. With the proliferation of radio-frequency identification (RFID), satellite imagery, cheap personal video recorders, powerful mobile computing devices, and an array of Internet-connected sensors, that vision of millions of New Yorkers participating (perhaps unwittingly) in an act of civic regulation is increasingly plausible. Indeed, the question raised in this chapter is whether a combination of new technologies and citizen participation could unleash an era of participatory regulation, where citizens and other stakeholder groups play an active role in designing and enforcing regulations.

But retailers like Tesco and a legion of online product guides are making this information available anyway. Why? Because customers are demanding transparency! Now imagine the FDA was to extend a similar level of openness to realtime product recalls. Indeed, why not set up an open-source platform where a combination of RFID technologies and historical sales data would enable retailers to alert anyone who has purchased a recalled product. We bet hundreds of programmers would vie for the opportunity if the retailers agreed to open up a series of data feeds. The FDA should also consider open sourcing risk assessment (they call it Hazard Analysis and Critical Control Points) for the same reasons we argued that it’s time for opening up risk assessment in the financial sector.


pages: 134 words: 29,488

Python Requests Essentials by Rakesh Vidya Chandra, Bala Subrahmanyam Varanasi

business logic, create, read, update, delete, en.wikipedia.org, Kickstarter, machine readable, MITM: man-in-the-middle, MVC pattern, natural language processing, RFC: Request For Comment, RFID, supply-chain management, web application

He has extensive experience in Python, both in sysadmin tasks and automation, and in software development. Ilsu Park is an entrepreneur and software engineer currently living in Seoul, South Korea. He studied computer science from KAIST and was a member of the hacking and security group in college. He has a research experience in RFID security, and his interests are decentralized networks, concurrency handling, and highly scalable architecture. He also has contributed to various open source projects, including Python requests and the tornado web server. He is most passionate about building a great company. Kirk Strauser is a software architect from San Francisco Bay Area and has used Python personally and professionally for over 15 years.


The Pirate's Dilemma by Matt Mason

Albert Einstein, augmented reality, barriers to entry, blood diamond, citizen journalism, creative destruction, digital divide, don't be evil, Donald Trump, Douglas Engelbart, East Village, Firefox, Free Software Foundation, future of work, glass ceiling, global village, Hacker Ethic, haute couture, Howard Rheingold, Internet of things, invisible hand, Isaac Newton, jimmy wales, job satisfaction, John Markoff, John Perry Barlow, Joseph Schumpeter, Kickstarter, Lao Tzu, Marshall McLuhan, means of production, Naomi Klein, new economy, New Urbanism, patent troll, peer-to-peer, prisoner's dilemma, public intellectual, RAND corporation, RFID, Richard Florida, Richard Stallman, SETI@home, side hustle, Silicon Valley, South China Sea, Stephen Hawking, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, the long tail, Tim Cook: Apple, urban sprawl, Whole Earth Catalog

The time has come to consider the consequences of computers disappearing into the background the way motors did.” The consequences are what some people are referring to as “the Internet of things.” This is a world where objects are connected via tiny but widely distributed computers, such as radio-frequency identification chips (RFID), which cost less than 5 cents each and are already being used in products by Wal-Mart, Target, and Tesco to track goods. They are being used in passports, money, car keys, credit and travel cards, and are being embedded in livestock and even people. Aside from uses in the military, some nightclubs in Barcelona and Rotterdam have implanted chips into their VIP clientele, which verifies who they are and even lets them pay for drinks.

Diddy, 2, 172–74, 176, 182, 188, 193–94, 200, 220 Peel, John, 43 Perry, Lee “Scratch,” 75 personal computers (PCs), 7, 56, 92, 143–45, 164–65 Phantom Menace, The, 86 Pharmaceutical Research and Manufacturers of America (PhRMA), 63 Philosophy of Punk, The (O’Hara), 229 PillowFight Club, 202, 205 Pink Floyd, 16, 160 piracy, 2–4 as a business model, 8, 38, 59 creative freedom vs. regulation in, 36–39, 45, 56, 141 illegality of, 6, 35, 36, 37, 43, 47, 48, 57, 60–61, 69 inefficient systems replaced by, 67 national, 33, 34–36, 43, 57, 64, 65, 67 political and legal change through, 55–65, 66–67 response to, 232–40 self-empowerment and, 6, 35, 47, 48 social and economic change through, 27–31, 35, 36, 37–39, 43, 65 three effective habits of, 66–67 war on, 39, 43–44, 48, 53–54, 57, 69–70, 97–102 “Piracy Paradox, The: Innovation and Intellectual Property in Fashion Design” (Raustiala and Sprigman), 95–96 Pirate Bay, 55–57, 60 Pirate Party, 56–57 pirate ships, 39, 42 Pixo, 70 “Planet Rock,” 80, 82–83 PlayStation 3, 165 pop culture, 11, 14, 15, 42, 69, 72, 108 pop-up stores, 222 pornography, 25, 35, 48, 188 Positive Nation, 63 Post-Autistic Economics (PAE) movement, 197–98 Presley, Elvis, 76 print-on-demand publishing, 27–28 Prisoner’s Dilemma game, 232–33, 236, 238 Procter & Gamble, 221–22 Product Red campaign, 7 public domain, 59–60 defense of, 38, 99–100 generic drugs in, 62–64, 65, 236 pirate culture and, 38, 39 Public Enemy, 99, 108, 157, 187, 200 public space manipulation, 3, 103–33, 141 Pump Up the Volume, 41n punk, 10–22, 141, 176, 201, 206, 212, 227, 231 bands of, 8, 10–14, 16–18, 19–20, 32 British, 11, 13, 14, 16–17 establishment co-option of, 21–22, 31–32 first wave of, 10–11, 13, 15–17 hairstyles and clothes of, 8, 10–11, 12, 16, 22, 208, 229 incarnations of, 12, 19–26 indy-, 6 influences on, 10, 15, 27 innovative ideas of, 17, 19 interaction of fans and bands in, 18 negative reaction to, 13, 16, 17 New York, 10–11, 15–16 rejection of authority in, 11, 12, 13–14, 15, 17, 18, 23, 25, 26, 31, 110 Punk: The Definitive Record of a Revolution (Colegrave and Sullivan), 14 Punk Capitalism, 12, 19–32, 72, 191, 199 agents of change in, 7–8, 12, 23–25, 28–32 philanthropy and altruism in, 7, 8, 22–23, 24–25, 31, 231 relationship of production to consumption in, 8, 12, 22, 24–25, 29, 31 roots of, 8, 25 see also D.I.Y. ethic Qur’an, 70 radio, 154–155, 206, 207 AM, 40–41, 46 commercial, 41, 42, 43, 45, 46, 50, 53, 66 digital, 43, 45 early, 39–41 FM, 1–2, 43–45, 48, 66 ham, 40, 41 jamming of, 1–3 licensing of, 40, 41n, 45, 47, 48, 66 military and political use of, 41n, 45–46 pirate, 1–3, 34, 35, 39–48, 54, 208–13, 215 podcasts of, 54, 55 Radio Caroline, 42, 43 Radio Cell, 41n Radio Essex, 34 Radio Free Harlem, 41n radio-frequency identification chips (RFID), 131 Radio London, 42–43 Radio Luxembourg, 42 Radio Nordsee, 43n Radio Normandie, 42 Radio 1, 43, 48 Radio Paris, 42 Radio Sutch, 42 Index | 275 Radio Swan, 45–46 Ramones, 6, 11, 15, 16, 22 R&B, 72, 75, 98, 139, 140, 213 rap, 6, 80, 88, 97–99, 175, 178–79, 181, 185–88, 201, 203, 219 Rather, Dan, 50 Raustiala, Kal, 95–96 raves, 44, 140, 146–47, 154, 168, 169, 205–6, 231 R∆MM:∑LL:Z∑∑, 114, 116, 117, 130 Realism, 15 Recording Industry Association of America (RIAA), 69n, 158 record labels, 14, 17, 21n, 44n, 74, 84n, 94, 99, 145, 152–53, 154–55, 219 records, 37, 56, 142, 158 bootleg, 32, 36, 37 45 rpm, 73, 74 remix, 71–80, 97, 98–99, 208–10 see also DJs Redwood, Ruddy, 74 Reebok, 182–83, 184n, 192 Regency TR-1 transistor radio, 70–71 reggae, 72–75, 77, 80, 209 reggaeton, 195 Reid, Arthur “Duke,” 73–75, 78, 79, 80, 209 Reid, Lucille, 73 remix culture, 3, 8, 15n, 69–102, 141, 176, 208–10, 240 cut-’n’-paste in, 76–77, 89–93, 101 essence of, 81–84 Machinima, 92 quick mix theory of, 79–80, 81–84 sampling in, 80, 85, 88, 95, 97–99 see also records, remix; tapes, remix Replicating Rapid Prototyper, “RepRap,” 162 Reservoir Dogs, 85 Reverend Run, 187 REVS, 118–19 Rheingold, Howard, 131 Rhymes, Busta, 178, 181 Rise of the Creative Class, The (Florida), 27 Roan, Dan, 53 Rock ’n’ roll, 34, 139, 175n, 185, 190 broadcasting of, 41, 42–43, 52 clothes and haircuts of, 10, 16, 18 decline of, 14, 76, 201 stadium concerts of, 10, 17–18 stars of, 7, 14 Roh Moo-hyun, 51–52, 66–67 Rolling Stone, 144 Rolling Stones, 42 Romanchuk, Rob, 89 Romero, John, 91 Rotten, Jonny, 11, 13, 16, 17, 21, 26 Rough Guide to Reggae, The (Barrow and Dalton), 74 Rough Guide to Rock, The (Buckley), 16 Royal, 6 Rubin, Rick, 186–87 Rules for Radicals (Alinsky), 175 Run-D.M.C., 178, 186–87, 192 Rush Philanthropic Arts Foundation, 194 Russell, Richard, 226 RWD, 215–18, 219–20 Samples, Jim, 124 San Francisco Chronicle, 205 Saturday Night Fever, 76 Savile, Jimmy, 43 Schumacher, E.


pages: 372 words: 101,678

Lessons from the Titans: What Companies in the New Economy Can Learn from the Great Industrial Giants to Drive Sustainable Success by Scott Davis, Carter Copeland, Rob Wertheimer

3D printing, activist fund / activist shareholder / activist investor, additive manufacturing, Airbnb, airport security, asset light, barriers to entry, Big Tech, Boeing 747, business cycle, business process, clean water, commoditize, coronavirus, corporate governance, COVID-19, data science, disruptive innovation, Elisha Otis, Elon Musk, factory automation, fail fast, financial engineering, Ford Model T, global pandemic, hydraulic fracturing, Internet of things, iterative process, junk bonds, Kaizen: continuous improvement, Kanban, low cost airline, Marc Andreessen, Mary Meeker, megacity, Michael Milken, Network effects, new economy, Ponzi scheme, profit maximization, random walk, RFID, ride hailing / ride sharing, risk tolerance, Salesforce, shareholder value, Silicon Valley, six sigma, skunkworks, software is eating the world, strikebreaker, tech billionaire, TED Talk, Toyota Production System, Uber for X, value engineering, warehouse automation, WeWork, winner-take-all economy

Did Roper buy a dud, or would utilities begin to invest again after the recession? The answer came quickly. The growth did materialize, and to this day, water companies continue to change out old meters that require in-person reading with wireless ones that are run off radio frequency identification (RFID). Neptune was a big bet. Its cash flow was three times larger in size than the cash flow Roper was producing—and far larger than what most board members were comfortable with. Had that first deal not been a success from day one, there likely would not have been a second. For Jellison, Neptune was the most important bet of his career.

And though he was always comfortable with the math, it paid off well more than anyone had expected. Just a year later in 2004, and encouraged by the success of Neptune, Jellison closed another game-changing acquisition called TransCore. Better known as the backbone behind much of the US highway electronic tolling system, it uses RFID to read vehicle tags and charge a toll accordingly. It was another high-margin, noncyclical, high-cash-generating asset. At the time, tolling was a limited-growth industry, as the US federal and state gas taxes were more than sufficient to pay for road maintenance. But those funds have become deficient, driving much of the growth in tolling.


pages: 116 words: 31,356

Platform Capitalism by Nick Srnicek

"World Economic Forum" Davos, 3D printing, additive manufacturing, Airbnb, Amazon Mechanical Turk, Amazon Web Services, Big Tech, Californian Ideology, Capital in the Twenty-First Century by Thomas Piketty, cloud computing, collaborative economy, collective bargaining, data science, deindustrialization, deskilling, Didi Chuxing, digital capitalism, digital divide, disintermediation, driverless car, Ford Model T, future of work, gig economy, independent contractor, Infrastructure as a Service, Internet of things, Jean Tirole, Jeff Bezos, knowledge economy, knowledge worker, liquidity trap, low interest rates, low skilled workers, Lyft, Mark Zuckerberg, means of production, mittelstand, multi-sided market, natural language processing, Network effects, new economy, Oculus Rift, offshore financial centre, pattern recognition, platform as a service, quantitative easing, RFID, ride hailing / ride sharing, Robert Gordon, Salesforce, self-driving car, sharing economy, Shoshana Zuboff, Silicon Valley, Silicon Valley startup, software as a service, surveillance capitalism, TaskRabbit, the built environment, total factor productivity, two-sided market, Uber and Lyft, Uber for X, uber lyft, unconventional monetary instruments, unorthodox policies, vertical integration, warehouse robotics, Zipcar

Industrial Platforms As data collection, storage, and analysis have become increasingly cheaper, more and more companies have attempted to bring platforms into the field of traditional manufacturing. The most significant of these attempts goes under the rubric of ‘the industrial internet of things’, or simply ‘the industrial internet’. At the most basic level, the industrial internet involves the embedding of sensors and computer chips into the production process and of trackers (e.g. RFID) into the logistics process, all linked together through connections over the internet. In Germany, this process is being heralded as ‘Industry 4.0’. The idea is that each component in the production process becomes able to communicate with assembly machines and other components, without the guidance of workers or managers.


pages: 903 words: 235,753

The Stack: On Software and Sovereignty by Benjamin H. Bratton

1960s counterculture, 3D printing, 4chan, Ada Lovelace, Adam Curtis, additive manufacturing, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic trading, Amazon Mechanical Turk, Amazon Robotics, Amazon Web Services, Andy Rubin, Anthropocene, augmented reality, autonomous vehicles, basic income, Benevolent Dictator For Life (BDFL), Berlin Wall, bioinformatics, Biosphere 2, bitcoin, blockchain, Buckminster Fuller, Burning Man, call centre, capitalist realism, carbon credits, carbon footprint, carbon tax, carbon-based life, Cass Sunstein, Celebration, Florida, Charles Babbage, charter city, clean water, cloud computing, company town, congestion pricing, connected car, Conway's law, corporate governance, crowdsourcing, cryptocurrency, dark matter, David Graeber, deglobalization, dematerialisation, digital capitalism, digital divide, disintermediation, distributed generation, don't be evil, Douglas Engelbart, Douglas Engelbart, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, Eratosthenes, Ethereum, ethereum blockchain, Evgeny Morozov, facts on the ground, Flash crash, Frank Gehry, Frederick Winslow Taylor, fulfillment center, functional programming, future of work, Georg Cantor, gig economy, global supply chain, Google Earth, Google Glasses, Guggenheim Bilbao, High speed trading, high-speed rail, Hyperloop, Ian Bogost, illegal immigration, industrial robot, information retrieval, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Jacob Appelbaum, James Bridle, Jaron Lanier, Joan Didion, John Markoff, John Perry Barlow, Joi Ito, Jony Ive, Julian Assange, Khan Academy, Kim Stanley Robinson, Kiva Systems, Laura Poitras, liberal capitalism, lifelogging, linked data, lolcat, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, McMansion, means of production, megacity, megaproject, megastructure, Menlo Park, Minecraft, MITM: man-in-the-middle, Monroe Doctrine, Neal Stephenson, Network effects, new economy, Nick Bostrom, ocean acidification, off-the-grid, offshore financial centre, oil shale / tar sands, Oklahoma City bombing, OSI model, packet switching, PageRank, pattern recognition, peak oil, peer-to-peer, performance metric, personalized medicine, Peter Eisenman, Peter Thiel, phenotype, Philip Mirowski, Pierre-Simon Laplace, place-making, planetary scale, pneumatic tube, post-Fordism, precautionary principle, RAND corporation, recommendation engine, reserve currency, rewilding, RFID, Robert Bork, Sand Hill Road, scientific management, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley ideology, skeuomorphism, Slavoj Žižek, smart cities, smart grid, smart meter, Snow Crash, social graph, software studies, South China Sea, sovereign wealth fund, special economic zone, spectrum auction, Startup school, statistical arbitrage, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, Superbowl ad, supply-chain management, supply-chain management software, synthetic biology, TaskRabbit, technological determinism, TED Talk, the built environment, The Chicago School, the long tail, the scientific method, Torches of Freedom, transaction costs, Turing complete, Turing machine, Turing test, undersea cable, universal basic income, urban planning, Vernor Vinge, vertical integration, warehouse automation, warehouse robotics, Washington Consensus, web application, Westphalian system, WikiLeaks, working poor, Y Combinator, yottabyte

For savvy urban designers, equally adept with physical and virtual envelopes, it's not difficult to make up long lists of possible projects: augmented reality Apps for ambulance paramedics and open-air surgical theaters; a mash-up of post-Twitter microblog Apps linked to post-Siri voice-control interfaces and trans-Google translation software, together posting anything you want to say to anyone anywhere always; citizen activists using GIS, mass-market geobrowsers, and modified drones to streaming real-time C3 video to 3D-printed phones; mining composite crowd-sourced behavioral data to optimize the recycling of post-purchase prosaic junk; real-time flu outbreak visualization and private microgovernance of microbiopolitical swarms (a premium upgrade only for club members); traffic control sensor and smart tollbooth hacks; individually reconfigurable robotic building interiors collapsing rooms and even floors serving different programs in morning and at night; anonymized parking markets based on bitcoin and namecoin; building exteriors featuring networked cinema, not on thirty-second loops but on eighteen-month lunar cycles; lifelong syncing of car-phone-home-Clouds platform allegiance chosen at birth like football team fandom; Google Office per-minute commercial office leasing apps; personal RFID managers; rock star privacy consultants—all driven by (at least partially) open APIs enabling other applications to build further on their existing traces. Insert your own schemes and nightmares here. Regarding the experiment suggested above, for two groups of architects assigned to tackle the virtual as well as the physical envelope, it's certain that even this is fraught with risk, not only because of what it would leave behind but because of what it might accomplish and quickly lose the ability to control.

At the City layer, this object-oriented economy of molecular logistics is expressed in “planetary supersurfaces” such as warehouses that are so large that their floors have been laser-leveled against the curvature of the Earth. Instead of walls and windows, these spaces are programmed by bar codes, RFID chips, and scanners and populated by robotic platforms, shelves, and stockers that can easily lift over a ton of goods at once.72 From the perspective of The Stack looking out at the Earth, these architectures of and for things are perhaps even more essential than those rendered for the benefit of human appreciation (as discussed in more detail in the User chapter).

By comparison, we are no longer so impressed by the prospect of “smart objects,” interactive habitats, and reflexive architectures. Now projects seek “networked matter,” the hybridizing of digital bits and pieces of the physical world, both above and below anthropometric scale, into an ambient field of systematic intercommunication and assembly. Joining the battalions of RFID-enabled objects would be smart dust, robotic insects, transistors inside of living cells, and programmable clay filled with zillions of nanometric machines that can take on any animated form. Research programs such as Hewlett-Packard's Central Nervous System of the Earth (CeNSE), work toward the trillion-sensor world in which bridges, trains, warehouses, earthquake faults, trees, flowers and animals, and even internal organs are filled with tiny sensors, each transmitting data directly to one another or to the Cloud.4 The promise (or threat) of designing with a computation that is so deeply laced into the structures and behaviors of matter is an ambition for addressing platforms of comprehensive transparency and the remote interaction with the world at a chemical and atomic scale.


pages: 118 words: 35,663

Smart Machines: IBM's Watson and the Era of Cognitive Computing (Columbia Business School Publishing) by John E. Kelly Iii

AI winter, book value, call centre, carbon footprint, Computing Machinery and Intelligence, crowdsourcing, demand response, discovery of DNA, disruptive innovation, Erik Brynjolfsson, Fairchild Semiconductor, future of work, Geoffrey West, Santa Fe Institute, global supply chain, Great Leap Forward, Internet of things, John von Neumann, Large Hadron Collider, Mars Rover, natural language processing, optical character recognition, pattern recognition, planetary scale, RAND corporation, RFID, Richard Feynman, smart grid, smart meter, speech recognition, TED Talk, Turing test, Von Neumann architecture, Watson beat the top human players on Jeopardy!

Organizations and individuals are faced with a torrent of data, everything from structured information such as transaction records to a wide variety of unstructured information—still images, video, audio, and sensor data. The biggest new source of data is the so-called Internet of things, data produced by sensors and harvested via the Internet. The sensors involved range from the RFID tags that retailers use to track merchandise to video cameras that capture the flow of traffic. Every day, as a group, human beings generate about 3 exabytes of computer data—a prodigious output that is expected to produce a data universe of 40 zettabytes of digital stuff by 2020.2 A zettabyte is a decidedly big number: a 1 followed by 21 zeros.


pages: 354 words: 105,322

The Road to Ruin: The Global Elites' Secret Plan for the Next Financial Crisis by James Rickards

"World Economic Forum" Davos, Affordable Care Act / Obamacare, Alan Greenspan, Albert Einstein, asset allocation, asset-backed security, bank run, banking crisis, barriers to entry, Bayesian statistics, Bear Stearns, behavioural economics, Ben Bernanke: helicopter money, Benoit Mandelbrot, Berlin Wall, Bernie Sanders, Big bang: deregulation of the City of London, bitcoin, Black Monday: stock market crash in 1987, Black Swan, blockchain, Boeing 747, Bonfire of the Vanities, Bretton Woods, Brexit referendum, British Empire, business cycle, butterfly effect, buy and hold, capital controls, Capital in the Twenty-First Century by Thomas Piketty, Carmen Reinhart, cellular automata, cognitive bias, cognitive dissonance, complexity theory, Corn Laws, corporate governance, creative destruction, Credit Default Swap, cuban missile crisis, currency manipulation / currency intervention, currency peg, currency risk, Daniel Kahneman / Amos Tversky, David Ricardo: comparative advantage, debt deflation, Deng Xiaoping, disintermediation, distributed ledger, diversification, diversified portfolio, driverless car, Edward Lorenz: Chaos theory, Eugene Fama: efficient market hypothesis, failed state, Fall of the Berlin Wall, fiat currency, financial repression, fixed income, Flash crash, floating exchange rates, forward guidance, Fractional reserve banking, G4S, George Akerlof, Glass-Steagall Act, global macro, global reserve currency, high net worth, Hyman Minsky, income inequality, information asymmetry, interest rate swap, Isaac Newton, jitney, John Meriwether, John von Neumann, Joseph Schumpeter, junk bonds, Kenneth Rogoff, labor-force participation, large denomination, liquidity trap, Long Term Capital Management, low interest rates, machine readable, mandelbrot fractal, margin call, market bubble, Mexican peso crisis / tequila crisis, Minsky moment, Money creation, money market fund, mutually assured destruction, Myron Scholes, Naomi Klein, nuclear winter, obamacare, offshore financial centre, operational security, Paul Samuelson, Peace of Westphalia, Phillips curve, Pierre-Simon Laplace, plutocrats, prediction markets, price anchoring, price stability, proprietary trading, public intellectual, quantitative easing, RAND corporation, random walk, reserve currency, RFID, risk free rate, risk-adjusted returns, Robert Solow, Ronald Reagan, Savings and loan crisis, Silicon Valley, sovereign wealth fund, special drawing rights, stock buybacks, stocks for the long run, tech billionaire, The Bell Curve by Richard Herrnstein and Charles Murray, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, Thomas Bayes, Thomas Kuhn: the structure of scientific revolutions, too big to fail, transfer pricing, value at risk, Washington Consensus, We are all Keynesians now, Westphalian system

These scanners capture facial images, license plate numbers, and auto types and makes. Drivers like the convenience of E-ZPass automated toll systems, but may not realize that every tollbooth is now a digital surveillance and interdiction point. E-ZPass surveillance uses radio frequency identification technology (RFID). Your E-ZPass tag has a transmitter that broadcasts information about you that is read by a scanner installed overhead at a tollbooth. Now governments are installing scanners and cameras on roads everywhere to collect the same information. The New York Civil Liberties Union recently discovered that New York City and State installed scanners in diverse locations to track the whereabouts of citizens.

The New York Civil Liberties Union recently discovered that New York City and State installed scanners in diverse locations to track the whereabouts of citizens. These scanners are not collecting tolls. They are the unacceptable face of the ubiquitous surveillance state. Continuous surveillance is not confined to video cameras and E-ZPass tags. Smartphones and credit cards use an RFID variant called near field communication (NFC) to broadcast your activities to scanners. Each time you use your credit card, a digital fingerprint of your location is recorded. Your smartphone GPS signals your whereabouts between points of purchase. This information is available to government using collection standards that do not adhere to Fourth Amendment requirements of reasonableness and probable cause.


pages: 431 words: 107,868

The Great Race: The Global Quest for the Car of the Future by Levi Tillemann

Affordable Care Act / Obamacare, An Inconvenient Truth, Any sufficiently advanced technology is indistinguishable from magic, autonomous vehicles, banking crisis, Bear Stearns, car-free, carbon footprint, clean tech, creative destruction, decarbonisation, deindustrialization, demand response, Deng Xiaoping, Donald Trump, driverless car, electricity market, Elon Musk, en.wikipedia.org, energy security, factory automation, Fairchild Semiconductor, Ford Model T, foreign exchange controls, gigafactory, global value chain, high-speed rail, hydrogen economy, index card, Intergovernmental Panel on Climate Change (IPCC), joint-stock company, Joseph Schumpeter, Kanban, Kickstarter, manufacturing employment, market design, megacity, Nixon shock, obamacare, off-the-grid, oil shock, planned obsolescence, Ralph Nader, RFID, rolodex, Ronald Reagan, Rubik’s Cube, self-driving car, shareholder value, Shenzhen special economic zone , short squeeze, Silicon Valley, Silicon Valley startup, skunkworks, smart cities, Solyndra, sovereign wealth fund, special economic zone, Steve Jobs, Tesla Model S, too big to fail, Unsafe at Any Speed, zero-sum game, Zipcar

New business models like Zipcar or Car2Go are allowing consumers most of the perks of automotive ownership with dramatically reduced overhead, risk, and hassle. Both of the aforementioned services strategically park their vehicles in high-density residential neighborhoods and operate off automated radio frequency identification–based (RFID) rental and entry systems. In the case of Zipcar, members can use their computer or smartphone to reserve a car for an hour or a day according to their needs. When a customer is done, he or she simply returns the car to its designated spot for the next user. Daimler’s Car2Go is a slightly more radical concept.

It uses the company’s pint-size Smart cars plus a GPS tracking system to execute a minute-by-minute, point-to-point rental system. Using a smartphone application users can see a map of hundreds of vehicles available for use in their city and can locate the vehicle that is closest to their current position. They enter the car using an individualized RFID-embedded swipe card. When they arrive at their desired location, they simply end the reservation—making the car available for another user. Car2Go is widely deployed in many major cities across Europe and the United States. Of course, these sharing models are not without downsides. Customers might have to reserve a vehicle hours or days in advance—or walk half a mile to get to where the car they want to drive is parked.


pages: 371 words: 108,317

The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future by Kevin Kelly

A Declaration of the Independence of Cyberspace, Aaron Swartz, AI winter, Airbnb, Albert Einstein, Alvin Toffler, Amazon Web Services, augmented reality, bank run, barriers to entry, Baxter: Rethink Robotics, bitcoin, blockchain, book scanning, Brewster Kahle, Burning Man, cloud computing, commoditize, computer age, Computer Lib, connected car, crowdsourcing, dark matter, data science, deep learning, DeepMind, dematerialisation, Downton Abbey, driverless car, Edward Snowden, Elon Musk, Filter Bubble, Freestyle chess, Gabriella Coleman, game design, Geoffrey Hinton, Google Glasses, hive mind, Howard Rheingold, index card, indoor plumbing, industrial robot, Internet Archive, Internet of things, invention of movable type, invisible hand, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Perry Barlow, Kevin Kelly, Kickstarter, lifelogging, linked data, Lyft, M-Pesa, machine readable, machine translation, Marc Andreessen, Marshall McLuhan, Mary Meeker, means of production, megacity, Minecraft, Mitch Kapor, multi-sided market, natural language processing, Netflix Prize, Network effects, new economy, Nicholas Carr, off-the-grid, old-boy network, peer-to-peer, peer-to-peer lending, personalized medicine, placebo effect, planetary scale, postindustrial economy, Project Xanadu, recommendation engine, RFID, ride hailing / ride sharing, robo advisor, Rodney Brooks, self-driving car, sharing economy, Silicon Valley, slashdot, Snapchat, social graph, social web, software is eating the world, speech recognition, Stephen Hawking, Steven Levy, Ted Nelson, TED Talk, The future is already here, the long tail, the scientific method, transport as a service, two-sided market, Uber for X, uber lyft, value engineering, Watson beat the top human players on Jeopardy!, WeWork, Whole Earth Review, Yochai Benkler, yottabyte, zero-sum game

The electronics industry expects a billion wearable devices in five years, tracking our activities, feeding data into the stream. We can expect another 13 billion appliances, like the Nest thermostat, animating our smarthomes. There will be 3 billion devices built into connected cars. And 100 billion dumb RFID chips embedded into goods on the shelves of Walmart. This is the internet of things, the emerging dreamland of everything we manufacture that is the new platform for the improbable. It is built with data. Knowledge, which is related, but not identical, to information, is exploding at the same rate as information, doubling every two years.

See also books; ebooks and readers realism, 211–14, 216 real time, 66, 88, 104, 114–17, 131, 145 recommendation engines, 169 Red Dead Redemption, 227–30 Reddit, 136, 140, 143, 149, 264 Red Hat, 69 reference transactions, 285 relationship network analysis, 187 relativity theory, 288 remixing of ideas, 193–210 and economic growth, 193–95 and intellectual property issues, 207–10 legal issues associated with, 207–10 and reduced cost of creating content, 196–97 and rewindability, 204–7 and visual media, 197–203 remixing video, 197–98 renting, 117–18 replication of media, 206–9 Rethink Robotics, 51 revert functions, 270 reviews by users/readers, 21, 72–73, 139, 266 rewindability, 204–7, 247–48, 270 RFID chips, 283 Rheingold, Howard, 148–49 ride-share taxis, 252 ring tones, 250 Ripley’s Believe It or Not, 278 robots ability to think differently, 51–52 Baxter, 51–52 categories of jobs for, 54–59, 60 and digital storage capacity, 265 dolls, 36 emergence of, 49 industrial robots, 52–53 and mass customization, 173 new jobs related to, 57–58 and personal success, 58–59 personal workbots, 58–59 stages of robot replacement, 59–60 training, 52–53 trust in, 54 Romer, Paul, 193, 209 Rosedale, Phil, 219 Rowling, J.


pages: 519 words: 104,396

Priceless: The Myth of Fair Value (And How to Take Advantage of It) by William Poundstone

availability heuristic, behavioural economics, book value, Cass Sunstein, collective bargaining, Daniel Kahneman / Amos Tversky, delayed gratification, Donald Trump, Dr. Strangelove, East Village, en.wikipedia.org, endowment effect, equal pay for equal work, experimental economics, experimental subject, feminist movement, game design, German hyperinflation, Henri Poincaré, high net worth, index card, invisible hand, John von Neumann, Kenneth Arrow, laissez-faire capitalism, Landlord’s Game, Linda problem, loss aversion, market bubble, McDonald's hot coffee lawsuit, mental accounting, meta-analysis, Nash equilibrium, new economy, no-fly zone, Paul Samuelson, payday loans, Philip Mirowski, Potemkin village, power law, price anchoring, price discrimination, psychological pricing, Ralph Waldo Emerson, RAND corporation, random walk, RFID, Richard Thaler, risk tolerance, Robert Shiller, rolodex, social intelligence, starchitect, Steve Jobs, The Chicago School, The Wealth of Nations by Adam Smith, three-martini lunch, ultimatum game, working poor

One of the more intriguing of recent findings is that shoppers open their wallets wider when moving through a store in a counterclockwise direction. On average, these shoppers spend $2 more a trip than clockwise shoppers. This was determined in studies of shopping cart movements. Herb Sorensen of Sorensen Associates has fitted carts with RFID tags emitting a radio ping every five seconds. This PathTracker technology allows sensors to triangulate each cart’s location, map its motion, and tally what was bought and at what price. No one is quite sure why counterclockwise shoppers buy more. Paco Underhill, CEO of Envirosell, mentions one popular guess, that North Americans see shopping carts as “cars” to be driven on the right.

., 53 Psychological Bulletin, 54, 55, 86 psychophysics, 8–9, 26–27, 29–36, 39– 40, 53, 146; definition of, 31; experiments in, 26–27, 35, 40; of jury awards, 276–79; luxury trade and, 155; magnitude scales of, 194; of money, 42–45 origins of, 29–32; of pain, 136; perceptual illusion demonstrations of, 36–37, 84–85; power curve rule in, 32–33; prospect theory and, 98; of rebates, 178 Psychophysics (Stevens), 34 Puffs tissues, 5 Puto, Christopher, 151–53, 156 Quarterly Journal of Economics, The, 138 Quattrone, George, 12–13 Quilted Northern toilet paper, 5 racial discrimination, 245, 283; in car sales, 241–44 Rand, Ayn, 108 RAND Corporation, 71 Rapp, Gregg, 162–64 rationality: bounded, 52; cult of, 77–78 Ravikovich, Dahlia, 82 Reagan, Ronald, 56, 256 real estate market, 196–206, 211; alcohol and deal-making in, 219; anchoring in, 196–201, 203–205; bargaining in, 115; bubbles in, 101, 264; charm prices in, 186; framing of gains and losses in, 107; incentives in, 176; money illusion in, 229 rebates, 176–78 reference points, 98, 101, 132 reference pricing, 204–206 Remington Rand, Inc., 224 Reserve Bank of Zimbabwe, 223 restaurants, 143–45, 159–64; charm pricing by, 186, 190 Revionics, Inc., 6, 148 RFID tags, 150 Richelieu, Duc de, 219 Riding, Alan, 266–67 Ritov, Ilana, 209–10 Ritty, James, 186 Riviera Casino (Las Vegas), 49 Robb Report, 156 Roberts, Gilbert, 283 Robertson, Leslie, 27 Rockefeller, J. Sterling, 49 Rockefeller, Nelson, 116 Rodriguez, Alex, 258–59 Roider, Andreas, 213 Rolex watches, 44 Rolling Stones, 202 Rolodex, 224 Romano, Ray, 255 Romans, ancient, 109–10 Rope, The (Plautus), 109–10 Rosenblum, Paula, 177 Russell Sage Foundation, 104 Ruth, Babe, 258–59 Ryan, Nolan, 259 Saatchi, Charles, 266 Saatchi, Diane, 201 Sage, Russell, 104 salaries, 211–12, 218, 287; beauty premium in, 239–40; cuts in, fairness of, 107; gender and, 237–38, 240; psychophysics and, 42–43; of top earners, 235, 255–59 Salary.com, 211 Sam’s Club, 151 Samuelson, Paul, 51, 77 S&H Green Stamps, 176–77 Sanfey, Alan, 168 Saturn cars, 243 Savage, Leonard “Jimmie,” 56–59, 78, 125, 146 scanners, 147–48 Schiff, Arthur, 169 Schkade, David, 276–77, 279 Schmittberger, Rolf, 113 Schmitz, Patrick, 213 Schutte, Nicola, 17 Schwarze, Bernd, 113 Schweitzer, Maurice, 239–40 Science, 12, 88, 90, 125 Scientific American, 127, 147 Scion cars, 243 Scotland, Church of, 270 Scott, Robert, 4 Seaney, Rick, 183 Securities and Exchange Commission (SEC), 257 Seinfeld, Jerry, 255 Seinfeld (television show), 3, 255 Sensory Logic, Inc., 156 sensory perceptions, study of, see psychophysics September 11 terrorist attacks, 258 Shafir, Eldar, 227, 228, 230–32, 245–47 Shakespeare, William, 127 Shampanier, Kristina, 193 Shiller, Robert, 262–63 Siegelman, Peter, 241–44 Simester, Duncan, 188–91 Simon, Herbert, 51–52 Simon, Hermann, 6, 145–48, 173, 175 Simon Fraser University, 105 Simon-Kucher & Partners (SKP), 4, 6–7, 16, 148, 157–58, 165, 172, 173, 181 Simonson, Itamar, 156–58 Simpsons, The (television show), 143 Sinai war (1956), 81 Sizzler restaurant chain, 160 Skinner, B.


pages: 363 words: 105,039

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

"World Economic Forum" Davos, air freight, air gap, Airbnb, Bellingcat, Bernie Sanders, bitcoin, blockchain, call centre, Citizen Lab, clean water, data acquisition, disinformation, Donald Trump, Edward Snowden, false flag, global supply chain, Hacker News, hive mind, information security, Julian Assange, Just-in-time delivery, Kickstarter, machine readable, Mikhail Gorbachev, no-fly zone, open borders, pirate software, pre–internet, profit motive, ransomware, RFID, speech recognition, Steven Levy, Stuxnet, supply-chain attack, tech worker, undersea cable, unit 8200, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

He needed to get to his technology operations center. As Oh made his way out of the press section toward the exits, reporters around him had already begun complaining that the Wi-Fi seemed to have suddenly stopped working. Thousands of internet-linked TVs showing the ceremony at the stadium and twelve other Olympic facilities had gone black. Every RFID-based security gate leading into every Olympic building was down. The Olympics’ official app was broken, too, reaching out for data from back-end servers that suddenly had none to offer. That meant some unknown number of audience members had been unable to load their tickets to their phones, locking them out of the performance.

They jumped into a Hyundai SUV and began the forty-minute drive east, down through the mountains to the coastal city of Gangneung, where the Olympics’ technology operation center was located. From the car, Oh immediately made calls to tell staffers at the stadium to start distributing Wi-Fi hot spots to reporters and to tell security to check badges manually, because all RFID systems were down. But he knew that in just over two hours the opening ceremony would end, and all of the tens of thousands of athletes, visiting dignitaries, and spectators at the event would find that they had no Wi-Fi connections and no access to the Olympic app full of schedules, hotel information, and maps.


pages: 458 words: 116,832

The Costs of Connection: How Data Is Colonizing Human Life and Appropriating It for Capitalism by Nick Couldry, Ulises A. Mejias

"World Economic Forum" Davos, 23andMe, Airbnb, Amazon Mechanical Turk, Amazon Web Services, behavioural economics, Big Tech, British Empire, call centre, Cambridge Analytica, Cass Sunstein, choice architecture, cloud computing, colonial rule, computer vision, corporate governance, dark matter, data acquisition, data is the new oil, data science, deep learning, different worldview, digital capitalism, digital divide, discovery of the americas, disinformation, diversification, driverless car, Edward Snowden, emotional labour, en.wikipedia.org, European colonialism, Evgeny Morozov, extractivism, fake news, Gabriella Coleman, gamification, gig economy, global supply chain, Google Chrome, Google Earth, hiring and firing, income inequality, independent contractor, information asymmetry, Infrastructure as a Service, intangible asset, Internet of things, Jaron Lanier, job automation, Kevin Kelly, late capitalism, lifelogging, linked data, machine readable, Marc Andreessen, Mark Zuckerberg, means of production, military-industrial complex, move fast and break things, multi-sided market, Naomi Klein, Network effects, new economy, New Urbanism, PageRank, pattern recognition, payday loans, Philip Mirowski, profit maximization, Ray Kurzweil, RFID, Richard Stallman, Richard Thaler, Salesforce, scientific management, Scientific racism, Second Machine Age, sharing economy, Shoshana Zuboff, side hustle, Sidewalk Labs, Silicon Valley, Slavoj Žižek, smart cities, Snapchat, social graph, social intelligence, software studies, sovereign wealth fund, surveillance capitalism, techlash, The Future of Employment, the scientific method, Thomas Davenport, Tim Cook: Apple, trade liberalization, trade route, undersea cable, urban planning, W. E. B. Du Bois, wages for housework, work culture , workplace surveillance

As of 2017, only 17 percent of US retail employees had a set or constant work schedule.101 Data-driven micromanagement of workers. This includes methods such as voice picking (short for “voice-directed order picking”), used extensively in Amazon’s warehouses. Whereas other techniques for managing workers (RFID tags on goods, GPS tracking of workers and the machines they are operating) still leave the worker some autonomy (their position is managed only indirectly), voice picking works to channel surveillance directly through the worker’s body. The worker is instructed through a headset that relays automated verbal comments—issued not by a person but by a warehouse management system—while of course simultaneously watching the worker’s movements.

See also specific names of countries “reification,” 230n129 Rekognition (Amazon), 10 remote desktop surveillance, 64–65 reputation, platform management of, 130 Requerimiento (Spanish colonial document), 92–94; as analogy to Google EULA and Facebook SRR, 93–94; original purpose of, 92 “reserve army,” unemployed as, 61 Restrepo, Pascual, 238n117 RFID tags, 64 Richards, Neil, 179 Ricoeur, Paul, 253n10, 254n34 Rieder, Bernhard, 137 Rooney, Sally, xv Rose, Nikolas, 122 Rosenblat, Alex, 62 Rossiter, Ned, 39, 47 Rössler, Beate, 154, 165 Rotenberg, Marc, 177 Rouvroy, Annette, 127–28, 249n141 Russia, social quantification sector in, 55 sacrifice zones, 90 Safari (Apple), 48–49 Said, Edward, 77, 239n34 Salesforce, 65 Sammadar, Ranabir, 66 Sandvig, Christian, 132 Santos, Boaventura de Sousa, 201, 263n46 Saudi Aramco, 54 Scandia, 153 Schildt, Hakan, 153 Schneier, Bruce, xv, 23–24, 128, 135 Schüll, Natasha Dow, 171–72 seamfulness, Vertesi on, 198–201 seamlessness, Cohen on, 229n106 second-order control, 182–83 “second slavery,” 73–74 self: double consciousness of, 157; integrity of, 156–61, 197, 204–5; self-determination, 154–55, 252–53n10; Self versus Other, 239n34; space of the self concept, 156–57, 161–65, 167, 172, 178, 199 self-tracking: as autonomy illusion, 168–73; personal data appropriation spectrum of, 173–76; Quantified Self movement, 168, 171, 257n77; “situated objectivity” of, 256n70; as social knowledge, 128–29, 133; in workplace, 65–66, 153–54 Self-Tracking (Neff, Nafus), 257n77 Sen, Amartya, 201–2 sensors and sensing: biosensors, 141; body sensors, 171; GPS tracking, 29; sensing as model for knowledge, 8; for telematics, 65.


pages: 179 words: 43,441

The Fourth Industrial Revolution by Klaus Schwab

"World Economic Forum" Davos, 3D printing, additive manufacturing, Airbnb, Amazon Mechanical Turk, Amazon Web Services, Anthropocene, augmented reality, autonomous vehicles, barriers to entry, Baxter: Rethink Robotics, bitcoin, blockchain, Buckminster Fuller, call centre, circular economy, clean water, collaborative consumption, commoditize, conceptual framework, continuous integration, CRISPR, cross-border payments, crowdsourcing, digital divide, digital twin, disintermediation, disruptive innovation, distributed ledger, driverless car, Edward Snowden, Elon Musk, epigenetics, Erik Brynjolfsson, future of work, global value chain, Google Glasses, hype cycle, income inequality, Internet Archive, Internet of things, invention of the steam engine, job automation, job satisfaction, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, life extension, Lyft, Marc Benioff, mass immigration, megacity, meta-analysis, more computing power than Apollo, mutually assured destruction, Narrative Science, Network effects, Nicholas Carr, nuclear taboo, OpenAI, personalized medicine, precariat, precision agriculture, Productivity paradox, race to the bottom, randomized controlled trial, reshoring, RFID, rising living standards, Sam Altman, Second Machine Age, secular stagnation, self-driving car, sharing economy, Silicon Valley, smart cities, smart contracts, social contagion, software as a service, Stephen Hawking, Steve Jobs, Steven Levy, Stuxnet, supercomputer in your pocket, synthetic biology, TaskRabbit, The Future of Employment, The Spirit Level, total factor productivity, transaction costs, Uber and Lyft, uber lyft, Watson beat the top human players on Jeopardy!, Wayback Machine, WikiLeaks, winner-take-all economy, women in the workforce, working-age population, Y Combinator, Zipcar

In the process, it will have transformative impact across all industries, from manufacturing to infrastructure to healthcare. Consider remote monitoring – a widespread application of the IoT. Any package, pallet or container can now be equipped with a sensor, transmitter or radio frequency identification (RFID) tag that allows a company to track where it is as it moves through the supply chain – how it is performing, how it is being used, and so on. Similarly, customers can continuously track (practically in real time) the progress of the package or document they are expecting. For companies that are in the business of operating long and complex supply chains, this is transformative.


Confronting Gun Violence in America by Thomas Gabor

classic study, Columbine, demand response, Ferguson, Missouri, income inequality, mandatory minimum, More Guns, Less Crime, RFID, Silicon Valley, traumatic brain injury, urban sprawl, work culture

Stephen Teret and Adam Mernit of Johns Hopkins University have argued that the impressive reductions in highway fatalities have been attributable more to design changes in cars than to changes in driver behavior.98 They make the case that the same result can be achieved through altering the design 306 Confronting Gun Violence in America of firearms. A number of options are being developed with regard to personalized or smart guns99: 1. One approach uses radio frequency identification (RFID) technology, whereby “tags,” which can be objects (e.g., wristwatches, bracelets) containing tiny electromagnetic transmitters, communicate with “readers,” which are embedded in a gun. RFID is widely used for controlled building access and in library book theft prevention, among other uses. When the reader detects the tag, a mechanical device in the gun can move a blocking mechanism so the gun can be fired.


pages: 503 words: 131,064

Liars and Outliers: How Security Holds Society Together by Bruce Schneier

Abraham Maslow, airport security, Alvin Toffler, barriers to entry, behavioural economics, benefit corporation, Berlin Wall, Bernie Madoff, Bernie Sanders, Brian Krebs, Broken windows theory, carried interest, Cass Sunstein, Chelsea Manning, commoditize, corporate governance, crack epidemic, credit crunch, CRISPR, crowdsourcing, cuban missile crisis, Daniel Kahneman / Amos Tversky, David Graeber, desegregation, don't be evil, Double Irish / Dutch Sandwich, Douglas Hofstadter, Dunbar number, experimental economics, Fall of the Berlin Wall, financial deregulation, Future Shock, Garrett Hardin, George Akerlof, hydraulic fracturing, impulse control, income inequality, information security, invention of agriculture, invention of gunpowder, iterative process, Jean Tirole, John Bogle, John Nash: game theory, joint-stock company, Julian Assange, language acquisition, longitudinal study, mass incarceration, meta-analysis, microcredit, mirror neurons, moral hazard, Multics, mutually assured destruction, Nate Silver, Network effects, Nick Leeson, off-the-grid, offshore financial centre, Oklahoma City bombing, patent troll, phenotype, pre–internet, principal–agent problem, prisoner's dilemma, profit maximization, profit motive, race to the bottom, Ralph Waldo Emerson, RAND corporation, Recombinant DNA, rent-seeking, RFID, Richard Thaler, risk tolerance, Ronald Coase, security theater, shareholder value, slashdot, statistical model, Steven Pinker, Stuxnet, technological singularity, The Market for Lemons, The Nature of the Firm, The Spirit Level, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, Timothy McVeigh, too big to fail, traffic fines, Tragedy of the Commons, transaction costs, ultimatum game, UNCLOS, union organizing, Vernor Vinge, WikiLeaks, World Values Survey, Y2K, Yochai Benkler, zero-sum game

This works with things like bathrobes, but it's too easy for the hotel to lose track of how many towels a guest has in his room, especially if piles of them are available at the pool or can easily be taken from a housekeeper's cart in the hallway. A newer system, still not widespread, is to embed washable computer chips into the towels and track their movement around the hotel electronically. One anonymous Hawaii hotel claims they've reduced towel theft from 4,000 a month to 750, saving $16,000 monthly in replacement costs. Assuming the RFID tags are inexpensive and don't wear out too quickly, that's a pretty good security system. Let's go back to our two prisoners. They are morally inclined not to betray each other. Their reputation in the underworld depends on them not betraying their fellow criminal. And the criminal organization they're part of has unwritten but very real sanctions against betraying other criminals to the police.

To make cooperation easier, think of automatic face-recognition systems, uniforms, those automatic road-sign radar guns that tell you what speed you're going, and road signs that inform you of the rules. Detection/response systems. These include burglar alarms, sensors in smokestacks to detect pollutants, RFID tags attached to store merchandise—or hotel towels—and detectors at the doorways, intrusion-detection systems in computer networks, and a UV light to detect if your hotel's bed sheets are clean. Audit/forensic systems. These are primarily enhancements to institutional societal pressure. They include fingerprint- and DNA-matching technology and the expert systems that analyze credit card spending, looking for patterns of fraud.


pages: 598 words: 140,612

Triumph of the City: How Our Greatest Invention Makes Us Richer, Smarter, Greener, Healthier, and Happier by Edward L. Glaeser

affirmative action, Andrei Shleifer, Berlin Wall, Boeing 747, British Empire, Broken windows theory, carbon footprint, carbon tax, Celebration, Florida, classic study, clean water, company town, congestion charging, congestion pricing, Cornelius Vanderbilt, declining real wages, desegregation, different worldview, diversified portfolio, Edward Glaeser, Elisha Otis, endowment effect, European colonialism, Fairchild Semiconductor, financial innovation, Ford Model T, Frank Gehry, global village, Guggenheim Bilbao, haute cuisine, high-speed rail, Home mortgage interest deduction, James Watt: steam engine, Jane Jacobs, job-hopping, John Snow's cholera map, junk bonds, Lewis Mumford, machine readable, Mahatma Gandhi, McMansion, megacity, megaproject, Michael Milken, mortgage debt, mortgage tax deduction, New Urbanism, place-making, Ponzi scheme, Potemkin village, Ralph Waldo Emerson, rent control, RFID, Richard Florida, Rosa Parks, school vouchers, Seaside, Florida, Silicon Valley, Skype, smart cities, Steven Pinker, streetcar suburb, strikebreaker, Thales and the olive presses, the built environment, The Death and Life of Great American Cities, the new new thing, The Wealth of Nations by Adam Smith, trade route, transatlantic slave trade, upwardly mobile, urban planning, urban renewal, urban sprawl, vertical integration, William Shockley: the traitorous eight, Works Progress Administration, young professional

., 58-59; Foot, Milan Since the Miracle, 113. 237 also made Milan’s population plummet: “Milan,” Encyclopædia Britannica. 238 population increased between 2000 and 2008: Istat, Demography in Figures. 238 Milan’s per capita productivity is the highest: In this case, I am using productivity to mean value added per capita. Author’s calculations using Istat, Regional Accounts and National Economic Accounts. 238 three quarters of Milan’s workers are in services: Author’s calculations using Istat, Regional Accounts. 238 Miuccia Prada and Patrizio Bertelli: Galloni, “Miuccia and Me”; “Learning from Prada,” RFID Journal, June 24, 2002, www.rfidjournal.com/article/view/272/1; and for Pocone, “Prada, Miuccia,” Britannica Book of the Year, 2003, Encyclopædia Britannica. 238 The Versaces: Spindler, “Gianni Versace.” 238 A quarter of the Vancouver area’s residents: Canada: Statistics Canada, Population 15 Years and Over; and Canada: Statistics Canada, Greater Vancouver. 239 top of global quality-of-life rankings: For instance, Mercer’s Quality of Living Worldwide City Rankings, www.mercer.com/qualityoflivingpr#City_Ranking_Tables, or the Economist Intelligence Unit, Global Liveability Report, www.eiu.com/site_info.asp?

New York: Free Press, 2003. Lay, Maxwell Gordon. Ways of the World: A History of the World’s Roads and of the Vehicles That Used Them. New Brunswick, NJ: Rutgers University Press, 1992. Leape, Jonathan. “The London Congestion Charge.” Journal of Economic Perspectives 20, no. 4 (Autumn 2006): 157-76. “Learning from Prada.” RFID Journal, June 24, 2002, www.rfidjournal.com/article/view/272/1. Lee, Sidney. A Life of William Shakespeare. London: Smith Elder, 1898. Levick, Barbara. Vespasian. New York: Routledge, 1999. Levine, Robert M. The History of Brazil. Westport, CT: Greenwood Press, 1999. ———. Vale of Tears: Revisiting the Canudos Massacre in Northeastern Brazil, 1893-1897.


pages: 420 words: 135,569

Imaginable: How to See the Future Coming and Feel Ready for Anything―Even Things That Seem Impossible Today by Jane McGonigal

2021 United States Capitol attack, Airbnb, airport security, Alvin Toffler, augmented reality, autism spectrum disorder, autonomous vehicles, availability heuristic, basic income, biodiversity loss, bitcoin, Black Lives Matter, blockchain, circular economy, clean water, climate change refugee, cognitive bias, cognitive dissonance, Community Supported Agriculture, coronavirus, COVID-19, CRISPR, cryptocurrency, data science, decarbonisation, digital divide, disinformation, Donald Trump, drone strike, Elon Musk, fake news, fiat currency, future of work, Future Shock, game design, George Floyd, global pandemic, global supply chain, Greta Thunberg, income inequality, index card, Internet of things, Jane Jacobs, Jeff Bezos, Kickstarter, labor-force participation, lockdown, longitudinal study, Mason jar, mass immigration, meta-analysis, microbiome, Minecraft, moral hazard, open borders, pattern recognition, place-making, plant based meat, post-truth, QAnon, QR code, remote working, RFID, risk tolerance, School Strike for Climate, Search for Extraterrestrial Intelligence, self-driving car, Silicon Valley, Silicon Valley startup, Snapchat, social distancing, stem cell, TED Talk, telepresence, telepresence robot, The future is already here, TikTok, traumatic brain injury, universal basic income, women in the workforce, work culture , Y Combinator

Many of the waste management ideas described in the hypothetical scenario are already being experimented with today. Pay-as-you-throw programs, for example, already exist in many parts of the world. In South Korea, all food waste must be separated from other trash and weighed in community “smart bins” equipped with scales and radio frequency identification (RFID) readers. Individuals must scan an RFID card to open the bin and throw something out, and they are automatically charged per pound of trash. As a result, the country now recycles an astonishing 95 percent of its food waste—up from 2 percent in 1995. In other pay-as-you-throw programs, such as in the city of Taipei, trash is collected only in special blue bags, which individuals must purchase if they want to throw anything out.


pages: 165 words: 50,798

Intertwingled: Information Changes Everything by Peter Morville

A Pattern Language, Airbnb, Albert Einstein, Arthur Eddington, augmented reality, Bernie Madoff, bike sharing, Black Swan, business process, Cass Sunstein, cognitive dissonance, collective bargaining, Computer Lib, disinformation, disruptive innovation, folksonomy, holacracy, index card, information retrieval, Internet of things, Isaac Newton, iterative process, Jane Jacobs, Jeff Hawkins, John Markoff, Kanban, Lean Startup, Lyft, messenger bag, minimum viable product, Mother of all demos, Nelson Mandela, Paul Graham, peer-to-peer, Project Xanadu, quantum entanglement, RFID, Richard Thaler, ride hailing / ride sharing, Schrödinger's Cat, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley startup, single source of truth, source of truth, Steve Jobs, Stewart Brand, systems thinking, Ted Nelson, the Cathedral and the Bazaar, The Death and Life of Great American Cities, the scientific method, The Wisdom of Crowds, theory of mind, uber lyft, urban planning, urban sprawl, Vannevar Bush, vertical integration, zero-sum game

We’re so busy searching for dinosaurs, we forget to look where we’re going. In 2004 when Bruce Sterling first spoke of spime – speculative objects precisely located in space and time – the vision he painted was bright green. Transfigured from passive consumers into heroic wranglers, we would mash products, sensors, RFID, and GPS into sustainable spime to reduce, reuse, and recycle like never before. It’s possible to live in a cleaner way. We live in debris and detritus because of our ignorance. That ignorance is no longer technically necessary…Our capacities are tremendous. Eventually, it is within our technical ability to create factories that clean the air as they work, cars that give off drinkable water, industry that creates parks instead of dumps, or even monitoring systems that allow nature to thrive in our cities, neighborhoods, lawns and homes.


pages: 797 words: 227,399

Wired for War: The Robotics Revolution and Conflict in the 21st Century by P. W. Singer

agricultural Revolution, Albert Einstein, Alvin Toffler, Any sufficiently advanced technology is indistinguishable from magic, Atahualpa, barriers to entry, Berlin Wall, Bill Joy: nanobots, Bletchley Park, blue-collar work, borderless world, Boston Dynamics, Charles Babbage, Charles Lindbergh, clean water, Craig Reynolds: boids flock, cuban missile crisis, digital divide, digital map, Dr. Strangelove, en.wikipedia.org, Ernest Rutherford, failed state, Fall of the Berlin Wall, Firefox, Ford Model T, Francisco Pizarro, Frank Gehry, friendly fire, Future Shock, game design, George Gilder, Google Earth, Grace Hopper, Hans Moravec, I think there is a world market for maybe five computers, if you build it, they will come, illegal immigration, industrial robot, information security, interchangeable parts, Intergovernmental Panel on Climate Change (IPCC), invention of gunpowder, invention of movable type, invention of the steam engine, Isaac Newton, Jacques de Vaucanson, job automation, Johann Wolfgang von Goethe, junk bonds, Law of Accelerating Returns, Mars Rover, Menlo Park, mirror neurons, Neal Stephenson, New Urbanism, Nick Bostrom, no-fly zone, PalmPilot, paperclip maximiser, pattern recognition, precautionary principle, private military company, RAND corporation, Ray Kurzweil, RFID, robot derives from the Czech word robota Czech, meaning slave, Rodney Brooks, Ronald Reagan, Schrödinger's Cat, Silicon Valley, social intelligence, speech recognition, Stephen Hawking, Strategic Defense Initiative, strong AI, technological singularity, The Coming Technological Singularity, The Wisdom of Crowds, Timothy McVeigh, Turing test, Vernor Vinge, Virgin Galactic, Wall-E, warehouse robotics, world market for maybe five computers, Yogi Berra

While the full force is still a few decades out, a similar trend is already starting to appear with voluntary technologic implants. These don’t merely replace something lost, but add something more. The Florida-based VeriChip company, for instance, has sold human-implantable radio-frequency identification (RFID) chips to over five thousand security, government, and industrial installations. Even the Baja Beach Club, one of Barcelona’s hottest nightclubs, is a buyer. In 2006, the club implanted its VIP customers, including the entire cast of Grand Hermano (the Spanish version of the reality show Big Brother), with the tiny microchips, so that they would not have to wait in line or need to carry cash or credit cards.

Navy) Professional, Educated, Trained, and Empowered (PETE) electronic assistant Project Alpha Pugwash movement Pulsed Energy Projectile Purple (supercomputer) al-Qaeda technology and al-Qaeda in Iraq Qiao Liang QinetiQ Quantico (Bear) QuickTime (software program) Quinn, Robert radio control devices radio-frequency identification(RFID) radio-frequency weapons (e-bombs) Raduege, Harry Rainbows End: A Novel with One Foot in the Future (Vinge) Ramirez, Louis Ramona (AI program) RAND Raven (unmanned aerial vehicle) Raytheon RCA Reagan, Ronald Real-Time Adversarial Intelligence and Decision-making (RAID) Reaper (unmanned aerial vehicle) Record, Jeffrey Reed, Lou Rees, Martin Reid, John Reid, Steve Remotec Remote Environmental Monitoring Unit (REMUS) remotely piloted vehicles (RPVs) Repliee (android) Republican Guard, Iraqi REV (Robotic Evacuation Vehicle) REX (Robotic Extraction Vehicle) Reynolds, Craig RFID (radio-frequency identification) RHEX (robot) Ribich, William Rice, Condoleezza Richards, Russ Richtofen, Manfred von Rifkin, Jeremy RMA (revolution in military affairs) hybrid technology and network-centric warfare and Robb, John Robert Heinlein, U.S.S.

Navy) Professional, Educated, Trained, and Empowered (PETE) electronic assistant Project Alpha Pugwash movement Pulsed Energy Projectile Purple (supercomputer) al-Qaeda technology and al-Qaeda in Iraq Qiao Liang QinetiQ Quantico (Bear) QuickTime (software program) Quinn, Robert radio control devices radio-frequency identification(RFID) radio-frequency weapons (e-bombs) Raduege, Harry Rainbows End: A Novel with One Foot in the Future (Vinge) Ramirez, Louis Ramona (AI program) RAND Raven (unmanned aerial vehicle) Raytheon RCA Reagan, Ronald Real-Time Adversarial Intelligence and Decision-making (RAID) Reaper (unmanned aerial vehicle) Record, Jeffrey Reed, Lou Rees, Martin Reid, John Reid, Steve Remotec Remote Environmental Monitoring Unit (REMUS) remotely piloted vehicles (RPVs) Repliee (android) Republican Guard, Iraqi REV (Robotic Evacuation Vehicle) REX (Robotic Extraction Vehicle) Reynolds, Craig RFID (radio-frequency identification) RHEX (robot) Ribich, William Rice, Condoleezza Richards, Russ Richtofen, Manfred von Rifkin, Jeremy RMA (revolution in military affairs) hybrid technology and network-centric warfare and Robb, John Robert Heinlein, U.S.S. Robo-lobster (unmanned underwater vehicle) Robo-One (competitive event) Robot Guard Dog Robotic Autonomy Robotic Enhanced Detection Outpost with Lasers (REDOWL) Robotic Evacuation Vehicle (REV) Robotic Extraction Vehicle (REX) robotics: Asian China’s cyberwarfare program and cold war and exponential change in future of warfare and growth of human limitations and robotics (cont.)


pages: 234 words: 57,267

Python Network Programming Cookbook by M. Omar Faruque Sarker

business intelligence, cloud computing, Debian, DevOps, Firefox, inflight wifi, machine readable, RFID, web application

Vasudeva Varma, who showed me the direction in my work and helped me a lot. I would also like to thank my Google Summer of Code mentor, Patirica Tressel. Tom Stephens has worked in software development for nearly 10 years and is currently working in embedded development dealing with smartcards, cryptography, and RFID in the Denver metro area. His diverse background includes experience ranging from embedded virtual machines to web UX/UI design to enterprise Business Intelligence. He is most passionate about good software design, including intelligent testing and constantly evolving practices to produce a better product with minimal effort.


pages: 501 words: 145,943

If Mayors Ruled the World: Dysfunctional Nations, Rising Cities by Benjamin R. Barber

"World Economic Forum" Davos, Aaron Swartz, Affordable Care Act / Obamacare, American Legislative Exchange Council, Berlin Wall, bike sharing, borderless world, Boris Johnson, Bretton Woods, British Empire, car-free, carbon footprint, Cass Sunstein, Celebration, Florida, classic study, clean water, congestion pricing, corporate governance, Crossrail, crowdsourcing, David Brooks, desegregation, Detroit bankruptcy, digital divide, digital Maoism, digital rights, disinformation, disintermediation, edge city, Edward Glaeser, Edward Snowden, Etonian, Evgeny Morozov, failed state, Fall of the Berlin Wall, feminist movement, Filter Bubble, gentrification, George Gilder, ghettoisation, global pandemic, global village, Hernando de Soto, Howard Zinn, illegal immigration, In Cold Blood by Truman Capote, income inequality, informal economy, information retrieval, Jane Jacobs, Jaron Lanier, Jeff Bezos, Lewis Mumford, London Interbank Offered Rate, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, megacity, microcredit, Mikhail Gorbachev, mortgage debt, mutually assured destruction, new economy, New Urbanism, Nicholas Carr, Norman Mailer, nuclear winter, obamacare, Occupy movement, off-the-grid, Panopticon Jeremy Bentham, Peace of Westphalia, Pearl River Delta, peer-to-peer, planetary scale, plutocrats, Prenzlauer Berg, profit motive, Ralph Waldo Emerson, RFID, Richard Florida, Ronald Reagan, self-driving car, Silicon Valley, SimCity, Skype, smart cities, smart meter, Steve Jobs, Stewart Brand, technological determinism, technological solutionism, TED Talk, Telecommunications Act of 1996, The Death and Life of Great American Cities, The Fortune at the Bottom of the Pyramid, The future is already here, The Wealth of Nations by Adam Smith, Tobin tax, Tony Hsieh, trade route, UNCLOS, UNCLOS, unpaid internship, urban sprawl, Virgin Galactic, War on Poverty, zero-sum game

To be sure, cities know technology per se is only a means, and as such, carries its own baggage (which we will unpack below). Yet cyber-zealotry is infectious. As one proponent of smart cities has noted, “we can collect and access data now from an astonishing variety of sources: there are 30 billion RFID tags [the new tech barcodes] embedded into our world . . . we have 1 billion cell phones with cameras able to capture and share images and events; and everything from domestic appliances to vehicles to buildings is increasingly able to monitor its location, condition and performance and communicate that information to the outside world.”5 Cities have always been interdependent: the digital revolution has simply rendered that interdependence palpable—putatively both efficient and concrete.

., 229 Prison population racial differences, 185 Privacy International, 258 Problem solving, 13, 70–71, 90 P2P (peer-to-peer) technology, 266 Public sector jobs, 199–201 Public spaces, 44–48, 71; and culture, 273, 274–280 Public transportation inequality, 195–197 “Push” technology, 253, 257 Race and inequality, 182, 185, 186 Rama, Edi, 86 Rape in India, 181, 201, 204, 382n69 “Rebel towns,” 324 Redlining, 198 Refugee camps, 16 Regional representation, 345–347 Representation, 342–348; challenges of, 342–344; of commuters, 345; and electoral district, 346; and failure of nationality, 156; and opt-in/opt-out rights, 346; on parliament of mayors, 346–347, 352–355; of regions, 345–347; as trusteeship, 347–348 Republican class in U.S., 34–35 413 RFID tags, 243 Rio Conventions, 134 Rio de Janeiro, inequalities in transportation, 195–196 Romney, Mitt, 218, 322 Rousseau, Jean-Jacques, 7, 32–34, 161, 283, 299 Ruble, Blair, 173 Rural life. See Virtues and vices of cities vs. countryside Rustbelt cities, 186, 223 Sandig, Jochen, 278–279 San Francisco and gay marriage, 167 Santa Monica as rebel town, 324 Santander, Spain, smart sensors in, 261 São Paulo business revival, 223 Sassen, Saskia, 10, 16, 65–66, 116, 248 Scavengers, 231 Schmidt, Eric, 241 Scholz, Olaf, 109 Schuster, Wolfgang: on democracy, 8, 84; on jobs, 213; on networks, 169; on parliament of mayors, 337, 338, 344, 353; profile, 103–105 Sea level rise, 130 Seastead, 16 Seattle, plastic grocery bag ban, 149 “Seaworlds,” 16 Second Life (video game), 261, 391n39 Secularism, 70 Security, 121–130, 160, 202–204 Segregation, 187–192 Selebi, Jackie, 126 “Self-driving cars,” 261 Self-sufficiency, 60, 63–64, 321–325 Self-Sufficient City Contest, 18 Seoul.


pages: 526 words: 155,174

Sixty Days and Counting by Kim Stanley Robinson

carbon credits, different worldview, dumpster diving, energy security, full employment, gentrification, Golden Gate Park, Great Leap Forward, hiring and firing, Intergovernmental Panel on Climate Change (IPCC), Kim Stanley Robinson, McMansion, megacity, military-industrial complex, mutually assured destruction, off grid, off-the-grid, place-making, Ralph Waldo Emerson, RFID, Richard Feynman, Saturday Night Live, urban decay, Works Progress Administration

They had a bad history together on this front, having lost a gibbon that fell to its death after Frank hit it with a trank dart. Neither mentioned this now, but they spoke little until the staffers arrived and one of them shot the tapir. At that the other animals bolted, and the humans approached. The big RFID chip was inserted under the tapir’s thick skin. The animal’s vital signs seemed good. Then they decided to take it in anyway. Too many tapirs had died. Nick and Frank helped hoist the animal onto a gurney big enough for all of them to get a hand on. They carried the unconscious beast through the snow like its pallbearers.

Cutter gestured at the view with the can of beer in his hand: “Ain’t it pretty? All these leaves, and nobody’s gonna have to leaf-blow them away.” Fedpage did join him on a dawn patrol one morning, massaging his face to wake up. The two of them wandered slowly up the ravine, peering through the trees, pinging animals they saw with their FOG RFID readers. Fedpage talked under his breath most of the time. Perhaps obsessive-compulsive, with huge systems in his mind which made better sense to him than he could convey to other people. He was not unlike Anna in this intense regard for systems, but did not have Anna’s ability to assign them their proper importance, to prioritize and see a path through a pattern, which was what made Anna so good at NSF.


pages: 527 words: 147,690

Terms of Service: Social Media and the Price of Constant Connection by Jacob Silverman

"World Economic Forum" Davos, 23andMe, 4chan, A Declaration of the Independence of Cyberspace, Aaron Swartz, Airbnb, airport security, Amazon Mechanical Turk, augmented reality, basic income, Big Tech, Brian Krebs, California gold rush, Californian Ideology, call centre, cloud computing, cognitive dissonance, commoditize, company town, context collapse, correlation does not imply causation, Credit Default Swap, crowdsourcing, data science, deep learning, digital capitalism, disinformation, don't be evil, driverless car, drone strike, Edward Snowden, Evgeny Morozov, fake it until you make it, feminist movement, Filter Bubble, Firefox, Flash crash, game design, global village, Google Chrome, Google Glasses, Higgs boson, hive mind, Ian Bogost, income inequality, independent contractor, informal economy, information retrieval, Internet of things, Jacob Silverman, Jaron Lanier, jimmy wales, John Perry Barlow, Kevin Kelly, Kevin Roose, Kickstarter, knowledge economy, knowledge worker, Larry Ellison, late capitalism, Laura Poitras, license plate recognition, life extension, lifelogging, lock screen, Lyft, machine readable, Mark Zuckerberg, Mars Rover, Marshall McLuhan, mass incarceration, meta-analysis, Minecraft, move fast and break things, national security letter, Network effects, new economy, Nicholas Carr, Occupy movement, off-the-grid, optical character recognition, payday loans, Peter Thiel, planned obsolescence, postindustrial economy, prediction markets, pre–internet, price discrimination, price stability, profit motive, quantitative hedge fund, race to the bottom, Ray Kurzweil, real-name policy, recommendation engine, rent control, rent stabilization, RFID, ride hailing / ride sharing, Salesforce, self-driving car, sentiment analysis, shareholder value, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Snapchat, social bookmarking, social graph, social intelligence, social web, sorting algorithm, Steve Ballmer, Steve Jobs, Steven Levy, systems thinking, TaskRabbit, technological determinism, technological solutionism, technoutopianism, TED Talk, telemarketer, transportation-network company, Travis Kalanick, Turing test, Uber and Lyft, Uber for X, uber lyft, universal basic income, unpaid internship, women in the workforce, Y Combinator, yottabyte, you are the product, Zipcar

And there are vast quantities of data, including much of what we do on social media, that are simply public, out there for the taking, whether by an intelligence agency or a small company conducting sentiment analysis. These digital bread crumbs, the tiny leavings that we produce on a daily basis, have spawned a new term: dataveillance. Dataveillance is surveillance enabled by the data produced by credit cards, E-ZPass devices and toll booths, RFID pass cards, transit cards, browser histories, and on and on. Often, they are not important for the actual data they contain—such as what you bought with your credit card—but for their metadata—the time and location you made a purchase, where you went to next, the route you took. (Metadata is data about data, data that describes other data.)

For this nascent market, dispensing with human labor may prove more lucrative than the current arrangement. Strangely, it may also prove more humane. One could imagine a movement forming in which labor rights advocates say that micro-work is so unsustainable and dehumanizing that it must be automated. Add RFID chips to all packaged food and grocery products and you can track their movement through supply chains and stores without human assistance. Perhaps companies can partner with stores to help utilize their surveillance systems to monitor the placement of goods. Firm up sentiment analysis, trending-topic algorithms, and optical-character-recognition scanning so that humans aren’t forced to do such drudgery.


pages: 391 words: 22,799

To Serve God and Wal-Mart: The Making of Christian Free Enterprise by Bethany Moreton

affirmative action, American Legislative Exchange Council, anti-communist, Berlin Wall, big-box store, Bretton Woods, Buckminster Fuller, collective bargaining, company town, corporate personhood, creative destruction, deindustrialization, desegregation, Donald Trump, emotional labour, estate planning, eternal september, Fall of the Berlin Wall, Frederick Winslow Taylor, George Gilder, global village, Great Leap Forward, informal economy, invisible hand, liberation theology, longitudinal study, market fundamentalism, Mont Pelerin Society, mortgage tax deduction, Naomi Klein, new economy, post-industrial society, postindustrial economy, prediction markets, price anchoring, prosperity theology / prosperity gospel / gospel of success, Ralph Nader, RFID, road to serfdom, Ronald Reagan, scientific management, Silicon Valley, Stewart Brand, strikebreaker, The Wealth of Nations by Adam Smith, union organizing, walkable city, Washington Consensus, white flight, Whole Earth Catalog, work culture , Works Progress Administration

Stanley D. Brunn (New York: Routledge, 2006), 227–42; Charles Fishman, The Wal-Mart Effect: How the World’s Most Powerful Company Really Works—and How It’s Transforming the American Economy (New York: Penguin, 2006); ATKearney, “Meeting the Retail RFID Mandate: A Discussion of the Issues Facing CPG Companies,” (2003), www. atkearney.com/shared_res/pdf/Retail_RFID_S.pdf. 74. James Hoopes, “Growth Through Knowledge: Wal-Mart, High Technology, and the Ever Less Visible Hand of the Manager,” in Wal-Mart: The Face of Twenty-First Century Capitalism, ed. Nelson Lichtenstein (New York: New Press, 2006), 83–104; on supply chains, see Bonacich and Wilson, “Global Production and Distribution.” 5.


pages: 207 words: 59,298

The Gig Economy: A Critical Introduction by Jamie Woodcock, Mark Graham

Airbnb, algorithmic management, Amazon Mechanical Turk, autonomous vehicles, barriers to entry, British Empire, business process, business process outsourcing, Californian Ideology, call centre, collective bargaining, commoditize, corporate social responsibility, crowdsourcing, data science, David Graeber, deindustrialization, Didi Chuxing, digital divide, disintermediation, emotional labour, en.wikipedia.org, full employment, future of work, gamification, gender pay gap, gig economy, global value chain, Greyball, independent contractor, informal economy, information asymmetry, inventory management, Jaron Lanier, Jeff Bezos, job automation, knowledge economy, low interest rates, Lyft, mass immigration, means of production, Network effects, new economy, Panopticon Jeremy Bentham, planetary scale, precariat, rent-seeking, RFID, ride hailing / ride sharing, Ronald Reagan, scientific management, self-driving car, sentiment analysis, sharing economy, Silicon Valley, Silicon Valley ideology, TaskRabbit, The Future of Employment, transaction costs, Travis Kalanick, two-sided market, Uber and Lyft, Uber for X, uber lyft, union organizing, women in the workforce, working poor, young professional

Transport is an area that is the focus of substantial investment in automation technologies, and many of the sorts of jobs on microwork platforms have already been automated by some companies. With delivery work, some parts of the labour process have already been automated, through the use of GPS-assisted route planning and barcodes or radio-frequency identification (RFID) tagging for inventory management. The second is that in all of these cases, workers are contributing to datasets being used to train artificial replacements. The data generated by drivers contributes to the training sets for self-driving cars, while microwork allows for a much wider range of training data.


pages: 918 words: 257,605

The Age of Surveillance Capitalism by Shoshana Zuboff

"World Economic Forum" Davos, algorithmic bias, Amazon Web Services, Andrew Keen, augmented reality, autonomous vehicles, barriers to entry, Bartolomé de las Casas, behavioural economics, Berlin Wall, Big Tech, bitcoin, blockchain, blue-collar work, book scanning, Broken windows theory, California gold rush, call centre, Cambridge Analytica, Capital in the Twenty-First Century by Thomas Piketty, Cass Sunstein, choice architecture, citizen journalism, Citizen Lab, classic study, cloud computing, collective bargaining, Computer Numeric Control, computer vision, connected car, context collapse, corporate governance, corporate personhood, creative destruction, cryptocurrency, data science, deep learning, digital capitalism, disinformation, dogs of the Dow, don't be evil, Donald Trump, Dr. Strangelove, driverless car, Easter island, Edward Snowden, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, facts on the ground, fake news, Ford Model T, Ford paid five dollars a day, future of work, game design, gamification, Google Earth, Google Glasses, Google X / Alphabet X, Herman Kahn, hive mind, Ian Bogost, impulse control, income inequality, information security, Internet of things, invention of the printing press, invisible hand, Jean Tirole, job automation, Johann Wolfgang von Goethe, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Joseph Schumpeter, Kevin Kelly, Kevin Roose, knowledge economy, Lewis Mumford, linked data, longitudinal study, low skilled workers, Mark Zuckerberg, market bubble, means of production, multi-sided market, Naomi Klein, natural language processing, Network effects, new economy, Occupy movement, off grid, off-the-grid, PageRank, Panopticon Jeremy Bentham, pattern recognition, Paul Buchheit, performance metric, Philip Mirowski, precision agriculture, price mechanism, profit maximization, profit motive, public intellectual, recommendation engine, refrigerator car, RFID, Richard Thaler, ride hailing / ride sharing, Robert Bork, Robert Mercer, Salesforce, Second Machine Age, self-driving car, sentiment analysis, shareholder value, Sheryl Sandberg, Shoshana Zuboff, Sidewalk Labs, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, slashdot, smart cities, Snapchat, social contagion, social distancing, social graph, social web, software as a service, speech recognition, statistical model, Steve Bannon, Steve Jobs, Steven Levy, structural adjustment programs, surveillance capitalism, technological determinism, TED Talk, The Future of Employment, The Wealth of Nations by Adam Smith, Tim Cook: Apple, two-sided market, union organizing, vertical integration, Watson beat the top human players on Jeopardy!, winner-take-all economy, Wolfgang Streeck, work culture , Yochai Benkler, you are the product

Researchers at Georgia Tech developed a version of “smart skin” that sucks energy from radio waves and other energy sources, eliminating the need for batteries. Smart skin, described as “the ultimate sensing tool that could potentially allow for the mass implementation of perpetual wireless networks,”18 can cognize, sense, analyze, wirelessly communicate, and “modify parameters” using simple radio frequency (RFID) technology.19 As in the case of Paradiso’s “sensor tape,” the researchers stress that it can also “be applied everywhere” to “monitor, sense, and interact with the world around us in a perpetual way, thus significantly enhancing ambient intelligence,” all of it as inconspicuous as a “decal sticker.”

., “Terrestrial Animal Tracking as an Eye on Life and Planet,” Science 348, no. 6240 (2015), https://doi.org/10.1126/science.aaa2478. 11. P. Ramesh Kumar, Ch. Srikanth, and K. L. Sailaja, “Location Identification of the Individual Based on Image Metadata,” Procedia Computer Science 85 (2016): 451–54, https://doi.org/10.1016/j.procs.2016.05.191; Anuradha Vishwakarma et al., “GPS and RFID Based Intelligent Bus Tracking and Management System,” International Research Journal of Engineering and Technology 3, no. 3 (2016); Nirali Panchal, “GPS Based Vehicle Tracking System and Using Analytics to Improve the Performance,” ResearchGate, June 2016, https://www.researchgate.net/publication/304129283_GPS_Based_Vehicle_Tracking_System_and_Using_Analytics_to_Improve_The_Performance. 12.

Paradiso, “Our Extended Sensoria” (italics mine). 18. Dublon and Paradiso, “Extra Sensory Perception.” 19. Kevin Ashton, a former Procter and Gamble brand manager who pioneered the marriage of radio-enabled microchips and physical products, birthed the term “internet of things,” and helped drive RFID innovation at MIT’s Media Lab, criticizes the US government for its lack of a comprehensive vision for the “internet of things” and the leadership of private firms in this domain. See Kevin Ashton, “America Last?” Politico, June 29, 2015, http://www.politico.com/agenda/story/2015/06/kevin-ashton-internet-of-things-in-the-us-000102. 20.


Demystifying Smart Cities by Anders Lisdorf

3D printing, artificial general intelligence, autonomous vehicles, backpropagation, behavioural economics, Big Tech, bike sharing, bitcoin, business intelligence, business logic, business process, chief data officer, circular economy, clean tech, clean water, cloud computing, computer vision, Computing Machinery and Intelligence, congestion pricing, continuous integration, crowdsourcing, data is the new oil, data science, deep learning, digital rights, digital twin, distributed ledger, don't be evil, Elon Musk, en.wikipedia.org, facts on the ground, Google Glasses, hydroponic farming, income inequality, information security, Infrastructure as a Service, Internet of things, Large Hadron Collider, Masdar, microservices, Minecraft, OSI model, platform as a service, pneumatic tube, ransomware, RFID, ride hailing / ride sharing, risk tolerance, Salesforce, self-driving car, smart cities, smart meter, software as a service, speech recognition, Stephen Hawking, Steve Jobs, Steve Wozniak, Stuxnet, Thomas Bayes, Turing test, urban sprawl, zero-sum game

The ITU is the United Nations’ agency for information and communication technology. The particular focus of this organization is to improve access for people and communities that are currently underserved. Their approach is to focus on the ubiquity of technology. They categorize different types of devices:Tagging things – Are RFID devices. These are historically the oldest types of IoT devices. Feeling things – Are the sensors that measure signals from the environment. Thinking things – Are things that somehow act intelligently and autonomously to stimuli. Shrinking things – Are nanotechnologies that produce devices at nanoscale.


pages: 245 words: 64,288

Robots Will Steal Your Job, But That's OK: How to Survive the Economic Collapse and Be Happy by Pistono, Federico

3D printing, Albert Einstein, autonomous vehicles, bioinformatics, Buckminster Fuller, cloud computing, computer vision, correlation does not imply causation, en.wikipedia.org, epigenetics, Erik Brynjolfsson, Firefox, future of work, gamification, George Santayana, global village, Google Chrome, happiness index / gross national happiness, hedonic treadmill, illegal immigration, income inequality, information retrieval, Internet of things, invention of the printing press, Jeff Hawkins, jimmy wales, job automation, John Markoff, Kevin Kelly, Khan Academy, Kickstarter, Kiva Systems, knowledge worker, labor-force participation, Lao Tzu, Law of Accelerating Returns, life extension, Loebner Prize, longitudinal study, means of production, Narrative Science, natural language processing, new economy, Occupy movement, patent troll, pattern recognition, peak oil, post scarcity, QR code, quantum entanglement, race to the bottom, Ray Kurzweil, recommendation engine, RFID, Rodney Brooks, selection bias, self-driving car, seminal paper, slashdot, smart cities, software as a service, software is eating the world, speech recognition, Steven Pinker, strong AI, synthetic biology, technological singularity, TED Talk, Turing test, Vernor Vinge, warehouse automation, warehouse robotics, women in the workforce

You can search for items, filter them by categories, and get information on each single product; not just nutritional elements, but you can trace the production process, the companies behind it, and dynamically compare products based on your search criteria. You can also read reviews from other people about these products, just like on Amazon.com today. You get all that you need, put in the basket, then before going out you stop for a few seconds on a gateway, which receives signals from all of the items you would like to purchase through RFID chips, and you are good to go. Swipe in your credit card, or even pay by just accepting the payment request on your cell phone. The whole process, the time between you decide to leave the store and the moment you can actually walk out, takes less than 10 seconds. No human was involved in this, no human was required.


pages: 261 words: 70,584

Retirementology: Rethinking the American Dream in a New Economy by Gregory Brandon Salsbury

Alan Greenspan, Albert Einstein, asset allocation, Bear Stearns, behavioural economics, buy and hold, carried interest, Cass Sunstein, credit crunch, Daniel Kahneman / Amos Tversky, diversification, estate planning, financial independence, fixed income, full employment, hindsight bias, housing crisis, loss aversion, market bubble, market clearing, mass affluent, Maui Hawaii, mental accounting, mortgage debt, mortgage tax deduction, National Debt Clock, negative equity, new economy, RFID, Richard Thaler, risk tolerance, Robert Shiller, side project, Silicon Valley, Steve Jobs, the rule of 72, Yogi Berra

Cheese,” July 23, 2008. 24 What It Costs, “Top Ten Most Expensive Parties Ever Thrown,” 2009. 25 Answers.com, “Jackie Mason,” 2009. 26 MetLife, “The American Dream has been revised not reversed, pragmatism is replacing consumerism as the bar stops rising/buyer’s remorse sets in, according to third annual MetLife study,” March 9, 2009. 27 The New York Times, “Given a Shovel, Americans Dig Deeper Into Debt,” July 20, 2008. 28 The New York Times, “Given a Shovel, Americans Dig Deeper Into Debt,” July 20, 2008. 29 Fare Magazine, “Consumers Cut Back on Coffee Spending,” January 30, 2009. 30 Ventura County Star, “Stores out to tempt TV buyers this week,” January 25, 2009. 31 The New York Times, “Hummer’s Decline Puts Dealers at Risk,” March 31, 2009. 32 The New York Times, “Hummer’s Decline Puts Dealers at Risk,” March 31, 2009. 33 San Diego Union-Tribune, “Parents scale back luxuries for children,” June 14, 2009. 34 Pew Research Center Publications, “Luxury or Necessity? The Public Makes a U-Turn,” April 23, 2009. 35 CreditCards.com, “Implantable credit card RFID chips: convenient, but creepy,” August 5, 2009. 36 Notable Quotes, Quotes on Las Vegas, from The Joker Is Wild, 1957. 37 Encyclopedia definition of Ruml, Beardsley, 2009. 38 Thaler, Richard, and Shlomo Benartzi, “Save More Tomorrow: Using Behavioral Economics to Increase Employee Saving,” November 2000. 39 WebCPA, “Automatic 401(k) Enrollment Is Not for Everyone,” October 27, 2009. 40 The New York Times, “Target-Date Funds: Seven Questions to Ask Before Jumping In,” June 29, 2009. 41 Pensions & Investments, “Special Report: The Looming Retirement Disaster,” April 18, 2005. 42 Hewitt, “Hewitt Study Shows Nearly Half of U.S.


pages: 603 words: 182,781

Aerotropolis by John D. Kasarda, Greg Lindsay

3D printing, air freight, airline deregulation, airport security, Akira Okazaki, Alvin Toffler, An Inconvenient Truth, Asian financial crisis, back-to-the-land, barriers to entry, Bear Stearns, Berlin Wall, big-box store, blood diamond, Boeing 747, book value, borderless world, Boris Johnson, British Empire, business cycle, call centre, carbon footprint, Cesare Marchetti: Marchetti’s constant, Charles Lindbergh, Clayton Christensen, clean tech, cognitive dissonance, commoditize, company town, conceptual framework, credit crunch, David Brooks, David Ricardo: comparative advantage, Deng Xiaoping, deskilling, digital map, disruptive innovation, Dr. Strangelove, Dutch auction, Easter island, edge city, Edward Glaeser, Eyjafjallajökull, failed state, financial engineering, flag carrier, flying shuttle, food miles, Ford Model T, Ford paid five dollars a day, Frank Gehry, fudge factor, fulfillment center, full employment, future of work, Future Shock, General Motors Futurama, gentleman farmer, gentrification, Geoffrey West, Santa Fe Institute, George Gilder, global supply chain, global village, gravity well, Great Leap Forward, Haber-Bosch Process, Hernando de Soto, high-speed rail, hive mind, if you build it, they will come, illegal immigration, inflight wifi, intangible asset, interchangeable parts, Intergovernmental Panel on Climate Change (IPCC), intermodal, invention of the telephone, inventory management, invisible hand, Jane Jacobs, Jeff Bezos, Jevons paradox, Joan Didion, Kangaroo Route, Kickstarter, Kiva Systems, knowledge worker, kremlinology, land bank, Lewis Mumford, low cost airline, Marchetti’s constant, Marshall McLuhan, Masdar, mass immigration, McMansion, megacity, megaproject, Menlo Park, microcredit, military-industrial complex, Network effects, New Economic Geography, new economy, New Urbanism, oil shale / tar sands, oil shock, One Laptop per Child (OLPC), peak oil, Pearl River Delta, Peter Calthorpe, Peter Thiel, pets.com, pink-collar, planned obsolescence, pre–internet, RFID, Richard Florida, Ronald Coase, Ronald Reagan, Rubik’s Cube, savings glut, Seaside, Florida, Shenzhen special economic zone , Shenzhen was a fishing village, Silicon Valley, Silicon Valley startup, SimCity, Skype, smart cities, smart grid, South China Sea, South Sea Bubble, sovereign wealth fund, special economic zone, spice trade, spinning jenny, starchitect, stem cell, Steve Jobs, Suez canal 1869, sunk-cost fallacy, supply-chain management, sustainable-tourism, tech worker, telepresence, the built environment, The Chicago School, The Death and Life of Great American Cities, the long tail, The Nature of the Firm, thinkpad, Thomas L Friedman, Thomas Malthus, Tony Hsieh, trade route, transcontinental railway, transit-oriented development, traveling salesman, trickle-down economics, upwardly mobile, urban planning, urban renewal, urban sprawl, vertical integration, Virgin Galactic, walkable city, warehouse robotics, white flight, white picket fence, Yogi Berra, zero-sum game

Every package entering the sort passes under a camera and infrared sensor capable of reading characters and correctly estimating dimensions and weight. In the future, even that won’t be necessary once radio frequency identification chips are embedded in their sides, broadcasting the vital signs of what’s within. For now, these RFID tags still cost more money than they save, and until that flips around, any labels missing a key piece of information—a scrawled digit in the zip code, perhaps—have their pictures flashed to a room full of PCs where human operators are required to fill in the blanks. At two in the morning, it is typically filled with college-age men and women slumped in silence, iPod earbuds firmly in place, clicking and dragging over and over as they zoom in to see what’s the matter.

The real revolution had taken place twenty years before, with the widespread adoption of bar codes. Lands’ End could retire hunt-and-peck picking methods and switch to more efficient methods, quadrupling productivity from 175 items picked per hour to 600 or 700. Zappos’ carousel picker tripled their pace; Kiva’s robots doubled it again. Kasarda believes the next doubling will come when RFID chips replace bar codes, and then again when “intelligent agents” embedded in those chips guide packages, robots, and belts to their final destinations, with no humans necessary. The Internet arm of Zappos could physically be located anywhere, and Tony Hsieh knows it. He moved his headquarters from San Francisco to Las Vegas several years ago in pursuit of cheaper labor.


pages: 704 words: 182,312

This Is Service Design Doing: Applying Service Design Thinking in the Real World: A Practitioners' Handbook by Marc Stickdorn, Markus Edgar Hormess, Adam Lawrence, Jakob Schneider

"World Economic Forum" Davos, 3D printing, business cycle, business process, call centre, Clayton Christensen, commoditize, corporate governance, corporate social responsibility, crowdsourcing, data science, different worldview, Eyjafjallajökull, fail fast, glass ceiling, Internet of things, iterative process, Kanban, Lean Startup, M-Pesa, minimum viable product, mobile money, off-the-grid, pattern recognition, RFID, scientific management, side project, Silicon Valley, software as a service, stealth mode startup, sustainable-tourism, systems thinking, tacit knowledge, the built environment, the scientific method, urban planning, work culture

The solution Our co-created customer journey evolved into a service blueprint, outlining requirements for the physical form and digital components. Customer-centric thinking, stake holder awareness, and a sophisticated interpretation of brand form language were merged with a deep understanding of digital technologies. Product samples are mounted on RFID-enabled, removable bases. Customers or associates can place the product on a “Smart Shelf” containing an RFID reader mounted below the touchscreen display, delivering dynamic content based on the product placed on the shelf. From there, shoppers can navigate through product details, material finishes, coordinating products, and more. The solution allows for a “three-way conversation” between the physical product, the digital content, and the people interacting with it all.


pages: 280 words: 74,559

Fully Automated Luxury Communism by Aaron Bastani

"Peter Beck" AND "Rocket Lab", Alan Greenspan, Anthropocene, autonomous vehicles, banking crisis, basic income, Berlin Wall, Bernie Sanders, Boston Dynamics, Bretton Woods, Brexit referendum, capital controls, capitalist realism, cashless society, central bank independence, collapse of Lehman Brothers, computer age, computer vision, CRISPR, David Ricardo: comparative advantage, decarbonisation, deep learning, dematerialisation, DIY culture, Donald Trump, double helix, driverless car, electricity market, Elon Musk, energy transition, Erik Brynjolfsson, fake news, financial independence, Francis Fukuyama: the end of history, future of work, Future Shock, G4S, general purpose technology, Geoffrey Hinton, Gregor Mendel, housing crisis, income inequality, industrial robot, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Isaac Newton, James Watt: steam engine, Jeff Bezos, Jeremy Corbyn, Jevons paradox, job automation, John Markoff, John Maynard Keynes: technological unemployment, Joseph Schumpeter, Kevin Kelly, Kuiper Belt, land reform, Leo Hollis, liberal capitalism, low earth orbit, low interest rates, low skilled workers, M-Pesa, market fundamentalism, means of production, mobile money, more computing power than Apollo, new economy, off grid, pattern recognition, Peter H. Diamandis: Planetary Resources, post scarcity, post-work, price mechanism, price stability, private spaceflight, Productivity paradox, profit motive, race to the bottom, rewilding, RFID, rising living standards, Robert Solow, scientific management, Second Machine Age, self-driving car, sensor fusion, shareholder value, Silicon Valley, Simon Kuznets, Slavoj Žižek, SoftBank, stem cell, Stewart Brand, synthetic biology, technological determinism, technoutopianism, the built environment, the scientific method, The Wealth of Nations by Adam Smith, Thomas Malthus, transatlantic slave trade, Travis Kalanick, universal basic income, V2 rocket, Watson beat the top human players on Jeopardy!, We are as Gods, Whole Earth Catalog, working-age population

‘Do you have everything you need today Ms Antonietta? How was the tracksuit you bought in February? We have something similar for winter – would you like me to send it to Alex for you to look at?’ ‘Please, that would be wonderful,’ Federica says. ‘I don’t want to be late.’ She leaves the store, and the RFID tag on the shirt automatically debits her account. In the production, warehousing, distribution and sale of the item, not one human was employed. Indeed, the store she visited could have delivered it by drone to her nephew later that day, but she preferred giving it to him herself – the old-fashioned way.


pages: 269 words: 70,543

Tech Titans of China: How China's Tech Sector Is Challenging the World by Innovating Faster, Working Harder, and Going Global by Rebecca Fannin

"World Economic Forum" Davos, Adam Neumann (WeWork), Airbnb, augmented reality, autonomous vehicles, Benchmark Capital, Big Tech, bike sharing, blockchain, call centre, cashless society, Chuck Templeton: OpenTable:, clean tech, cloud computing, computer vision, connected car, corporate governance, cryptocurrency, data is the new oil, data science, deep learning, Deng Xiaoping, Didi Chuxing, digital map, disruptive innovation, Donald Trump, El Camino Real, electricity market, Elon Musk, fake news, family office, fear of failure, fulfillment center, glass ceiling, global supply chain, Great Leap Forward, income inequality, industrial robot, information security, Internet of things, invention of movable type, Jeff Bezos, Kickstarter, knowledge worker, Lyft, Mark Zuckerberg, Mary Meeker, megacity, Menlo Park, money market fund, Network effects, new economy, peer-to-peer lending, personalized medicine, Peter Thiel, QR code, RFID, ride hailing / ride sharing, Sand Hill Road, self-driving car, sharing economy, Shenzhen was a fishing village, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart transportation, Snapchat, social graph, SoftBank, software as a service, South China Sea, sovereign wealth fund, speech recognition, stealth mode startup, Steve Jobs, stock buybacks, supply-chain management, tech billionaire, TechCrunch disrupt, TikTok, Tim Cook: Apple, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, urban planning, Vision Fund, warehouse automation, WeWork, winner-take-all economy, Y Combinator, young professional

One Chinese deal that looks like a loser is Alibaba’s $1.5 billion investment in cash-burning, bike-sharing startup Ofo, once a star at the height of China’s shared-bicycling craze. Ofo’s key rival Mobike, backed by Tencent, was absorbed into Meituan as Meituan Bike in an acquisition. Table 2-4 Alibaba Investments in US Tech Startups Company Inv. Type Inv. Amt Market Year Smartrac Inv. Und. RFID, IoT 2018 OpenSky Acq. Und. B2B e-commerce 2018 NVXL Technology Inv. $20 million machine learning 2017 EyeVerify Acq. $100 million security 2016 Snap Inv. $200 million photo app 2015 Lyft Co-inv. $250 million ride-sharing 2014 Quixey Co-inv. $110 million mobile search 2013–15 Tango.me Co-inv. $280 million messaging app 2014 Kabam Inv. $120 million gaming 2014 Alibaba Investments in China Tech Startups Cainiao Lead Co-inv. $1.4 billion smart logistics 2018 Ele.me Acq. $9.5 billion food delivery 2018 Ele.me / Koubei Merger 2018 Koubei Acq. $1 billion local commerce 2017 Xiaohongshu Lead Co-inv. $300 million social e-commerce 2018 Ofo Inv. $866 million bike sharing 2018 SenseTime Inv. $600 million facial recognition 2018 Ofo Inv. $700 million bike sharing 2017 Youku Tudou Acq. $4 billion video sharing 2016 Weibo Inv. $720 million micro-blogging 2016 AutoNavi Acq. $1.5 billion digital mapping 2014 * Note–Inv. is investment; Co-inv. is co-investment; Acq. is acquisition; Lead Inv. is lead investment; Lead Co-inv. is lead co-investment; Und. is undisclosed Sources: Silicon Dragon research, S&P Global Intelligence, annual reports, news releases In the United States, Alibaba has had a mixed record of M&A deals.


The Smartphone Society by Nicole Aschoff

"Susan Fowler" uber, 4chan, A Declaration of the Independence of Cyberspace, Airbnb, algorithmic bias, algorithmic management, Amazon Web Services, artificial general intelligence, autonomous vehicles, barriers to entry, Bay Area Rapid Transit, Bernie Sanders, Big Tech, Black Lives Matter, blockchain, carbon footprint, Carl Icahn, Cass Sunstein, citizen journalism, cloud computing, correlation does not imply causation, crony capitalism, crowdsourcing, cryptocurrency, data science, deep learning, DeepMind, degrowth, Demis Hassabis, deplatforming, deskilling, digital capitalism, digital divide, do what you love, don't be evil, Donald Trump, Downton Abbey, Edward Snowden, Elon Musk, Evgeny Morozov, fake news, feminist movement, Ferguson, Missouri, Filter Bubble, financial independence, future of work, gamification, gig economy, global value chain, Google Chrome, Google Earth, Googley, green new deal, housing crisis, income inequality, independent contractor, Jaron Lanier, Jeff Bezos, Jessica Bruder, job automation, John Perry Barlow, knowledge economy, late capitalism, low interest rates, Lyft, M-Pesa, Mark Zuckerberg, minimum wage unemployment, mobile money, moral panic, move fast and break things, Naomi Klein, Network effects, new economy, Nicholas Carr, Nomadland, occupational segregation, Occupy movement, off-the-grid, offshore financial centre, opioid epidemic / opioid crisis, PageRank, Patri Friedman, peer-to-peer, Peter Thiel, pets.com, planned obsolescence, quantitative easing, Ralph Waldo Emerson, RAND corporation, Ray Kurzweil, RFID, Richard Stallman, ride hailing / ride sharing, Rodney Brooks, Ronald Reagan, Salesforce, Second Machine Age, self-driving car, shareholder value, sharing economy, Sheryl Sandberg, Shoshana Zuboff, Sidewalk Labs, Silicon Valley, single-payer health, Skype, Snapchat, SoftBank, statistical model, Steve Bannon, Steve Jobs, surveillance capitalism, TaskRabbit, tech worker, technological determinism, TED Talk, the scientific method, The Structural Transformation of the Public Sphere, TikTok, transcontinental railway, transportation-network company, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, upwardly mobile, Vision Fund, W. E. B. Du Bois, wages for housework, warehouse robotics, WikiLeaks, women in the workforce, yottabyte

Anindya Ghose, a professor of business at New York University, breathlessly describes turning one’s smartphone into a “pocket butler”: “If you, the consumer, let marketers learn your habits and read your mind, you will let that smartphone become your concierge and save you time.”64 In this shopper’s paradise, a combination of beacons, geocoding, Wi-Fi, RFID, near-field communication, and other digital identification and communication technologies will tell companies where we are at all times, and leave us open for suggestions and offers. iBeacon and Google’s Eddystone for Android phones show that Ghose’s fantasy is fast becoming a reality. Fintech companies—businesses that use modern technology and algorithms to compete with traditional financial service providers—are equally enthusiastic about capitalizing on the data we continuously generate with our smartphones.


pages: 369 words: 80,355

Too Big to Know: Rethinking Knowledge Now That the Facts Aren't the Facts, Experts Are Everywhere, and the Smartest Person in the Room Is the Room by David Weinberger

airport security, Alfred Russel Wallace, Alvin Toffler, Amazon Mechanical Turk, An Inconvenient Truth, Berlin Wall, Black Swan, book scanning, Cass Sunstein, commoditize, Computer Lib, corporate social responsibility, crowdsourcing, Danny Hillis, David Brooks, Debian, double entry bookkeeping, double helix, Dr. Strangelove, en.wikipedia.org, Exxon Valdez, Fall of the Berlin Wall, future of journalism, Future Shock, Galaxy Zoo, Gregor Mendel, Hacker Ethic, Haight Ashbury, Herman Kahn, hive mind, Howard Rheingold, invention of the telegraph, Jeff Hawkins, jimmy wales, Johannes Kepler, John Harrison: Longitude, Kevin Kelly, Large Hadron Collider, linked data, Neil Armstrong, Netflix Prize, New Journalism, Nicholas Carr, Norbert Wiener, off-the-grid, openstreetmap, P = NP, P vs NP, PalmPilot, Pluto: dwarf planet, profit motive, Ralph Waldo Emerson, RAND corporation, Ray Kurzweil, Republic of Letters, RFID, Richard Feynman, Ronald Reagan, scientific management, semantic web, slashdot, social graph, Steven Pinker, Stewart Brand, systems thinking, technological singularity, Ted Nelson, the Cathedral and the Bazaar, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas Malthus, Whole Earth Catalog, X Prize

Where there once was a gap between the professional and the amateur scientist—a gap defined and maintained by the credentialing process—the Net is putting out tendrils to find every way across the divide. The first Maker Faire was held at the San Mateo Fairgrounds near San Francisco in 2005. Twenty thousand people showed up to see “self-balancing two-wheeled vehicles, computer-controlled Etch-A-Sketches, biodiesel processing units, biologically-inspired multiprocessors, scratch-built RFID readers, wind-powered generators, networked citizen weather stations, ornithology research systems, flying pterosaur replicas, and hundreds of other projects,” in the words of Mark Frauenfelder, the editor of Make magazine, which inspired the event.22 In 2008, three times that number attended. Frauenfelder does not attribute this growth in interest to the Web directly.


pages: 282 words: 81,873

Live Work Work Work Die: A Journey Into the Savage Heart of Silicon Valley by Corey Pein

"World Economic Forum" Davos, 23andMe, 4chan, affirmative action, Affordable Care Act / Obamacare, Airbnb, Amazon Mechanical Turk, Anne Wojcicki, artificial general intelligence, bank run, barriers to entry, Benevolent Dictator For Life (BDFL), Bernie Sanders, Big Tech, bitcoin, Bitcoin Ponzi scheme, Build a better mousetrap, California gold rush, cashless society, colonial rule, computer age, cryptocurrency, data is the new oil, deep learning, digital nomad, disruptive innovation, Donald Trump, Douglas Hofstadter, driverless car, Elon Musk, Evgeny Morozov, Extropian, fail fast, fake it until you make it, fake news, gamification, gentrification, gig economy, Google bus, Google Glasses, Google X / Alphabet X, Greyball, growth hacking, hacker house, Hacker News, hive mind, illegal immigration, immigration reform, independent contractor, intentional community, Internet of things, invisible hand, Isaac Newton, Jeff Bezos, job automation, Kevin Kelly, Khan Academy, Larry Ellison, Law of Accelerating Returns, Lean Startup, life extension, Lyft, Mahatma Gandhi, Marc Andreessen, Mark Zuckerberg, Menlo Park, minimum viable product, move fast and break things, mutually assured destruction, Neal Stephenson, obamacare, Parker Conrad, passive income, patent troll, Patri Friedman, Paul Graham, peer-to-peer lending, Peter H. Diamandis: Planetary Resources, Peter Thiel, platform as a service, plutocrats, Ponzi scheme, post-work, public intellectual, Ray Kurzweil, regulatory arbitrage, rent control, RFID, Robert Mercer, rolodex, Ronald Reagan, Ross Ulbricht, Ruby on Rails, Sam Altman, Sand Hill Road, Scientific racism, self-driving car, selling pickaxes during a gold rush, sharing economy, side project, Silicon Valley, Silicon Valley billionaire, Silicon Valley startup, Singularitarianism, Skype, Snapchat, Social Justice Warrior, social software, software as a service, source of truth, South of Market, San Francisco, Startup school, stealth mode startup, Steve Bannon, Steve Jobs, Steve Wozniak, TaskRabbit, tech billionaire, tech bro, tech worker, TechCrunch disrupt, technological singularity, technoutopianism, telepresence, too big to fail, Travis Kalanick, tulip mania, Tyler Cowen, Uber for X, uber lyft, ubercab, unit 8200, upwardly mobile, Vernor Vinge, vertical integration, Virgin Galactic, X Prize, Y Combinator, Zenefits

So I’m going to go ahead and see what it’s like to get an implant and be a cyborg today.” The audience stirred. The SU camera crew scrambled onto the stage. While the piercer prepared his kit, the transhuman ambassador, Sjöblad, took over the mic. Sjöblad said his local “maker community” has been implanting one hundred volunteers with RFID chips “just to see what happens.” They hadn’t found many uses for embedded identification chips beyond indulging their own laziness. Some replaced their door keys with electronic locks. “Or I take my phone in my hand and it’s automatically unlocked and I can start using it instead of having to type a pincode or whatever,” Sjöblad said.


pages: 303 words: 81,071

Infinite Detail by Tim Maughan

3D printing, augmented reality, bitcoin, Black Lives Matter, Buckminster Fuller, Burning Man, cognitive dissonance, driverless car, fake news, Free Software Foundation, friendly fire, gentrification, global supply chain, hydroponic farming, Internet of things, Mason jar, messenger bag, off grid, Panamax, post-Panamax, ransomware, RFID, rolling blackouts, security theater, self-driving car, Skype, smart cities, South China Sea, surveillance capitalism, the built environment, urban decay, urban planning

You can’t do that in Brooklyn?” “Nah, all the machines are fucked in Brooklyn.” “Machines?” “Yeah. The depositing machines. They all fucked. Take your cans but don’t give you the money back. They’re fucked.” Rush looks at him, looks at the cart. Blinking through menus in his periphery, he pulls up a home-brewed RFID-reading tool. Suddenly the cart is covered in hundreds of little labels, tiny floating tags, one for each can and bottle. Each has two numbers, twelve digits long, that he can’t understand but knows the city can. He guesses the first one is written on the can’s chip when it’s bought, the second when it’s tossed.


pages: 292 words: 85,151

Exponential Organizations: Why New Organizations Are Ten Times Better, Faster, and Cheaper Than Yours (And What to Do About It) by Salim Ismail, Yuri van Geest

23andMe, 3D printing, Airbnb, Amazon Mechanical Turk, Amazon Web Services, anti-fragile, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, behavioural economics, Ben Horowitz, bike sharing, bioinformatics, bitcoin, Black Swan, blockchain, Blue Ocean Strategy, book value, Burning Man, business intelligence, business process, call centre, chief data officer, Chris Wanstrath, circular economy, Clayton Christensen, clean water, cloud computing, cognitive bias, collaborative consumption, collaborative economy, commoditize, corporate social responsibility, cross-subsidies, crowdsourcing, cryptocurrency, dark matter, data science, Dean Kamen, deep learning, DeepMind, dematerialisation, discounted cash flows, disruptive innovation, distributed ledger, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, fail fast, game design, gamification, Google Glasses, Google Hangouts, Google X / Alphabet X, gravity well, hiring and firing, holacracy, Hyperloop, industrial robot, Innovator's Dilemma, intangible asset, Internet of things, Iridium satellite, Isaac Newton, Jeff Bezos, Joi Ito, Kevin Kelly, Kickstarter, knowledge worker, Kodak vs Instagram, Law of Accelerating Returns, Lean Startup, life extension, lifelogging, loose coupling, loss aversion, low earth orbit, Lyft, Marc Andreessen, Mark Zuckerberg, market design, Max Levchin, means of production, Michael Milken, minimum viable product, natural language processing, Netflix Prize, NetJets, Network effects, new economy, Oculus Rift, offshore financial centre, PageRank, pattern recognition, Paul Graham, paypal mafia, peer-to-peer, peer-to-peer model, Peter H. Diamandis: Planetary Resources, Peter Thiel, Planet Labs, prediction markets, profit motive, publish or perish, radical decentralization, Ray Kurzweil, recommendation engine, RFID, ride hailing / ride sharing, risk tolerance, Ronald Coase, Rutger Bregman, Salesforce, Second Machine Age, self-driving car, sharing economy, Silicon Valley, skunkworks, Skype, smart contracts, Snapchat, social software, software is eating the world, SpaceShipOne, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Jurvetson, subscription business, supply-chain management, synthetic biology, TaskRabbit, TED Talk, telepresence, telepresence robot, the long tail, Tony Hsieh, transaction costs, Travis Kalanick, Tyler Cowen, Tyler Cowen: Great Stagnation, uber lyft, urban planning, Virgin Galactic, WikiLeaks, winner-take-all economy, X Prize, Y Combinator, zero-sum game

Examine your own leadership skill sets. Remove anyone who puts his or her own career ahead of the success of the enterprise. 2. Partner with, Invest in or Acquire ExOs From 1990 to about 2005, there were at least five major disruptions in the retail or CPG industry. Three of them—EPOS systems with point-of-sale transactions, RFID tags for supply chain management, and customer loyalty cards—produced a significant amount of new data that fundamentally changed the industry. Marcus Shingles, a principal at Deloitte Consulting, and his research team spent most of 2012 helping the Grocery Manufacturer’s Association (GMA) analyze the CPG industry for potential Big Data innovation disruptions of the same magnitude.


pages: 288 words: 86,995

Rule of the Robots: How Artificial Intelligence Will Transform Everything by Martin Ford

AI winter, Airbnb, algorithmic bias, algorithmic trading, Alignment Problem, AlphaGo, Amazon Mechanical Turk, Amazon Web Services, artificial general intelligence, Automated Insights, autonomous vehicles, backpropagation, basic income, Big Tech, big-box store, call centre, carbon footprint, Chris Urmson, Claude Shannon: information theory, clean water, cloud computing, commoditize, computer age, computer vision, Computing Machinery and Intelligence, coronavirus, correlation does not imply causation, COVID-19, crowdsourcing, data is the new oil, data science, deep learning, deepfake, DeepMind, Demis Hassabis, deskilling, disruptive innovation, Donald Trump, Elon Musk, factory automation, fake news, fulfillment center, full employment, future of work, general purpose technology, Geoffrey Hinton, George Floyd, gig economy, Gini coefficient, global pandemic, Googley, GPT-3, high-speed rail, hype cycle, ImageNet competition, income inequality, independent contractor, industrial robot, informal economy, information retrieval, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jeff Bezos, job automation, John Markoff, Kiva Systems, knowledge worker, labor-force participation, Law of Accelerating Returns, license plate recognition, low interest rates, low-wage service sector, Lyft, machine readable, machine translation, Mark Zuckerberg, Mitch Kapor, natural language processing, Nick Bostrom, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, Ocado, OpenAI, opioid epidemic / opioid crisis, passive income, pattern recognition, Peter Thiel, Phillips curve, post scarcity, public intellectual, Ray Kurzweil, recommendation engine, remote working, RFID, ride hailing / ride sharing, Robert Gordon, Rodney Brooks, Rubik’s Cube, Sam Altman, self-driving car, Silicon Valley, Silicon Valley startup, social distancing, SoftBank, South of Market, San Francisco, special economic zone, speech recognition, stealth mode startup, Stephen Hawking, superintelligent machines, TED Talk, The Future of Employment, The Rise and Fall of American Growth, the scientific method, Turing machine, Turing test, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber and Lyft, uber lyft, universal basic income, very high income, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, WikiLeaks, women in the workforce, Y Combinator

A robot that could do this simple thing would need to be extraordinarily dexterous and would likely need to have two very expensive robotic arms—not just one. Of course, it’s easy to imagine ways to get around some of these problems. Maybe the beer needs to be placed in exactly the right location within the refrigerator. Forget six-pack rings. The cans must be removed from any packaging, and maybe each must be fitted with an RFID tag so the robot doesn’t have to rely solely on visual perception to find the beer. Perhaps, someday, beer will come in some sort of futuristic packaging that is specifically designed to make it easy for robots to retrieve it. But for now, all these requirements would add to your inconvenience and therefore diminish your enthusiasm for making a major outlay to acquire such a robot.


pages: 366 words: 94,209

Throwing Rocks at the Google Bus: How Growth Became the Enemy of Prosperity by Douglas Rushkoff

activist fund / activist shareholder / activist investor, Airbnb, Alan Greenspan, algorithmic trading, Amazon Mechanical Turk, Andrew Keen, bank run, banking crisis, barriers to entry, benefit corporation, bitcoin, blockchain, Burning Man, business process, buy and hold, buy low sell high, California gold rush, Capital in the Twenty-First Century by Thomas Piketty, carbon footprint, centralized clearinghouse, citizen journalism, clean water, cloud computing, collaborative economy, collective bargaining, colonial exploitation, Community Supported Agriculture, corporate personhood, corporate raider, creative destruction, crowdsourcing, cryptocurrency, data science, deep learning, disintermediation, diversified portfolio, Dutch auction, Elon Musk, Erik Brynjolfsson, Ethereum, ethereum blockchain, fiat currency, Firefox, Flash crash, full employment, future of work, gamification, Garrett Hardin, gentrification, gig economy, Gini coefficient, global supply chain, global village, Google bus, Howard Rheingold, IBM and the Holocaust, impulse control, income inequality, independent contractor, index fund, iterative process, Jaron Lanier, Jeff Bezos, jimmy wales, job automation, Joseph Schumpeter, Kickstarter, Large Hadron Collider, loss aversion, low interest rates, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, market fundamentalism, Marshall McLuhan, means of production, medical bankruptcy, minimum viable product, Mitch Kapor, Naomi Klein, Network effects, new economy, Norbert Wiener, Oculus Rift, passive investing, payday loans, peer-to-peer lending, Peter Thiel, post-industrial society, power law, profit motive, quantitative easing, race to the bottom, recommendation engine, reserve currency, RFID, Richard Stallman, ride hailing / ride sharing, Ronald Reagan, Russell Brand, Satoshi Nakamoto, Second Machine Age, shareholder value, sharing economy, Silicon Valley, Snapchat, social graph, software patent, Steve Jobs, stock buybacks, TaskRabbit, the Cathedral and the Bazaar, The Future of Employment, the long tail, trade route, Tragedy of the Commons, transportation-network company, Turing test, Uber and Lyft, Uber for X, uber lyft, unpaid internship, Vitalik Buterin, warehouse robotics, Wayback Machine, Y Combinator, young professional, zero-sum game, Zipcar

It’s an era that was supposed to be accompanied by more leisure time. After all, if robots are out there plowing the fields, shouldn’t the farmers get to lie back and enjoy some iced tea? Something is standing in the way of our claiming the prosperity we have created. The toll collector whose job is replaced by an RFID “E-ZPass” doesn’t reap the benefit of the new technology. When he can’t find a new job, we blame him for lacking the stamina and drive to retrain himself. But even if he could, digital solutions require, on average, less than one tenth the human employees of their mechanical-age predecessors. And what new skill should he go learn?


pages: 290 words: 87,549

The Airbnb Story: How Three Ordinary Guys Disrupted an Industry, Made Billions...and Created Plenty of Controversy by Leigh Gallagher

Abraham Maslow, Airbnb, Amazon Web Services, barriers to entry, Ben Horowitz, Bernie Sanders, Blitzscaling, cloud computing, crowdsourcing, data science, don't be evil, Donald Trump, East Village, Elon Musk, fixed-gear, gentrification, geopolitical risk, growth hacking, Hacker News, hockey-stick growth, housing crisis, iterative process, Jeff Bezos, John Zimmer (Lyft cofounder), Jony Ive, Justin.tv, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, medical residency, Menlo Park, Network effects, Paul Buchheit, Paul Graham, performance metric, Peter Thiel, RFID, Salesforce, Sam Altman, Sand Hill Road, Saturday Night Live, sharing economy, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, South of Market, San Francisco, Startup school, Steve Jobs, TaskRabbit, TED Talk, the payments system, Tony Hsieh, traumatic brain injury, Travis Kalanick, uber lyft, Y Combinator, yield management

“I started thinking, “ ‘There has to be a better way, and Airbnb is growing crazy fast, so maybe there’s something here,’” Brown says. In 2013 he and a partner started a company that essentially turns local cafés, bars, and gyms into neighborhood key-exchange hubs. Keycafe provides the establishment with a kiosk, and the host pays $12.95 per month (plus a fee of $1.95 per key pickup) for an RFID-enabled key fob. Travelers are remotely assigned a unique access code through the Keycafe app, which they then use to unlock the kiosk. The host gets notified anytime a key is picked up or dropped off, and the local establishments like the arrangement because it brings in foot traffic. While Keycafe serves customers beyond just Airbnb, including dog walkers and other service professionals, Airbnb and property managers are more than half its business, and the company is one of the stronger Airbnb “bolt-ons”: it is an official partner in Airbnb’s Host Assist platform, which integrates some of these vendors into its website, and Brown and his business partner have raised almost $3 million, more than most of the other ancillary services.


pages: 336 words: 92,056

The Battery: How Portable Power Sparked a Technological Revolution by Henry Schlesinger

Albert Einstein, animal electricity, Any sufficiently advanced technology is indistinguishable from magic, Apollo 11, Apollo 13, British Empire, Copley Medal, Cornelius Vanderbilt, cotton gin, Fairchild Semiconductor, Fellow of the Royal Society, Ford Model T, index card, invention of the telegraph, invisible hand, Isaac Newton, James Watt: steam engine, Livingstone, I presume, Menlo Park, Metcalfe’s law, pneumatic tube, popular electronics, Ralph Waldo Emerson, RFID, Robert Metcalfe, Stephen Hawking, Thales of Miletus, the scientific method, Thomas Davenport, transcontinental railway, Upton Sinclair, Vannevar Bush, vertical integration, Yogi Berra

They are made up of micron- and submicron-thin layers that create the anode, cathode, and electrolyte, and researchers have to date gotten them down to about five microns or 0.00019685 of an inch thick to produce an electrical charge. While not suitable for typical consumer products, they offer enough power to run a small IC in your credit card or label on canned peas, or even small active radio frequency identification (RFID) tags, store data, or power up some basic IC hardware. This technology is already offered by TI and a few other companies for specialty applications, such as Micro-Electro-Mechanical Systems, or MEMS, that require relatively little power. And when combined with a new generation of flexible ICs, due out soon, computing power will migrate from hard, protective coverings to a wider range of applications, such as clothing capable of powering monitors for heart rate or lighting for some form of decorative display.


pages: 315 words: 92,151

Ten Billion Tomorrows: How Science Fiction Technology Became Reality and Shapes the Future by Brian Clegg

Albert Einstein, Alvin Toffler, anthropic principle, Apollo 11, Brownian motion, call centre, Carrington event, Charles Babbage, combinatorial explosion, don't be evil, Dr. Strangelove, Ernest Rutherford, experimental subject, Future Shock, game design, gravity well, Higgs boson, hive mind, invisible hand, Isaac Newton, Johannes Kepler, John von Neumann, Kickstarter, Large Hadron Collider, machine translation, Neil Armstrong, Nick Bostrom, nuclear winter, pattern recognition, quantum entanglement, RAND corporation, Ray Kurzweil, RFID, Richard Feynman, Schrödinger's Cat, Search for Extraterrestrial Intelligence, silicon-based life, speech recognition, stem cell, Stephen Hawking, Steve Jobs, Turing test

Some of this is press overexcitement, but Warwick seems to revel in the press attention and has explicitly labeled himself, when implanted, as a cyborg. Admittedly, Warwick’s description of himself is technically correct, but most users of the term tend to imagine a much more radical electronic/mechanical component to the mix. Warwick’s first implant was little more than the type of RFID chip now used to monitor inventories from bookstores to clothing and to accept contactless payment by tapping a card on a reader. On the upper inside of his left arm, a small chip in a cylindrical container was implanted between his skin and the muscle. For nine days it enabled Warwick to be recognized by various electronic devices around the offices of the department of cybernetics where he works.


Driverless: Intelligent Cars and the Road Ahead by Hod Lipson, Melba Kurman

AI winter, Air France Flight 447, AlphaGo, Amazon Mechanical Turk, autonomous vehicles, backpropagation, barriers to entry, butterfly effect, carbon footprint, Chris Urmson, cloud computing, computer vision, connected car, creative destruction, crowdsourcing, DARPA: Urban Challenge, deep learning, digital map, Donald Shoup, driverless car, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, General Motors Futurama, Geoffrey Hinton, Google Earth, Google X / Alphabet X, Hans Moravec, high net worth, hive mind, ImageNet competition, income inequality, industrial robot, intermodal, Internet of things, Jeff Hawkins, job automation, Joseph Schumpeter, lone genius, Lyft, megacity, Network effects, New Urbanism, Oculus Rift, pattern recognition, performance metric, Philippa Foot, precision agriculture, RFID, ride hailing / ride sharing, Second Machine Age, self-driving car, Silicon Valley, smart cities, speech recognition, statistical model, Steve Jobs, technoutopianism, TED Talk, Tesla Model S, Travis Kalanick, trolley problem, Uber and Lyft, uber lyft, Unsafe at Any Speed, warehouse robotics

As recently as 2014, Volvo proposed embedding magnets in the road to help driverless cars see in the fog.15 It is tempting to suggest improvements to highway infrastructure. Even advanced programmers wistfully daydream about how much easier it would be to program a driverless car if only there were barcodes embedded into the road or radio-frequency identification (RFID) tags placed at every intersection. Investing in intelligent highway infrastructure is a poor strategy for many reasons. One is practical: there is no ready money to pay for non-essential highway infrastructure and asking for it would doom any proposed initiative to develop the technology. In the United States, the question of who will pay for highway infrastructure continues to be a political hot potato in an era of crumbling public roads and a nearly bankrupt federal highway trust fund.


pages: 374 words: 94,508

Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage by Douglas B. Laney

3D printing, Affordable Care Act / Obamacare, banking crisis, behavioural economics, blockchain, book value, business climate, business intelligence, business logic, business process, call centre, carbon credits, chief data officer, Claude Shannon: information theory, commoditize, conceptual framework, crowdsourcing, dark matter, data acquisition, data science, deep learning, digital rights, digital twin, discounted cash flows, disintermediation, diversification, en.wikipedia.org, endowment effect, Erik Brynjolfsson, full employment, hype cycle, informal economy, information security, intangible asset, Internet of things, it's over 9,000, linked data, Lyft, Nash equilibrium, Neil Armstrong, Network effects, new economy, obamacare, performance metric, profit motive, recommendation engine, RFID, Salesforce, semantic web, single source of truth, smart meter, Snapchat, software as a service, source of truth, supply-chain management, tacit knowledge, technological determinism, text mining, uber lyft, Y2K, yield curve

It typically includes transactional data, contact data, process data, and reference data such as master data. Enterprises often have the opportunity to collect even more information during the course of business via sensors or process monitoring such as: Log data, Smart meters, Internet-connected devices (e.g., IoT), Voice/phone, Security camera feeds, RFID, and Wireless signals. For example, XO Communications now analyzes 500 discrete customer data elements including call patterns, late or delinquent payments, and other vital signs. After just a four-month implementation, XO reduced customer churn by 47 percent, protecting $15 million in revenue.10 And Memorial Healthcare System integrated information from eight hundred disparate databases for greater visibility into vendor activities, resulting in a 40 percent reduction in vendor invoice cycle times that led to vendor discounts totaling over $2 million.11 Dark Data This is information collected during the course of business that remains in archives, is not generally accessible, or is not structured sufficiently for analysis.


pages: 282 words: 93,783

The Future Is Analog: How to Create a More Human World by David Sax

Alvin Toffler, augmented reality, autonomous vehicles, Bernie Sanders, big-box store, bike sharing, Black Lives Matter, blockchain, bread and circuses, Buckminster Fuller, Cal Newport, call centre, clean water, cognitive load, commoditize, contact tracing, contact tracing app, COVID-19, crowdsourcing, cryptocurrency, data science, David Brooks, deep learning, digital capitalism, Donald Trump, driverless car, Elon Musk, fiat currency, Francis Fukuyama: the end of history, future of work, gentrification, George Floyd, indoor plumbing, informal economy, Jane Jacobs, Jaron Lanier, Jeff Bezos, Kickstarter, knowledge worker, lockdown, Lyft, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Minecraft, New Urbanism, nuclear winter, opioid epidemic / opioid crisis, Peter Thiel, RAND corporation, Ray Kurzweil, remote working, retail therapy, RFID, Richard Florida, ride hailing / ride sharing, Saturday Night Live, Shoshana Zuboff, side hustle, Sidewalk Labs, Silicon Valley, Silicon Valley startup, Skype, smart cities, social distancing, sovereign wealth fund, Steve Jobs, Superbowl ad, supply-chain management, surveillance capitalism, tech worker, technological singularity, technoutopianism, TED Talk, The Death and Life of Great American Cities, TikTok, Uber and Lyft, uber lyft, unemployed young men, urban planning, walkable city, Y2K, zero-sum game

Give me a delivery person who says hello, not a robot that rolls down the sidewalk with my lunch. Give me a coffee shop that makes me feel part of something bigger, not the robo-barrista that just opened up nearby, which is a fancy-assed coffee vending machine that’s now taking up a perfectly good storefront. Don’t give me a sidewalk embedded with RFID technology. Give me a sidewalk that’s wide enough to accommodate all the human activities Jane Jacobs identified as the keys to establishing “the web of public identity and trust” at the heart of a vibrant city: kids playing, friends having a conversation, business owners griping, seniors hanging out, restaurant patrons sitting at tables, bike parking, dog walking, and so on.


pages: 370 words: 94,968

The Most Human Human: What Talking With Computers Teaches Us About What It Means to Be Alive by Brian Christian

"Friedman doctrine" OR "shareholder theory", 4chan, Ada Lovelace, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Bertrand Russell: In Praise of Idleness, Blue Ocean Strategy, carbon footprint, cellular automata, Charles Babbage, Claude Shannon: information theory, cognitive dissonance, commoditize, complexity theory, Computing Machinery and Intelligence, crowdsourcing, David Heinemeier Hansson, Donald Trump, Douglas Hofstadter, George Akerlof, Gödel, Escher, Bach, high net worth, Isaac Newton, Jacques de Vaucanson, Jaron Lanier, job automation, Kaizen: continuous improvement, Ken Thompson, l'esprit de l'escalier, language acquisition, Loebner Prize, machine translation, Menlo Park, operational security, Ray Kurzweil, RFID, Richard Feynman, Ronald Reagan, SimCity, Skype, Social Responsibility of Business Is to Increase Its Profits, starchitect, statistical model, Stephen Hawking, Steve Jobs, Steven Pinker, Thales of Miletus, theory of mind, Thomas Bayes, Turing machine, Turing test, Von Neumann architecture, Watson beat the top human players on Jeopardy!, zero-sum game

That, too, though, is hardly the kind of state-of-man repair that Aristophanes imagined. But there’s hope. Nervous System to Nervous System: Healed by Bandwidth The organizer of the 2008 Loebner Prize was University of Reading professor Kevin Warwick—also known in the press sometimes as “the world’s first cyborg.” In 1998 he had an RFID chip implanted in his arm: when he walks into his department, the doors open for him and a voice says, “Hello, Professor Warwick.” More recently, he’s undergone a second surgery, a much more invasive one: wiring a hundred-electrode array directly into the nerves of his arm. With this array he’s done a number of equally astonishing things: he’s been able to get a robot arm to mimic the actions of his real arm, using the electrode array to broadcast the neural signals coming from his brain to the robot arm, which follows those commands in real time, just as—of course—Warwick’s real arm does.9 He also experimented with adding a sixth sense—namely, sonar.


pages: 342 words: 95,013

The Zenith Angle by Bruce Sterling

airport security, Burning Man, cuban missile crisis, digital map, Dr. Strangelove, glass ceiling, Grace Hopper, half of the world's population has never made a phone call, information security, Iridium satellite, Larry Ellison, market bubble, military-industrial complex, new economy, off-the-grid, packet switching, pirate software, profit motive, RFID, Richard Feynman, Richard Feynman: Challenger O-ring, Ronald Reagan, satellite internet, Silicon Valley, space junk, Steve Jobs, systems thinking, thinkpad, Y2K

But Michael Hickok was a man of action. It wasn’t in him to waste time. He watched Van’s office routines, then he made himself useful. Van’s least favorite job was to demo security gadgets for the Vault’s many cyberwar groupies. There were packs of gizmos arriving for Van every day. Dongles and decryptors. Peel-and-stick RFID labels. Teflon and Kevlar security cables. Barcodes and asset tags. Ridiculous homemade EMP blasters right out of the aluminum-foil hat set. Teensy-tiny locks on chipsets sculpted right into the microscopic silicon with ultra-high-tech MEMS techniques . . . The CCIAB had become a clearinghouse for American infowar toys.


pages: 327 words: 103,336

Everything Is Obvious: *Once You Know the Answer by Duncan J. Watts

"World Economic Forum" Davos, active measures, affirmative action, Albert Einstein, Amazon Mechanical Turk, AOL-Time Warner, Bear Stearns, behavioural economics, Black Swan, business cycle, butterfly effect, carbon credits, Carmen Reinhart, Cass Sunstein, clockwork universe, cognitive dissonance, coherent worldview, collapse of Lehman Brothers, complexity theory, correlation does not imply causation, crowdsourcing, death of newspapers, discovery of DNA, East Village, easy for humans, difficult for computers, edge city, en.wikipedia.org, Erik Brynjolfsson, framing effect, Future Shock, Geoffrey West, Santa Fe Institute, George Santayana, happiness index / gross national happiness, Herman Kahn, high batting average, hindsight bias, illegal immigration, industrial cluster, interest rate swap, invention of the printing press, invention of the telescope, invisible hand, Isaac Newton, Jane Jacobs, Jeff Bezos, Joseph Schumpeter, Kenneth Rogoff, lake wobegon effect, Laplace demon, Long Term Capital Management, loss aversion, medical malpractice, meta-analysis, Milgram experiment, natural language processing, Netflix Prize, Network effects, oil shock, packet switching, pattern recognition, performance metric, phenotype, Pierre-Simon Laplace, planetary scale, prediction markets, pre–internet, RAND corporation, random walk, RFID, school choice, Silicon Valley, social contagion, social intelligence, statistical model, Steve Ballmer, Steve Jobs, Steve Wozniak, supply-chain management, tacit knowledge, The Death and Life of Great American Cities, the scientific method, The Wisdom of Crowds, too big to fail, Toyota Production System, Tragedy of the Commons, ultimatum game, urban planning, Vincenzo Peruggia: Mona Lisa, Watson beat the top human players on Jeopardy!, X Prize

Department stores have long experimented with product placement, trying out different locations or prices for the same product in different stores to learn which arrangements sell the most. But now that virtually all physical products are labeled with unique barcodes, and many also contain embedded RFID chips, they have the potential to track inventory and measure variation between stores, regions, times of the day, or times of the year—possibly leading to what Marshall Fisher of the University of Pennsylvania Wharton School has called the era of “Rocket Science” retailing (Fisher 2009). Ariely (2008) has also made a similar point. 23.


pages: 370 words: 97,138

Beyond: Our Future in Space by Chris Impey

3D printing, Admiral Zheng, Albert Einstein, Alfred Russel Wallace, AltaVista, Apollo 11, Apollo 13, Berlin Wall, Biosphere 2, Buckminster Fuller, built by the lowest bidder, butterfly effect, California gold rush, carbon-based life, Charles Lindbergh, Colonization of Mars, cosmic abundance, crowdsourcing, cuban missile crisis, dark matter, Dennis Tito, discovery of DNA, Doomsday Clock, Edward Snowden, Elon Musk, Eratosthenes, Great Leap Forward, Haight Ashbury, Hans Moravec, Hyperloop, I think there is a world market for maybe five computers, Isaac Newton, Jeff Bezos, Johannes Kepler, John von Neumann, Kickstarter, Kim Stanley Robinson, Late Heavy Bombardment, life extension, low earth orbit, Mahatma Gandhi, Marc Andreessen, Mars Rover, Mars Society, military-industrial complex, mutually assured destruction, Neal Stephenson, Neil Armstrong, Nick Bostrom, ocean acidification, Oculus Rift, operation paperclip, out of africa, Peter H. Diamandis: Planetary Resources, phenotype, private spaceflight, purchasing power parity, quantum entanglement, radical life extension, RAND corporation, Ray Kurzweil, RFID, Richard Feynman, Richard Feynman: Challenger O-ring, risk tolerance, Rubik’s Cube, Scaled Composites, Search for Extraterrestrial Intelligence, Searching for Interstellar Communications, seminal paper, Silicon Valley, skunkworks, Skype, Snow Crash, space junk, SpaceShipOne, Stephen Hawking, Steven Pinker, supervolcano, technological singularity, telepresence, telerobotics, the medium is the message, the scientific method, theory of mind, There's no reason for any individual to have a computer in his home - Ken Olsen, Virgin Galactic, VTOL, wikimedia commons, world market for maybe five computers, X Prize, Yogi Berra

They’re reminiscent of Mary Shelley’s dark vision of Frankenstein, animated by electricity and overpowering its creator. The acceptable face of cyborg research is represented by Kevin Warwick, a professor of cybernetics at the University of Reading in England. He was one of the first to experiment with implants, having an RFID chip put into his arm in 1998. Four years later, he had an array of a hundred electrodes grafted onto the nerves of his arm. This allows him to extend his nervous system over the Internet and control a robotic hand at a remote location. Warwick’s wife also had a cybernetic implant, and when someone grasped her hand, he was able to feel the same sensation in his hand on the other side of the Atlantic—a bizarre form of cybernetic telepathy.


Free Money for All: A Basic Income Guarantee Solution for the Twenty-First Century by Mark Walker

3D printing, 8-hour work day, additive manufacturing, Affordable Care Act / Obamacare, basic income, Baxter: Rethink Robotics, behavioural economics, Capital in the Twenty-First Century by Thomas Piketty, commoditize, confounding variable, driverless car, financial independence, full employment, guns versus butter model, happiness index / gross national happiness, industrial robot, intangible asset, invisible hand, Jeff Bezos, job automation, job satisfaction, John Markoff, Kevin Kelly, laissez-faire capitalism, late capitalism, longitudinal study, market clearing, means of production, military-industrial complex, new economy, obamacare, off grid, off-the-grid, plutocrats, precariat, printed gun, profit motive, Ray Kurzweil, rent control, RFID, Rodney Brooks, Rosa Parks, science of happiness, Silicon Valley, surplus humans, The Future of Employment, the market place, The Wealth of Nations by Adam Smith, too big to fail, transaction costs, universal basic income, warehouse robotics, working poor

When your order was placed, it was robotically packaged and sent out in a small robotically driven helicopter that dropped the package right at your doorstep. Your trip to Walmart also did not require human touch (other than yours). Gone are the days of waiting in line to have your items scanned and bagged. As soon as you put an item in your shopping cart, the embedded RFID (radio-frequency identification) tag was read and the item automatically charged to your account. Gone too are the small army of human shelf stockers. This job is now done robotically. Robots are also in use at every step in the distribution and production sequence. Robots packed and drove the food to your local Walmart.


pages: 329 words: 100,162

Hype: How Scammers, Grifters, and Con Artists Are Taking Over the Internet―and Why We're Following by Gabrielle Bluestone

Adam Neumann (WeWork), Airbnb, Bellingcat, Bernie Madoff, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Burning Man, cashless society, coronavirus, COVID-19, Donald Trump, driverless car, Elon Musk, fake it until you make it, financial thriller, forensic accounting, gig economy, global pandemic, growth hacking, high net worth, hockey-stick growth, hype cycle, Hyperloop, Kevin Roose, lock screen, lockdown, Lyft, Mark Zuckerberg, Masayoshi Son, Mason jar, Menlo Park, Multics, Naomi Klein, Netflix Prize, NetJets, Peter Thiel, placebo effect, post-truth, RFID, ride hailing / ride sharing, Russell Brand, Sand Hill Road, self-driving car, Silicon Valley, Snapchat, social distancing, SoftBank, Steve Jobs, tech billionaire, tech bro, TikTok, Tim Cook: Apple, Travis Kalanick, Uber and Lyft, uber lyft, unpaid internship, upwardly mobile, Vision Fund, WeWork

Because I had access to their bank accounts, and it was often zero,” Coffie said. It was only thanks to a last-minute investing round led by McFarland months later that the artists were even paid on their contracts—and only then after a Wall Street Journal article threatened to derail the whole thing.140 Then, with less than a month to go, Fyre suddenly switched to a cashless, RFID system that would require that concertgoers prepay to load their wristbands with funds in order to pay for things like food and water—despite the lack of Wi-Fi at the site. “The numbers they were attaching to this were the kind of numbers that make it exclusive, but in reality the reason they were doing that was because they ran out of cash.


pages: 339 words: 105,856

Machine Learning: New and Collected Stories by Hugh Howey

agricultural Revolution, CRISPR, Donner party, hive mind, Kevin Kelly, RFID, side project

“No one read the manual,” he said. “Probably didn’t even come with one. Probably had to read it online. We’d had the thing for a few years, ever since we remodeled the break room. We never used the network functions. Hell, it connected over the power grid automatically. It was one of those models with the RFID scanner so it knew what you had in there, what you were low on. It could do automatic reorders.” The beardless man raised his hand to stop Jamal. He was obviously a man of power. Who could afford to shave anymore? “You said there were no outside connections,” the man said. “There weren’t.” Jamal reached up to scratch his own beard.


pages: 378 words: 110,518

Postcapitalism: A Guide to Our Future by Paul Mason

air traffic controllers' union, Alan Greenspan, Alfred Russel Wallace, bank run, banking crisis, banks create money, Basel III, basic income, Bernie Madoff, Bill Gates: Altair 8800, bitcoin, Bletchley Park, Branko Milanovic, Bretton Woods, BRICs, British Empire, business cycle, business process, butterfly effect, call centre, capital controls, carbon tax, Cesare Marchetti: Marchetti’s constant, Claude Shannon: information theory, collaborative economy, collective bargaining, commons-based peer production, Corn Laws, corporate social responsibility, creative destruction, credit crunch, currency manipulation / currency intervention, currency peg, David Graeber, deglobalization, deindustrialization, deskilling, discovery of the americas, disinformation, Downton Abbey, drone strike, en.wikipedia.org, energy security, eurozone crisis, factory automation, false flag, financial engineering, financial repression, Firefox, Fractional reserve banking, Frederick Winslow Taylor, fulfillment center, full employment, future of work, game design, Glass-Steagall Act, green new deal, guns versus butter model, Herbert Marcuse, income inequality, inflation targeting, informal economy, information asymmetry, intangible asset, Intergovernmental Panel on Climate Change (IPCC), Internet of things, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Perry Barlow, Joseph Schumpeter, Kenneth Arrow, Kevin Kelly, Kickstarter, knowledge economy, knowledge worker, late capitalism, low interest rates, low skilled workers, market clearing, means of production, Metcalfe's law, microservices, middle-income trap, Money creation, money: store of value / unit of account / medium of exchange, mortgage debt, Network effects, new economy, Nixon triggered the end of the Bretton Woods system, Norbert Wiener, Occupy movement, oil shale / tar sands, oil shock, Paul Samuelson, payday loans, Pearl River Delta, post-industrial society, power law, precariat, precautionary principle, price mechanism, profit motive, quantitative easing, race to the bottom, RAND corporation, rent-seeking, reserve currency, RFID, Richard Stallman, Robert Gordon, Robert Metcalfe, scientific management, secular stagnation, sharing economy, Stewart Brand, structural adjustment programs, supply-chain management, technological determinism, The Future of Employment, the scientific method, The Wealth of Nations by Adam Smith, Transnistria, Twitter Arab Spring, union organizing, universal basic income, urban decay, urban planning, vertical integration, Vilfredo Pareto, wages for housework, WikiLeaks, women in the workforce, Yochai Benkler

Large parts of the capitalist world are effectively planned already – from urban design and construction projects through to the integrated supply chains of a large supermarket. It is the advance in processing power, the use of big data and the digital tracking of individual objects and components – using barcodes or RFID tags – that make this possible. That part of our project which requires planning would be well equipped because of this. But the nature of modern society alters the problem. In a complex, globalized society, where the worker is also the consumer of financial services and micro-services from other workers, the plan cannot outdo the market unless there is a retreat from complexity and a return to hierarchy.


pages: 363 words: 104,113

Clan Corporate by Stross, Charles

Dr. Strangelove, glass ceiling, imposter syndrome, indoor plumbing, liquidity trap, RFID

“Matt went for a walk about two hours ago,” said Pete, nervously fingering his document folder. “Went for a-” “Down the express elevator from the twenty-third floor, or so it would appear judging from the elevator logs,” Smith added. “Although there’s no evidence he was actually in the elevator car except for the RFID tags concealed in his underwear. Which he is no longer wearing. And there’s a missing window on the twenty-third floor. Shall we talk about it?” They went up to the newly installed Vault Type Room on the nineteenth floor and Smith signed them in. Then they authenticated each other and locked the door.


pages: 416 words: 112,268

Human Compatible: Artificial Intelligence and the Problem of Control by Stuart Russell

3D printing, Ada Lovelace, AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Alfred Russel Wallace, algorithmic bias, AlphaGo, Andrew Wiles, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, basic income, behavioural economics, Bletchley Park, blockchain, Boston Dynamics, brain emulation, Cass Sunstein, Charles Babbage, Claude Shannon: information theory, complexity theory, computer vision, Computing Machinery and Intelligence, connected car, CRISPR, crowdsourcing, Daniel Kahneman / Amos Tversky, data science, deep learning, deepfake, DeepMind, delayed gratification, Demis Hassabis, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Ernest Rutherford, fake news, Flash crash, full employment, future of work, Garrett Hardin, Geoffrey Hinton, Gerolamo Cardano, Goodhart's law, Hans Moravec, ImageNet competition, Intergovernmental Panel on Climate Change (IPCC), Internet of things, invention of the wheel, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Nash: game theory, John von Neumann, Kenneth Arrow, Kevin Kelly, Law of Accelerating Returns, luminiferous ether, machine readable, machine translation, Mark Zuckerberg, multi-armed bandit, Nash equilibrium, Nick Bostrom, Norbert Wiener, NP-complete, OpenAI, openstreetmap, P = NP, paperclip maximiser, Pareto efficiency, Paul Samuelson, Pierre-Simon Laplace, positional goods, probability theory / Blaise Pascal / Pierre de Fermat, profit maximization, RAND corporation, random walk, Ray Kurzweil, Recombinant DNA, recommendation engine, RFID, Richard Thaler, ride hailing / ride sharing, Robert Shiller, robotic process automation, Rodney Brooks, Second Machine Age, self-driving car, Shoshana Zuboff, Silicon Valley, smart cities, smart contracts, social intelligence, speech recognition, Stephen Hawking, Steven Pinker, superintelligent machines, surveillance capitalism, Thales of Miletus, The Future of Employment, The Theory of the Leisure Class by Thorstein Veblen, Thomas Bayes, Thorstein Veblen, Tragedy of the Commons, transport as a service, trolley problem, Turing machine, Turing test, universal basic income, uranium enrichment, vertical integration, Von Neumann architecture, Wall-E, warehouse robotics, Watson beat the top human players on Jeopardy!, web application, zero-sum game

Other leading economists have also sounded the alarm, including Nobel laureates Robert Shiller, Mike Spence, and Paul Krugman; Klaus Schwab, head of the World Economic Forum; and Larry Summers, former chief economist of the World Bank and Treasury secretary under President Bill Clinton. Those arguing against the notion of technological unemployment often point to bank tellers, whose work can be done in part by ATMs, and retail cashiers, whose work is sped up by barcodes and RFID tags on merchandise. It is often claimed that these occupations are growing because of technology. Indeed, the number of tellers in the United States roughly doubled from 1970 to 2010, although it should be noted that the US population grew by 50 percent and the financial sector by over 400 percent in the same period,22 so it is difficult to attribute all, or perhaps any, of the employment growth to ATMs.


pages: 380 words: 118,675

The Everything Store: Jeff Bezos and the Age of Amazon by Brad Stone

airport security, Amazon Mechanical Turk, Amazon Web Services, AOL-Time Warner, Apollo 11, bank run, Bear Stearns, Bernie Madoff, big-box store, Black Swan, book scanning, Brewster Kahle, buy and hold, call centre, centre right, Chuck Templeton: OpenTable:, Clayton Christensen, cloud computing, collapse of Lehman Brothers, crowdsourcing, cuban missile crisis, Danny Hillis, deal flow, Douglas Hofstadter, drop ship, Elon Musk, facts on the ground, fulfillment center, game design, housing crisis, invention of movable type, inventory management, James Dyson, Jeff Bezos, John Markoff, junk bonds, Kevin Kelly, Kiva Systems, Kodak vs Instagram, Larry Ellison, late fees, loose coupling, low skilled workers, Maui Hawaii, Menlo Park, Neal Stephenson, Network effects, new economy, off-the-grid, optical character recognition, PalmPilot, pets.com, Ponzi scheme, proprietary trading, quantitative hedge fund, reality distortion field, recommendation engine, Renaissance Technologies, RFID, Rodney Brooks, search inside the book, shareholder value, Silicon Valley, Silicon Valley startup, six sigma, skunkworks, Skype, SoftBank, statistical arbitrage, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, the long tail, Thomas L Friedman, Tony Hsieh, two-pizza team, Virgin Galactic, Whole Earth Catalog, why are manhole covers round?, zero-sum game

Walmart in particular had mastered this perpetual coercion of suppliers, and it did it with missionary zeal and the belief that it led to the low prices that made products like diapers affordable to lower- and middle-class Americans. Walmart is notorious for demanding that suppliers open offices in Bentonville, Arkansas, and integrate certain technologies, like RFID chips, into their products. The company is also known for specifying just how much it will pay for products and for demanding severe concessions if it believes a supplier’s profit margin is too high. In Amazon’s early years, when the likes of Sony and Disney refused to sell directly to the company, Bezos had been on the short end of this Darwinian dynamic.


pages: 501 words: 114,888

The Future Is Faster Than You Think: How Converging Technologies Are Transforming Business, Industries, and Our Lives by Peter H. Diamandis, Steven Kotler

Ada Lovelace, additive manufacturing, Airbnb, Albert Einstein, AlphaGo, Amazon Mechanical Turk, Amazon Robotics, augmented reality, autonomous vehicles, barriers to entry, Big Tech, biodiversity loss, bitcoin, blockchain, blood diamond, Boston Dynamics, Burning Man, call centre, cashless society, Charles Babbage, Charles Lindbergh, Clayton Christensen, clean water, cloud computing, Colonization of Mars, computer vision, creative destruction, CRISPR, crowdsourcing, cryptocurrency, data science, Dean Kamen, deep learning, deepfake, DeepMind, delayed gratification, dematerialisation, digital twin, disruptive innovation, Donald Shoup, driverless car, Easter island, Edward Glaeser, Edward Lloyd's coffeehouse, Elon Musk, en.wikipedia.org, epigenetics, Erik Brynjolfsson, Ethereum, ethereum blockchain, experimental economics, fake news, food miles, Ford Model T, fulfillment center, game design, Geoffrey West, Santa Fe Institute, gig economy, gigafactory, Google X / Alphabet X, gravity well, hive mind, housing crisis, Hyperloop, impact investing, indoor plumbing, industrial robot, informal economy, initial coin offering, intentional community, Intergovernmental Panel on Climate Change (IPCC), Internet of things, invention of the telegraph, Isaac Newton, Jaron Lanier, Jeff Bezos, job automation, Joseph Schumpeter, Kevin Kelly, Kickstarter, Kiva Systems, late fees, Law of Accelerating Returns, life extension, lifelogging, loss aversion, Lyft, M-Pesa, Mary Lou Jepsen, Masayoshi Son, mass immigration, megacity, meta-analysis, microbiome, microdosing, mobile money, multiplanetary species, Narrative Science, natural language processing, Neal Stephenson, Neil Armstrong, Network effects, new economy, New Urbanism, Nick Bostrom, Oculus Rift, One Laptop per Child (OLPC), out of africa, packet switching, peer-to-peer lending, Peter H. Diamandis: Planetary Resources, Peter Thiel, planned obsolescence, QR code, RAND corporation, Ray Kurzweil, RFID, Richard Feynman, Richard Florida, ride hailing / ride sharing, risk tolerance, robo advisor, Satoshi Nakamoto, Second Machine Age, self-driving car, Sidewalk Labs, Silicon Valley, Skype, smart cities, smart contracts, smart grid, Snapchat, SoftBank, sovereign wealth fund, special economic zone, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Steve Jurvetson, Steven Pinker, Stewart Brand, supercomputer in your pocket, supply-chain management, tech billionaire, technoutopianism, TED Talk, Tesla Model S, Tim Cook: Apple, transaction costs, Uber and Lyft, uber lyft, unbanked and underbanked, underbanked, urban planning, Vision Fund, VTOL, warehouse robotics, Watson beat the top human players on Jeopardy!, We wanted flying cars, instead we got 140 characters, X Prize

Which is why Amazon is not the only company chasing this cashier-less future; the San Francisco startup v7labs is helping all retail stores make this same transition, while Alibaba’s cashier-less Hema stores were tested in China a full two years ahead of Amazon. Smart shelf technology is already here, employing RFID (radio frequency identification) tags and weight sensors to detect when an item has been removed. The innovation deters theft, automates restocking, and ensures that inventory is always in the right spot. Today, Intel’s version has a screen built into the shelf. Tomorrow, smart shelves will be AI-enhanced and capable of conversation.


pages: 426 words: 117,775

The Charisma Machine: The Life, Death, and Legacy of One Laptop Per Child by Morgan G. Ames

"World Economic Forum" Davos, 1960s counterculture, 4chan, A Declaration of the Independence of Cyberspace, Benjamin Mako Hill, British Empire, Burning Man, Cass Sunstein, clean water, commoditize, computer age, digital divide, digital rights, Evgeny Morozov, fail fast, Firefox, Free Software Foundation, Gabriella Coleman, game design, Hacker Conference 1984, Hacker Ethic, hype cycle, informal economy, Internet of things, John Markoff, Joi Ito, Khan Academy, Marshall McLuhan, Mary Lou Jepsen, Minecraft, new economy, One Laptop per Child (OLPC), Peter Thiel, placebo effect, Potemkin village, RFID, Richard Stallman, ride hailing / ride sharing, side project, Silicon Valley, Silicon Valley ideology, SimCity, smart cities, Steve Jobs, Steven Levy, Stewart Brand, technological determinism, technological solutionism, technoutopianism, TED Talk, The Hackers Conference, Travis Kalanick

Pendleton-Jullian and John Seely Brown, Design Unbound: Designing for Emergence in a White Water World, Volume 1: Designing for Emergence Ann M. Pendleton-Jullian and John Seely Brown, Design Unbound: Designing for Emergence in a White Water World, Volume 2: Ecologies of Change Jordan Frith, A Billion Little Pieces: RFID and Infrastructures of Identification Morgan G. Ames, The Charisma Machine: The Life, Death, and Legacy of One Laptop per Child Mario Biagioli and Alexandra Lippman, eds., Gaming the Metrics: Misconduct and Manipulation in Academic Research Malcolm McCullough, Downtime on the Microgrid: Architecture, Electricity, and Smart City Islands Emmanuel Didier, translated by Priya Vari Sen, America by the Numbers: Quantification, Democracy, and the Birth of National Statistics Ryan Ellis, Letters, Power Lines, and Other Dangerous Things: The Politics of Infrastructure Security The Charisma Machine The Life, Death, and Legacy of One Laptop per Child Morgan G.


pages: 481 words: 125,946

What to Think About Machines That Think: Today's Leading Thinkers on the Age of Machine Intelligence by John Brockman

Adam Curtis, agricultural Revolution, AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic trading, Anthropocene, artificial general intelligence, augmented reality, autism spectrum disorder, autonomous vehicles, backpropagation, basic income, behavioural economics, bitcoin, blockchain, bread and circuses, Charles Babbage, clean water, cognitive dissonance, Colonization of Mars, complexity theory, computer age, computer vision, constrained optimization, corporate personhood, cosmological principle, cryptocurrency, cuban missile crisis, Danny Hillis, dark matter, data science, deep learning, DeepMind, Demis Hassabis, digital capitalism, digital divide, digital rights, discrete time, Douglas Engelbart, driverless car, Elon Musk, Emanuel Derman, endowment effect, epigenetics, Ernest Rutherford, experimental economics, financial engineering, Flash crash, friendly AI, functional fixedness, global pandemic, Google Glasses, Great Leap Forward, Hans Moravec, hive mind, Ian Bogost, income inequality, information trail, Internet of things, invention of writing, iterative process, James Webb Space Telescope, Jaron Lanier, job automation, Johannes Kepler, John Markoff, John von Neumann, Kevin Kelly, knowledge worker, Large Hadron Collider, lolcat, loose coupling, machine translation, microbiome, mirror neurons, Moneyball by Michael Lewis explains big data, Mustafa Suleyman, natural language processing, Network effects, Nick Bostrom, Norbert Wiener, paperclip maximiser, pattern recognition, Peter Singer: altruism, phenotype, planetary scale, Ray Kurzweil, Recombinant DNA, recommendation engine, Republic of Letters, RFID, Richard Thaler, Rory Sutherland, Satyajit Das, Search for Extraterrestrial Intelligence, self-driving car, sharing economy, Silicon Valley, Skype, smart contracts, social intelligence, speech recognition, statistical model, stem cell, Stephen Hawking, Steve Jobs, Steven Pinker, Stewart Brand, strong AI, Stuxnet, superintelligent machines, supervolcano, synthetic biology, systems thinking, tacit knowledge, TED Talk, the scientific method, The Wisdom of Crowds, theory of mind, Thorstein Veblen, too big to fail, Turing machine, Turing test, Von Neumann architecture, Watson beat the top human players on Jeopardy!, We are as Gods, Y2K

Machines can see statistical regularities my feeble brain will miss, but they can’t make the insightful leap that connects disparate sets of data to devise a new field. I’m not terribly concerned about machines that compute. I’ll deal with the frustration of my browser in exchange for a smart refrigerator that, based on tracking RFID codes of what comes in and out, texts me to buy cream on my way home (hint to those working on such a system . . . sooner rather than later!). I like having my computer underline words it doesn’t recognize, and I’ll deal with the frustration of having to ignore its comments on “phylogenetic” in exchange for catching my typo on a common term (in fact, it won’t let me misspell a word here to make a point).


pages: 494 words: 116,739

Geek Heresy: Rescuing Social Change From the Cult of Technology by Kentaro Toyama

Abraham Maslow, Albert Einstein, Apollo 11, behavioural economics, Berlin Wall, Bernie Madoff, blood diamond, Capital in the Twenty-First Century by Thomas Piketty, Cass Sunstein, cognitive dissonance, commoditize, computer vision, conceptual framework, delayed gratification, digital divide, do well by doing good, Edward Glaeser, Edward Jenner, en.wikipedia.org, end world poverty, epigenetics, Erik Brynjolfsson, Evgeny Morozov, Francis Fukuyama: the end of history, fundamental attribution error, gamification, germ theory of disease, global village, Hans Rosling, happiness index / gross national happiness, income inequality, invention of the printing press, invisible hand, Isaac Newton, Khan Academy, Kibera, knowledge worker, Larry Ellison, Lewis Mumford, liberation theology, libertarian paternalism, longitudinal study, M-Pesa, Mahatma Gandhi, Mark Zuckerberg, means of production, microcredit, mobile money, Neil Armstrong, Nelson Mandela, Nicholas Carr, North Sea oil, One Laptop per Child (OLPC), Panopticon Jeremy Bentham, pattern recognition, Peter Singer: altruism, Peter Thiel, post-industrial society, Powell Memorandum, randomized controlled trial, rent-seeking, RFID, Richard Florida, Richard Thaler, school vouchers, self-driving car, Sheryl Sandberg, Silicon Valley, Simon Kuznets, Stanford marshmallow experiment, Steve Jobs, Steven Pinker, technological determinism, technological solutionism, technoutopianism, TED Talk, The Fortune at the Bottom of the Pyramid, the long tail, Twitter Arab Spring, Upton Sinclair, Walter Mischel, War on Poverty, winner-take-all economy, World Values Survey, Y2K

Walmart, for example, is famous for its digital stock-keeping. Its databases know exactly what’s on the shelves, and they automatically inform suppliers which stores are low on stock. The system keeps inventories razor-thin and costs low. And it all seems to be about technology – databases, barcode readers, RFID-encoded pallets, and so on. You might think, then, that some of our greatest cost-control challenges could be solved with IT. A conspicuous target in America is our health-care system. In fact, electronic medical records have firm bipartisan support even in an era of political deadlock. President Barack Obama has called for electronic medical records since before his days in the White House, citing efficiency and cost savings.8 And the GOP Doctors Caucus, formed by Representatives Phil Gingrey and Tim Murphy, states, “Health information technology has the potential to save more than $81 billion annually in health care costs.


pages: 755 words: 121,290

Statistics hacks by Bruce Frey

Bayesian statistics, Berlin Wall, correlation coefficient, Daniel Kahneman / Amos Tversky, distributed generation, en.wikipedia.org, feminist movement, G4S, game design, Hacker Ethic, index card, Linda problem, Milgram experiment, Monty Hall problem, p-value, place-making, reshoring, RFID, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, statistical model, sugar pill, systematic bias, Thomas Bayes

Contributors The following people contributed their hacks, writing, and inspiration to this book: Joseph Adler is the author of Baseball Hacks (O'Reilly), and a researcher in the Advanced Product Development Group at VeriSign, focusing on problems in user authentication, managed security services, and RFID security. Joe has years of experience analyzing data, building statistical models, and formulating business strategies as an employee and consultant for companies including DoubleClick, American Express, and Dun & Bradstreet. He is a graduate of the Massachusetts Institute of Technology with an Sc.B. and an M.Eng. in computer science and computer engineering.


pages: 550 words: 124,073

Democracy and Prosperity: Reinventing Capitalism Through a Turbulent Century by Torben Iversen, David Soskice

Andrei Shleifer, assortative mating, augmented reality, barriers to entry, Big Tech, Bretton Woods, business cycle, capital controls, Capital in the Twenty-First Century by Thomas Piketty, central bank independence, centre right, clean tech, cloud computing, collateralized debt obligation, collective bargaining, colonial rule, confounding variable, corporate governance, Credit Default Swap, credit default swaps / collateralized debt obligations, deindustrialization, deskilling, Donald Trump, first-past-the-post, full employment, general purpose technology, gentrification, Gini coefficient, hiring and firing, implied volatility, income inequality, industrial cluster, inflation targeting, invisible hand, knowledge economy, labor-force participation, liberal capitalism, low skilled workers, low-wage service sector, means of production, middle-income trap, mirror neurons, mittelstand, Network effects, New Economic Geography, new economy, New Urbanism, non-tariff barriers, Occupy movement, offshore financial centre, open borders, open economy, passive investing, precariat, race to the bottom, radical decentralization, rent-seeking, RFID, road to serfdom, Robert Bork, Robert Gordon, Silicon Valley, smart cities, speech recognition, tacit knowledge, The Future of Employment, The Great Moderation, The Rise and Fall of American Growth, the strength of weak ties, too big to fail, trade liberalization, union organizing, urban decay, vertical integration, Washington Consensus, winner-take-all economy, working-age population, World Values Survey, young professional, zero-sum game

Cambridge, MA: Harvard University Press. Gamoran, Adam. 2010. “Tracking and Inequality: New Directions for Research and Practice.” In The Routledge International Handbook of the Sociology of Education, eds. Michael W. Apple, Stephen J. Ball, and Luis A. Gandin, 213–28. New York: Routledge. Garfinkel, Simson, and Beth Rosenberg. 2006. RFID: Applications, Security, and Privacy. Boston: Addison-Wesley. Garrett, Geoffrey. 1998. “Global Markets and National Politics: Collision Course or Virtuous Circle?” International Organization 52 (4): 787–824. Gawthrop, Richard, and Gerald Strauss. 1984. “Protestantism and Literacy in Early Modern Germany.”


User Friendly by Cliff Kuang, Robert Fabricant

A Pattern Language, Abraham Maslow, Airbnb, anti-communist, Any sufficiently advanced technology is indistinguishable from magic, Apple II, augmented reality, autonomous vehicles, behavioural economics, Bill Atkinson, Brexit referendum, Buckminster Fuller, Burning Man, business logic, call centre, Cambridge Analytica, Chuck Templeton: OpenTable:, cognitive load, computer age, Daniel Kahneman / Amos Tversky, dark pattern, data science, Donald Trump, Douglas Engelbart, Douglas Engelbart, driverless car, Elaine Herzberg, en.wikipedia.org, fake it until you make it, fake news, Ford Model T, Frederick Winslow Taylor, frictionless, Google Glasses, Internet of things, invisible hand, James Dyson, John Markoff, Jony Ive, knowledge economy, Kodak vs Instagram, Lyft, M-Pesa, Mark Zuckerberg, mobile money, Mother of all demos, move fast and break things, Norbert Wiener, Paradox of Choice, planned obsolescence, QWERTY keyboard, randomized controlled trial, replication crisis, RFID, scientific management, self-driving car, seminal paper, Silicon Valley, skeuomorphism, Skinner box, Skype, smart cities, Snapchat, speech recognition, Steve Jobs, Steve Wozniak, tacit knowledge, Tesla Model S, three-martini lunch, Tony Fadell, Uber and Lyft, Uber for X, uber lyft, Vannevar Bush, women in the workforce

That they’d be the ones with a new plan for the park amounted to blasphemy in the eyes of the Imagineers—and that was even before they started letting their imaginations loose on what their system might become. The MagicBands themselves are simple, cleanly designed rubber wristbands offered in cheery shades of blue, green, and red. Inside each is an RFID chip and a radio like those in a 2.4 GHz cordless phone. You reserve them when you book your ticket online; at that time, you can pick what rides you’d like to go on. Then, in the weeks before your trip, the wristband arrives in the mail, etched with your name. I’m yours, try me on. For kids, the MagicBand is supposed to be like a Christmas present tucked under the tree, perfumed by anticipation.


pages: 505 words: 142,118

A Man for All Markets by Edward O. Thorp

"RICO laws" OR "Racketeer Influenced and Corrupt Organizations", 3Com Palm IPO, Alan Greenspan, Albert Einstein, asset allocation, Bear Stearns, beat the dealer, Bernie Madoff, Black Monday: stock market crash in 1987, Black Swan, Black-Scholes formula, book value, Brownian motion, buy and hold, buy low sell high, caloric restriction, caloric restriction, carried interest, Chuck Templeton: OpenTable:, Claude Shannon: information theory, cognitive dissonance, collateralized debt obligation, Credit Default Swap, credit default swaps / collateralized debt obligations, diversification, Edward Thorp, Erdős number, Eugene Fama: efficient market hypothesis, financial engineering, financial innovation, Garrett Hardin, George Santayana, German hyperinflation, Glass-Steagall Act, Henri Poincaré, high net worth, High speed trading, index arbitrage, index fund, interest rate swap, invisible hand, Jarndyce and Jarndyce, Jeff Bezos, John Bogle, John Meriwether, John Nash: game theory, junk bonds, Kenneth Arrow, Livingstone, I presume, Long Term Capital Management, Louis Bachelier, low interest rates, margin call, Mason jar, merger arbitrage, Michael Milken, Murray Gell-Mann, Myron Scholes, NetJets, Norbert Wiener, PalmPilot, passive investing, Paul Erdős, Paul Samuelson, Pluto: dwarf planet, Ponzi scheme, power law, price anchoring, publish or perish, quantitative trading / quantitative finance, race to the bottom, random walk, Renaissance Technologies, RFID, Richard Feynman, risk-adjusted returns, Robert Shiller, rolodex, Sharpe ratio, short selling, Silicon Valley, Stanford marshmallow experiment, statistical arbitrage, stem cell, stock buybacks, stocks for the long run, survivorship bias, tail risk, The Myth of the Rational Market, The Predators' Ball, the rule of 72, The Wisdom of Crowds, too big to fail, Tragedy of the Commons, uptick rule, Upton Sinclair, value at risk, Vanguard fund, Vilfredo Pareto, Works Progress Administration

The winner, among scores of contestants from the casino industry, had the fastest time I ever saw, 8.8 seconds. The casinos introduced technology to stop the counters. Cameras and observers followed the action through one-way mirrors above the tables. Currently, this is automated, incorporating face-recognition software. RFID chips keep track of a player’s bets, and machines can track the cards and check the play of the hands, searching for patterns characteristic of counters. Machines that continually reshuffle the cards proved to be a perfect defense without slowing the game down, but the casinos pay fees to the vendors of the machines.


City: A Guidebook for the Urban Age by P. D. Smith

active transport: walking or cycling, Albert Einstein, Andrew Keen, Anthropocene, augmented reality, banking crisis, Berlin Wall, British Empire, Broken windows theory, Buckminster Fuller, Burning Man, business cycle, car-free, carbon footprint, classic study, clean water, colonial rule, congestion charging, congestion pricing, cosmological principle, crack epidemic, double entry bookkeeping, Dr. Strangelove, edge city, Edward Lloyd's coffeehouse, en.wikipedia.org, Enrique Peñalosa, Fall of the Berlin Wall, Ford Model T, Frank Gehry, garden city movement, General Motors Futurama, gentrification, global village, haute cuisine, income inequality, Intergovernmental Panel on Climate Change (IPCC), invention of gunpowder, Jane Jacobs, John Snow's cholera map, Kevin Kelly, Kibera, Kickstarter, Kowloon Walled City, Lewis Mumford, Masdar, megacity, megastructure, multicultural london english, mutually assured destruction, New Urbanism, Norman Mailer, peak oil, pneumatic tube, RFID, smart cities, starchitect, telepresence, the built environment, The Death and Life of Great American Cities, The future is already here, the High Line, Thomas Malthus, trade route, urban planning, urban renewal, urban sprawl, Victor Gruen, walkable city, white flight, white picket fence, young professional

But by 2012, Seoul intends to upgrade its network to reach lightning speeds of up to one gigabit per second. The whole city has also been transformed into a wifi hotspot, thanks to an innovative wireless network which allows commuters on the subway to watch TV on their mobile phones. Those same commuters pay for their bus and taxi journeys with a radio frequency identification (RFID) card containing a smart chip which is able to calculate the distance travelled and the fare due. Seoul is also upgrading itself into an ‘open data city’ in the belief that an informed city is a more efficient city. Thanks to the ‘Ubiquitous Seoul,’ or ‘U-city’, project, Seoul’s online citizens will be able to access real-time urban data from sensors around the city, such as air-quality information and traffic updates.


pages: 462 words: 142,240

Iron Sunrise by Stross, Charles

blood diamond, disinformation, dumpster diving, Future Shock, gravity well, hiring and firing, industrial robot, life extension, loose coupling, mass immigration, military-industrial complex, mutually assured destruction, phenotype, planetary scale, postindustrial economy, quantum entanglement, RFID, side project, speech recognition, technological singularity, trade route, urban sprawl, zero-sum game

He’s indoors, well away from windows, vents, doors. Our floor penetrator says he’s in the entertainment room with something dense enough to be a gadget. The stack is dusted, but we’re having fun replaying the ubiquitous surveillance takes for the past month — seems he started jamming before anything else, and his RFID tag trace is much too clean. Someone has to go inside and talk him down or take him out, and you’ve got more experience of this than any of us. It says here you’ve done more than twenty of these jobs; that makes you our nearest expert.” “Hell and deviltry. Who’s the underwriter for this block?” “It’s all outsourced by the city government — I think Lloyds has something to do with it.


pages: 422 words: 131,666

Life Inc.: How the World Became a Corporation and How to Take It Back by Douglas Rushkoff

Abraham Maslow, Adam Curtis, addicted to oil, affirmative action, Alan Greenspan, Amazon Mechanical Turk, An Inconvenient Truth, anti-globalists, AOL-Time Warner, banks create money, Bear Stearns, benefit corporation, big-box store, Bretton Woods, car-free, Charles Lindbergh, colonial exploitation, Community Supported Agriculture, complexity theory, computer age, congestion pricing, corporate governance, credit crunch, currency manipulation / currency intervention, David Ricardo: comparative advantage, death of newspapers, digital divide, don't be evil, Donald Trump, double entry bookkeeping, easy for humans, difficult for computers, financial innovation, Firefox, full employment, General Motors Futurama, gentrification, Glass-Steagall Act, global village, Google Earth, greed is good, Herbert Marcuse, Howard Rheingold, income per capita, invention of the printing press, invisible hand, Jane Jacobs, John Nash: game theory, joint-stock company, Kevin Kelly, Kickstarter, laissez-faire capitalism, loss aversion, market bubble, market design, Marshall McLuhan, Milgram experiment, military-industrial complex, moral hazard, multilevel marketing, mutually assured destruction, Naomi Klein, negative equity, new economy, New Urbanism, Norbert Wiener, peak oil, peer-to-peer, place-making, placebo effect, planned obsolescence, Ponzi scheme, price mechanism, price stability, principal–agent problem, private military company, profit maximization, profit motive, prosperity theology / prosperity gospel / gospel of success, public intellectual, race to the bottom, RAND corporation, rent-seeking, RFID, road to serfdom, Ronald Reagan, scientific management, short selling, Silicon Valley, Simon Kuznets, social software, Steve Jobs, Telecommunications Act of 1996, telemarketer, The Wealth of Nations by Adam Smith, Thomas L Friedman, too big to fail, trade route, trickle-down economics, union organizing, urban decay, urban planning, urban renewal, Vannevar Bush, vertical integration, Victor Gruen, white flight, working poor, Works Progress Administration, Y2K, young professional, zero-sum game

Out on the Web, people have no more substance or stature than any virtual entity—and in most cases, less. We become more virtual while our corporate entities become more real. The people may as well be the machines. Once high-tech security-minded employers in California and Cincinnati get their way in the courts, they’ll be materializing this vision by implanting workers with the same kinds of RFID tags Wal-Mart puts in its products. A central-office computer monitors exactly who is where and when, opening doors for those who have clearance. While implantation isn’t yet mandatory for existing laborers, the additional and convenient access to sensitive materials it affords makes voluntary implantation a plus for worker recognition and advancement.


Jennifer Morgue by Stross, Charles

Boeing 747, call centre, Carl Icahn, correlation does not imply causation, disinformation, disintermediation, dumpster diving, Dutch auction, Etonian, haute couture, interchangeable parts, Maui Hawaii, messenger bag, MITM: man-in-the-middle, mutually assured destruction, operational security, PalmPilot, planetary scale, RFID, Seymour Hersh, Silicon Valley, Skype, slashdot, stem cell, telepresence, traveling salesman, Turing machine

She's still underwater, but she's not sitting in the control chair on board the submersible grab anymore: she's free-swimming in near-total darkness, stroking upwards alongside the drill string, and I can feel the exhaustion as a tight band across the tops of her thighs. ''It's a doublecross.'' I can taste her fear. ''Talk to me!'' I force myself to bend over and go through the corpse's pockets. There's another magazine for the pistol, and a badge: some species of RFID tag. I take it and glance around the cabin. My right hand is still bleeding but it doesn't look as bad as it feels. (Memo to self: do not make a habit of gripping the slide of an automatic pistol while it is being fired.) ''How long have I got? Where are you?'' ''The grab — I was halfway home when one of the docking splines engaged, and the control deck disconnected and stayed stuck on the pipe string while the payload kept going up.


pages: 491 words: 141,690

The Controlled Demolition of the American Empire by Jeff Berwick, Charlie Robinson

2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, airport security, Alan Greenspan, American Legislative Exchange Council, American Society of Civil Engineers: Report Card, bank run, barriers to entry, Berlin Wall, Bernie Sanders, Big Tech, big-box store, bitcoin, Black Lives Matter, bread and circuses, Bretton Woods, British Empire, call centre, carbon credits, carbon footprint, carbon tax, Cass Sunstein, Chelsea Manning, clean water, cloud computing, cognitive dissonance, Comet Ping Pong, coronavirus, Corrections Corporation of America, COVID-19, crack epidemic, crisis actor, crony capitalism, cryptocurrency, dark matter, deplatforming, disinformation, Donald Trump, drone strike, Edward Snowden, Elon Musk, energy transition, epigenetics, failed state, fake news, false flag, Ferguson, Missouri, fiat currency, financial independence, George Floyd, global pandemic, global supply chain, Goldman Sachs: Vampire Squid, illegal immigration, Indoor air pollution, information security, interest rate swap, Intergovernmental Panel on Climate Change (IPCC), invisible hand, Jeff Bezos, Jeffrey Epstein, Julian Assange, Kickstarter, lockdown, Mahatma Gandhi, mandatory minimum, margin call, Mark Zuckerberg, mass immigration, megacity, microapartment, Mikhail Gorbachev, military-industrial complex, new economy, no-fly zone, offshore financial centre, Oklahoma City bombing, open borders, opioid epidemic / opioid crisis, pill mill, planetary scale, plutocrats, Ponzi scheme, power law, pre–internet, private military company, Project for a New American Century, quantitative easing, RAND corporation, reserve currency, RFID, ride hailing / ride sharing, Saturday Night Live, security theater, self-driving car, Seymour Hersh, Silicon Valley, smart cities, smart grid, smart meter, Snapchat, social distancing, Social Justice Warrior, South China Sea, stock buybacks, surveillance capitalism, too big to fail, unpaid internship, urban decay, WikiLeaks, working poor

But worse than that, they use these computer experiments called algorithms to find out how people are thinking, and then their behavior can be manipulated. Then they apply it with catastrophic consequences for us as individuals and for society as a whole. This might be the last generation who does not get an RFID chip at birth. Once that becomes an accepted way of life, everyone’s money, information, medical history, and everything else will be programmed into this chip. They will not have or need a Social Security Card, Birth Certificate, ID Card, Driver’s License, bank accounts, or bank cards because they will irrevocably be part of the machine.


pages: 495 words: 154,046

The Rights of the People by David K. Shipler

affirmative action, airport security, computer age, disinformation, facts on the ground, fudge factor, if you build it, they will come, illegal immigration, mandatory minimum, Mikhail Gorbachev, national security letter, Nelson Mandela, Oklahoma City bombing, Panopticon Jeremy Bentham, RFID, risk tolerance, Ronald Reagan, Skype, Thomas L Friedman, union organizing, working poor, zero-sum game

Georgia Tech has developed flashlight-sized radar that can detect heartbeats at a distance and human respiration through walls to help police locate fugitives in closets and people in hostage situations.17 Similarly, to select passengers for secondary screening at airports, the Future Attribute Screening Technology (FAST) is being designed to do remote measurements of stress indicators: respiration, eye movement, heart rate, skin temperature, body language, and voice quality.18 From the sound of this, if you’re nervous about being late for your flight, be prepared to miss it as you get pulled off for additional scrutiny. RFIDs, or radio-frequency identification devices, are growing in use—in passports, in E-ZPass transponders, on cartons of goods—so that a radio wave beamed at one triggers a unique signature identifying the owner. Unfortunately, hackers can also skim personal data as they pass by. GPS receivers, employing the Pentagon’s Global Positioning System of navigation satellites, are now ubiquitous—in cell phones, planes, boats, and cars.


pages: 562 words: 146,544

Daemon by Daniel Suarez

Berlin Wall, Burning Man, call centre, digital map, disruptive innovation, double helix, failed state, Fall of the Berlin Wall, game design, high net worth, invisible hand, McMansion, offshore financial centre, optical character recognition, peer-to-peer, plutocrats, RFID, satellite internet, SQL injection, Stewart Brand, tech worker, telemarketer, web application

A long roll of black Duvateen hung down at the entrance, blocking the light and some of the noise within. A line of a hundred or so teens hooted and hollered at the entrance, while a dozen heavyset thugs in SECURITY windbreakers flanked the opening. The bouncers collected twenty dollars from everybody at the door and then slipped an RFID-equipped neck badge around each teen’s neck. Once tagged like cows, the patrons then proceeded through the metal detectors and into the main hangar. Each guard was equipped with a Taser and pepper spray to quickly subdue and remove those inclined to disrupt the party. Dozens more patrolled the party inside.


pages: 537 words: 149,628

Ghost Fleet: A Novel of the Next World War by P. W. Singer, August Cole

3D printing, Admiral Zheng, air gap, augmented reality, British Empire, digital map, energy security, Firefox, glass ceiling, global reserve currency, Google Earth, Google Glasses, IFF: identification friend or foe, Just-in-time delivery, low earth orbit, Maui Hawaii, military-industrial complex, MITM: man-in-the-middle, new economy, old-boy network, operational security, RAND corporation, reserve currency, RFID, Silicon Valley, Silicon Valley startup, South China Sea, sovereign wealth fund, space junk, stealth mode startup, three-masted sailing ship, trade route, Virgin Galactic, Wall-E, We are Anonymous. We are Legion, WikiLeaks, zero day, zero-sum game

Armando’s smile went unnoticed by Allison Swigg as she cut across the grassy field by the pond in her rush from the parking lot. The imagery analyst had gotten stuck in the traffic on I-295 on her way back from a networking lunch out at Tysons Corner. And now she was late for the staff meeting. Neither of them noticed the other, but as she passed the landscaper, his tablet recognized the RFID chips embedded in Swigg’s security badge. A localized wireless network formed for exactly 0.03 seconds. In that instant, the malware hidden in the video packet from Caracas made its jump. As Chavez finished the iced tea his wife had made for him the previous night, Swigg approached the security desk manned by a guard in a black bullet-resistant nylon jumpsuit.


pages: 565 words: 151,129

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism by Jeremy Rifkin

3D printing, active measures, additive manufacturing, Airbnb, autonomous vehicles, back-to-the-land, benefit corporation, big-box store, bike sharing, bioinformatics, bitcoin, business logic, business process, Chris Urmson, circular economy, clean tech, clean water, cloud computing, collaborative consumption, collaborative economy, commons-based peer production, Community Supported Agriculture, Computer Numeric Control, computer vision, crowdsourcing, demographic transition, distributed generation, DIY culture, driverless car, Eben Moglen, electricity market, en.wikipedia.org, Frederick Winslow Taylor, Free Software Foundation, Garrett Hardin, general purpose technology, global supply chain, global village, Hacker Conference 1984, Hacker Ethic, industrial robot, informal economy, information security, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Isaac Newton, James Watt: steam engine, job automation, John Elkington, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Julian Assange, Kickstarter, knowledge worker, longitudinal study, low interest rates, machine translation, Mahatma Gandhi, manufacturing employment, Mark Zuckerberg, market design, mass immigration, means of production, meta-analysis, Michael Milken, mirror neurons, natural language processing, new economy, New Urbanism, nuclear winter, Occupy movement, off grid, off-the-grid, oil shale / tar sands, pattern recognition, peer-to-peer, peer-to-peer lending, personalized medicine, phenotype, planetary scale, price discrimination, profit motive, QR code, RAND corporation, randomized controlled trial, Ray Kurzweil, rewilding, RFID, Richard Stallman, risk/return, Robert Solow, Rochdale Principles, Ronald Coase, scientific management, search inside the book, self-driving car, shareholder value, sharing economy, Silicon Valley, Skype, smart cities, smart grid, smart meter, social web, software as a service, spectrum auction, Steve Jobs, Stewart Brand, the built environment, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, too big to fail, Tragedy of the Commons, transaction costs, urban planning, vertical integration, warehouse automation, Watson beat the top human players on Jeopardy!, web application, Whole Earth Catalog, Whole Earth Review, WikiLeaks, working poor, Yochai Benkler, zero-sum game, Zipcar

The term Internet of Things was coined by Kevin Ashton, one of the founders of the MIT Auto ID Center, back in 1995. In the years that followed, the IoT languished, in part, because the cost of sensors and actuators embedded in “things” was still relatively expensive. In an 18 month period between 2012 and 2013, however, the cost of radio-frequency identification (RFID) chips, which are used to monitor and track things, plummeted by 40 percent. These tags now cost less than ten cents each.15 Moreover, the tags don’t require a power source because they are able to transmit their data using the energy from the radio signals that are probing them. The price of micro-electromechanical systems (MEMS), including gyroscopes, accelerometers, and pressure sensors, has also dropped by 80 to 90 percent in the past five years.16 The other obstacle that slowed the deployment of the IoT has been the Internet protocol, IPv4, which allows only 4.3 billion unique addresses on the Internet (every device on the Internet must be assigned an Internet protocol address).


We Are the Nerds: The Birth and Tumultuous Life of Reddit, the Internet's Culture Laboratory by Christine Lagorio-Chafkin

"Friedman doctrine" OR "shareholder theory", 4chan, Aaron Swartz, Airbnb, Amazon Web Services, Bernie Sanders, big-box store, bitcoin, blockchain, Brewster Kahle, Burning Man, compensation consultant, crowdsourcing, cryptocurrency, data science, David Heinemeier Hansson, digital rights, disinformation, Donald Trump, East Village, eternal september, fake news, game design, Golden Gate Park, growth hacking, Hacker News, hiring and firing, independent contractor, Internet Archive, Jacob Appelbaum, Jeff Bezos, jimmy wales, Joi Ito, Justin.tv, Kickstarter, Large Hadron Collider, Lean Startup, lolcat, Lyft, Marc Andreessen, Mark Zuckerberg, medical residency, minimum viable product, natural language processing, Palm Treo, Paul Buchheit, Paul Graham, paypal mafia, Peter Thiel, plutocrats, QR code, r/findbostonbombers, recommendation engine, RFID, rolodex, Ruby on Rails, Sam Altman, Sand Hill Road, Saturday Night Live, self-driving car, semantic web, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, slashdot, Snapchat, Social Justice Warrior, social web, South of Market, San Francisco, Startup school, Stephen Hawking, Steve Bannon, Steve Jobs, Steve Wozniak, Streisand effect, technoutopianism, uber lyft, Wayback Machine, web application, WeWork, WikiLeaks, Y Combinator

After zipping up his gray hoodie and covering his head the best he could, Swartz set off. He looked back over his shoulder and saw cops in front of his door. He ducked behind a pillar. “I know exactly what to do in these kinds of situations; I’ve seen it in all the movies,” he wrote later. “Turn off the wireless on the cell phone, pay for everything in cash, don’t use RFID cards, stick to sidestreets. I stick to sidestreets, but I still hear the cop sirens buzzing down all the major roads. There are major roads on every side of me.” He checked his voicemail. There were messages from Ohanian, Huffman, and, oh God, Karimkhany. He didn’t need this. He pocketed his phone and walked.


pages: 583 words: 182,990

The Ministry for the Future: A Novel by Kim Stanley Robinson

"World Economic Forum" Davos, agricultural Revolution, airport security, Anthropocene, availability heuristic, basic income, bitcoin, blockchain, Bretton Woods, cakes and ale, carbon tax, centre right, clean tech, clean water, cryptocurrency, dark matter, decarbonisation, degrowth, distributed ledger, drone strike, European colonialism, failed state, fiat currency, Food sovereignty, full employment, Gini coefficient, global village, green new deal, happiness index / gross national happiness, High speed trading, high-speed rail, income per capita, Intergovernmental Panel on Climate Change (IPCC), Internet of things, invisible hand, Jevons paradox, Kim Stanley Robinson, land reform, liberation theology, liquidity trap, Mahbub ul Haq, megacity, megastructure, Modern Monetary Theory, mutually assured destruction, nuclear winter, ocean acidification, off grid, off-the-grid, offshore financial centre, place-making, plutocrats, Ponzi scheme, post-oil, precariat, price stability, public intellectual, quantitative easing, rewilding, RFID, Robert Solow, seigniorage, Shenzhen special economic zone , Silicon Valley, special economic zone, structural adjustment programs, synthetic biology, time value of money, Tragedy of the Commons, universal basic income, wage slave, Washington Consensus

The emergency medical people approached and then a pair of police, both women; more refugees disappeared, until it was only the stricken one and Frank. Frank gestured the police over. One of them held a scanner in front of the man’s face and clicked a photo and looked at the result. Possibly there would be an RFID embedded in the man’s skin too, there to be read by the scanner. Then the policewoman with the scanner glanced at Frank and stood up straight, holding the scanner toward him, gesturing at him with her other hand. The other policewoman said “Nei,” Swiss for Nein, and the one with the scanner returned to the stricken person.


pages: 721 words: 197,134

Data Mining: Concepts, Models, Methods, and Algorithms by Mehmed Kantardzić

Albert Einstein, algorithmic bias, backpropagation, bioinformatics, business cycle, business intelligence, business process, butter production in bangladesh, combinatorial explosion, computer vision, conceptual framework, correlation coefficient, correlation does not imply causation, data acquisition, discrete time, El Camino Real, fault tolerance, finite state, Gini coefficient, information retrieval, Internet Archive, inventory management, iterative process, knowledge worker, linked data, loose coupling, Menlo Park, natural language processing, Netflix Prize, NP-complete, PageRank, pattern recognition, peer-to-peer, phenotype, random walk, RFID, semantic web, speech recognition, statistical model, Telecommunications Act of 1996, telemarketer, text mining, traveling salesman, web application

It is estimated that the digital universe consumed approximately 281 exabytes in 2007, and it is projected to be 10 times that size by 2011. (One exabyte is ∼1018 bytes or 1,000,000 terabytes). Inexpensive digital and video cameras have made available huge archives of images and videos. The prevalence of Radio Frequency ID (RFID) tags or transponders due to their low cost and small size has resulted in the deployment of millions of sensors that transmit data regularly. E-mails, blogs, transaction data, and billions of Web pages create terabytes of new data every day. There is a rapidly widening gap between data-collection and data-organization capabilities and the ability to analyze the data.


pages: 933 words: 205,691

Hadoop: The Definitive Guide by Tom White

Amazon Web Services, bioinformatics, business intelligence, business logic, combinatorial explosion, data science, database schema, Debian, domain-specific language, en.wikipedia.org, exponential backoff, fallacies of distributed computing, fault tolerance, full text search, functional programming, Grace Hopper, information retrieval, Internet Archive, Kickstarter, Large Hadron Collider, linked data, loose coupling, openstreetmap, recommendation engine, RFID, SETI@home, social graph, sparse data, web application

When storage costs come down enough to make it feasible to store continuous audio and video, the data volume for a future MyLifeBits service will be many times that. The trend is for every individual’s data footprint to grow, but perhaps more important, the amount of data generated by machines will be even greater than that generated by people. Machine logs, RFID readers, sensor networks, vehicle GPS traces, retail transactions—all of these contribute to the growing mountain of data. The volume of data being made publicly available increases every year, too. Organizations no longer have to merely manage their own data: success in the future will be dictated to a large extent by their ability to extract value from other organizations’ data.


pages: 678 words: 216,204

The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler

affirmative action, AOL-Time Warner, barriers to entry, bioinformatics, Brownian motion, business logic, call centre, Cass Sunstein, centre right, clean water, commoditize, commons-based peer production, dark matter, desegregation, digital divide, East Village, Eben Moglen, fear of failure, Firefox, Free Software Foundation, game design, George Gilder, hiring and firing, Howard Rheingold, informal economy, information asymmetry, information security, invention of radio, Isaac Newton, iterative process, Jean Tirole, jimmy wales, John Markoff, John Perry Barlow, Kenneth Arrow, Lewis Mumford, longitudinal study, machine readable, Mahbub ul Haq, market bubble, market clearing, Marshall McLuhan, Mitch Kapor, New Journalism, optical character recognition, pattern recognition, peer-to-peer, power law, precautionary principle, pre–internet, price discrimination, profit maximization, profit motive, public intellectual, radical decentralization, random walk, Recombinant DNA, recommendation engine, regulatory arbitrage, rent-seeking, RFID, Richard Stallman, Ronald Coase, scientific management, search costs, Search for Extraterrestrial Intelligence, SETI@home, shareholder value, Silicon Valley, Skype, slashdot, social software, software patent, spectrum auction, subscription business, tacit knowledge, technological determinism, technoutopianism, The Fortune at the Bottom of the Pyramid, the long tail, The Nature of the Firm, the strength of weak ties, Timothy McVeigh, transaction costs, vertical integration, Vilfredo Pareto, work culture , Yochai Benkler

Users can use machine processing to search and sift through this information and to compare views and reviews of specific items. Trademark has become less, rather than more, functionally important as a mechanism for dealing with search costs. When we move in the next few years to individual-item digital marking, such as with RFID (radio frequency identification) tags, all the relevant information about contents, origin, and manufacture down to the level of the item, as opposed to the product line, will be readily available to consumers in real space, by scanning any given item, even if it is not otherwise marked at all. In this setting, where the information qualities of trademarks will significantly decline, the antidilution law nonetheless assures that owners can control the increasingly important cultural meaning of trademarks.


pages: 798 words: 240,182

The Transhumanist Reader by Max More, Natasha Vita-More

"World Economic Forum" Davos, 23andMe, Any sufficiently advanced technology is indistinguishable from magic, artificial general intelligence, augmented reality, Bill Joy: nanobots, bioinformatics, brain emulation, Buckminster Fuller, cellular automata, clean water, cloud computing, cognitive bias, cognitive dissonance, combinatorial explosion, Computing Machinery and Intelligence, conceptual framework, Conway's Game of Life, cosmological principle, data acquisition, discovery of DNA, Douglas Engelbart, Drosophila, en.wikipedia.org, endogenous growth, experimental subject, Extropian, fault tolerance, Flynn Effect, Francis Fukuyama: the end of history, Frank Gehry, friendly AI, Future Shock, game design, germ theory of disease, Hans Moravec, hypertext link, impulse control, index fund, John von Neumann, joint-stock company, Kevin Kelly, Law of Accelerating Returns, life extension, lifelogging, Louis Pasteur, Menlo Park, meta-analysis, moral hazard, Network effects, Nick Bostrom, Norbert Wiener, pattern recognition, Pepto Bismol, phenotype, positional goods, power law, precautionary principle, prediction markets, presumed consent, Project Xanadu, public intellectual, radical life extension, Ray Kurzweil, reversible computing, RFID, Ronald Reagan, scientific worldview, silicon-based life, Singularitarianism, social intelligence, stem cell, stochastic process, superintelligent machines, supply-chain management, supply-chain management software, synthetic biology, systems thinking, technological determinism, technological singularity, Ted Nelson, telepresence, telepresence robot, telerobotics, the built environment, The Coming Technological Singularity, the scientific method, The Wisdom of Crowds, transaction costs, Turing machine, Turing test, Upton Sinclair, Vernor Vinge, Von Neumann architecture, VTOL, Whole Earth Review, women in the workforce, zero-sum game

The approach taken there involves work by Yael Maguire to develop measurement devices at the scale of red blood cells (about 8 micrometers in diameter). The technology is based on existing fabrication capabilities from the integrated circuit industry, builds on prior successful work embedding chips in cells (Gomez-Martinez et al. 2010), and adds to this RFID-inspired passive communication, and infrared signaling and power technology. Even before those tools reach their full potential, there are ongoing efforts in the Ed Boyden group to scale up multi-electrode arrays to thousands of recording channels that are integrated with light-guides for optogenetic stimulation.


pages: 1,028 words: 267,392

Wanderers: A Novel by Chuck Wendig

Black Swan, Boston Dynamics, centre right, citizen journalism, clean water, Columbine, coronavirus, crisis actor, currency manipulation / currency intervention, disinformation, fake news, game design, global pandemic, hallucination problem, hiring and firing, hive mind, Internet of things, job automation, Kickstarter, Lyft, Maui Hawaii, microaggression, oil shale / tar sands, private military company, quantum entanglement, RFID, satellite internet, side project, Silicon Valley, Skype, supervolcano, tech bro, TED Talk, uber lyft, white picket fence

We can talk in the other room, I’ll get you some food, some water.” As they passed the receptionist desk, he saw the beam of light pass over some photos in frames. In one, he saw the woman standing in front of him. Guess he didn’t need to ask what she did here. She sat in that desk. They headed to a closed door, and she passed an RFID badge over a reader—the door popped with a magnetic click, and she let the badge zip back to her hip on its retractable cable. As he followed down a hallway, shoesteps loud on the marble, he said, “I’m sorry, you have me at a loss, I’m Doctor Ray and you are…” “Rosalie Stevens.” “Pleasure to meet you.”


California by Sara Benson

airport security, Albert Einstein, Apple II, Asilomar, back-to-the-land, Bay Area Rapid Transit, Berlin Wall, Blue Bottle Coffee, Burning Man, buy and hold, California gold rush, call centre, car-free, carbon footprint, Columbine, company town, dark matter, Day of the Dead, desegregation, Donald Trump, Donner party, East Village, El Camino Real, Electric Kool-Aid Acid Test, Fillmore Auditorium, San Francisco, Frank Gehry, gentrification, global village, Golden Gate Park, Haight Ashbury, haute cuisine, Joan Didion, Khyber Pass, Loma Prieta earthquake, low cost airline, machine readable, McDonald's hot coffee lawsuit, McMansion, means of production, megaproject, Menlo Park, Neil Armstrong, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, off-the-grid, planetary scale, retail therapy, RFID, ride hailing / ride sharing, Ronald Reagan, Silicon Valley, South of Market, San Francisco, SpaceShipOne, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, the new new thing, trade route, transcontinental railway, Upton Sinclair, urban sprawl, Wall-E, white picket fence, Whole Earth Catalog, working poor, Works Progress Administration, young professional

If your passport was issued before October 26, 2005, it must be ‘machine readable’ (with two lines of letters, numbers and <<< at the bottom); if it was issued between October 26, 2005, and October 25, 2006, it must be machine-readable and include a digital photo; and if it was issued on or after October 26, 2006, it must be an ePassport containing a digital photo and an integrated RFID chip containing biometric data. Citizens from all non-VWP countries, as well as those whose passports are not machine-readable or otherwise don’t meet the current US standards, will need to wrangle a nonimmigrant visa from a US consulate or embassy abroad. The process costs at minimum a nonrefundable $100, involves a personal interview and can take several weeks, so apply as early as possible.


USA Travel Guide by Lonely, Planet

1960s counterculture, active transport: walking or cycling, Affordable Care Act / Obamacare, Albert Einstein, Apollo 11, Apollo 13, Asilomar, Bay Area Rapid Transit, Bear Stearns, Berlin Wall, Big bang: deregulation of the City of London, big-box store, bike sharing, Biosphere 2, Bretton Woods, British Empire, Burning Man, California gold rush, call centre, car-free, carbon footprint, centre right, Charles Lindbergh, Chuck Templeton: OpenTable:, congestion pricing, Cornelius Vanderbilt, cotton gin, cuban missile crisis, Day of the Dead, desegregation, Donald Trump, Donner party, Dr. Strangelove, East Village, edge city, El Camino Real, fake news, Fall of the Berlin Wall, feminist movement, Ford Model T, Frank Gehry, gentleman farmer, gentrification, glass ceiling, global village, Golden Gate Park, Guggenheim Bilbao, Haight Ashbury, haute couture, haute cuisine, Hernando de Soto, Howard Zinn, illegal immigration, immigration reform, information trail, interchangeable parts, intermodal, jitney, Ken Thompson, Kickstarter, license plate recognition, machine readable, Mars Rover, Mason jar, mass immigration, Maui Hawaii, McMansion, Menlo Park, military-industrial complex, Monroe Doctrine, Neil Armstrong, new economy, New Urbanism, obamacare, off grid, off-the-grid, Quicken Loans, Ralph Nader, Ralph Waldo Emerson, retail therapy, RFID, ride hailing / ride sharing, Ronald Reagan, Rosa Parks, Saturday Night Live, Silicon Valley, South of Market, San Francisco, starchitect, stealth mode startup, stem cell, supervolcano, the built environment, The Chicago School, the High Line, the payments system, three-martini lunch, trade route, transcontinental railway, union organizing, Upton Sinclair, upwardly mobile, urban decay, urban planning, urban renewal, urban sprawl, Virgin Galactic, walkable city, white flight, working poor, Works Progress Administration, young professional, Zipcar

If your passport was issued before October 26, 2005, it must be ‘machine readable’ (with two lines of letters, numbers and <<< at the bottom); if it was issued between October 26, 2005, and October 25, 2006, it must be machine readable and include a digital photo; and if it was issued on or after October 26, 2006, it must be an e-Passport with a digital photo and an integrated RFID chip containing biometric data. Air Airports The USA has more than 375 domestic airports, but only a baker’s dozen are the main international gateways. Many other airports are called ‘international’ but may have only a few flights from other countries – typically Mexico or Canada. Even travel to an international gateway sometimes requires a connection in another gateway city (eg London–Los Angeles flights may involve transferring in Houston).