Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »

Ho John Lee › Comments

Ho John Lee
MIT Hacks Kinect Laser For A Wearable Map Generator For Firefighters | TechCrunch - http://techcrunch.com/2012...
Mapping data is collected by a chest-bound laser that sweeps for terrain and walls in 270-degrees around the wearer as he or she moves about a room. “Every few meters” a camera collects hundreds of visual images on colors, contours, and shapes to augment the laser’s mapping. An accelerometer keeps track of where the user is looking and moving, and a barometer gages the floor level by micro-changes in air-pressure. - Ho John Lee
Ho John Lee
Most web sites ask for a password when you register. After logging in, you can access the site until your session expires. When you forget your password, you can request an email with a link to a password change form. NoPassword factors out the password from this process. You register with an email address and receive a link that gives you a session on that browser until you log out. If you ever need to log in from somewhere else, you can request another email with a link that will log you in wherever you are. - Ho John Lee
Ho John Lee
Free Open-Source Statistics Cookbook | Data Science 101 - http://datascience101.wordpress.com/2012...
Matthias Vallentin, a computer science PhD student at UC Berkeley, has published a Probability and Statistics Cookbook. The book can be freely downloaded in PDF format via the website. Also, the latex source is available on Github. Matthias states that others are free to fork the source and make changes. The book is not a textbook. It is more of a cheatsheet. It contains many of the common probability and statistics techniques and the associated formula. I would consider this book to be an excellent resource to have around - Ho John Lee
Ho John Lee
Exploring Local » Blog Archive » Google Maps announces a 400 year advantage over Apple Maps - http://blog.telemapics.com/...
The issue plaguing Apple Maps is not mathematics or algorithms, it is data quality and there can be little doubt about the types of errors that are plaguing the system. What is happening to Apple is that their users are measuring data quality. Users look for familiar places they know on maps and use these as methods of orienting themselves, as well as for testing the goodness of maps. They compare maps with reality to determine their location. They query local businesses to provide local services. When these actions fail, the map has failed and this is the source of Apple’s most significant problems. Apple’s maps are incomplete, illogical, positionally erroneous, out of date, and suffer from thematic inaccuracies. - Ho John Lee
Ho John Lee
Pig as Duct Tape, Part Three: TF-IDF Topics with Cassandra, Python Streaming and Flask | Hortonworks - http://hortonworks.com/blog...
Tutorial on using various text mining tools with Pig, NLTK, Cassandra on Hadoop, with the Enron mail data set. - Ho John Lee
Ho John Lee
InnoCentive - Economist-Nielsen data visualization challenge - https://www.innocentive.com/ar...
The Economist (the Seeker for this Challenge) and Nielsen (the Knowledge Partner for this Challenge) are challenging Solvers to review data, generate insightful conclusions with broad implications, and present a compelling visual presentation of the most interesting ideas from it. The sources of information for this Challenge are global research, provided by Nielsen, reflecting consumer behavior. This is an Ideation Challenge with a guaranteed award for at least one submitted solution. Submissions to this Challenge must be received by 11:59 PM (US Eastern Time) on 15-Oct-2012. Late submissions will not be considered. Source: InnoCentive Challenge ID: 9933147 - Ho John Lee
Ho John Lee
MADD - Tie One on for Safety® Infographic Challenge - http://www.madd.org/drunk-d...
Tie One on for Safety® Infographic Challenge Drunk driving is the most frequently committed violent crime in the United States, killing 10,228 in 2010 and injuring about 345,000 more. Mothers Against Drunk Driving is working to eliminate this violent crime and works to raise awareness of this issue around the end of the year when drunk driving is, sadly, more common. We do this primarily through our Tie One on for Safety public awareness program. This year, we want you to provide an interesting, engaging, and compelling look at government drunk driving statistics in support of the program. The winner of this Challenge will be publicly recognized along with their infographic in MADD’s national Tie One on for Safety press release, issued in November 2012. - Ho John Lee
Ho John Lee
Free UX Sketching And Wireframing Templates For Mobile Projects | Smashing UX Design - http://uxdesign.smashingmagazine.com/2012...
Outline, a set of sketching and wireframing papers for mobile platforms and Tapsize, a set of templates for checking optimal tap areas without a mobile device. Outline is a set of 28 printable sketching and wireframing papers (in PDF) for seven mobile platforms: Android, BlackBerry, iOS (iPad and iPhone), Meego, Symbian, webOS, Windows Phone 7. The set consists of a few combinations, such as actual size, 10 devices fit to a page, and landscape layout. With Tapsize, you can determine the optimal tap area without having an actual device. Just print the screen you need. The set includes 9 PDFs: 3.5 inches — 640 × 960 pixels 4.65 inches — 1280 × 720 pixels 5.3 inches — 1280 × 800 pixels 7 inches — 1024 × 600 pixels 7 inches — 1280 × 800 pixels 7.7 inches — 1280 × 800 pixels 8.9 inches — 1280 × 800 pixels 9.7 inches — 1024 × 768 and 2048 × 1536 pixels 10.1 inches — 1280 × 800 pixels - Ho John Lee
Ho John Lee
Gallery of free HTML snippets for Twitter Bootstrap. | Bootsnipp.com - http://bootsnipp.com/
What is this? Bootsnipp is an element gallery for web designers and web developers, anybody who is using Twitter Bootstrap will find this website essential in their craft. Currently Bootsnipp is using Bootstrap v 2.1.1 - Ho John Lee
Ho John Lee
Unsucking Your Team's Development Environment - http://zachholman.com/talk...
Success can bring many glamorous changes to your company: hiring more employees, getting free coffee, and giving everyone a private jet filled with cash and endangered African predatory cats. Success can lead to less-glamorous problems, though. As you grow, your team's development environment becomes really important. How long does it take to clone, set up, and boot your apps? Can your employees still be productive on an aging codebase? How can you automate CI, hooks, and other setup for new projects? Is any of this fun anymore? GitHub ran into these problems as we expanded our team tremendously over the last two years. Let's look at some of the ways we've improved our employees' development environment - Ho John Lee
Ho John Lee
CI 2012 videos - MIT Center for Collective Intelligence - http://cci.mit.edu/ci2012...
Collective intelligence has existed at least as long as humans have, because families, armies, countries, and companies have all--at least sometimes--acted collectively in ways that seem intelligent. But in the last decade or so a new kind of collective intelligence has emerged: groups of people and computers, connected by the Internet, collectively doing intelligent things. For example, Google technology harvests knowledge generated by millions of people creating and linking web pages and then uses this knowledge to answer queries in ways that often seem amazingly intelligent. Or in Wikipedia, thousands of people around the world have collectively created a very large and high quality intellectual product with almost no centralized control, and almost all as volunteers! These early examples of Internet-enabled collective intelligence are not the end of the story but just the beginning. And in order to understand the possibilities and constraints of these new kinds of intelligence, we - Ho John Lee
Ho John Lee
Internet freedom: Plus ça change | The Economist - http://www.economist.com/node...
Today Yahoo!, Microsoft and Google are members of the Global Network Initiative, an organisation that has agreed on principles of free expression and online privacy. The companies have limited their presence in some authoritarian countries. Rebecca MacKinnon, an expert on internet freedom, notes that Microsoft and Google, keen to avoid Yahoo!’s fate, never introduced Chinese-based versions of Hotmail and Gmail. To keep its nose clean in Vietnam, Yahoo! maintains its Vietnamese-language servers in Singapore. (Facebook and Twitter, used by some Chinese activists, are blocked in China and accessible only using special tools.) - Ho John Lee
Ho John Lee
Attachments.me connecting SkyDrive with Gmail and tips for other SkyDrive developers - http://windowsteamblog.com/skydriv...
With our most recent release, there’s no longer any restriction on the types of files that can be uploaded to SkyDrive via our API. As part of this change, we’ve also changed our policies to allow apps to back up a user’s data to SkyDrive. One question that has since come up is how apps should store data so that app backups don’t end up cluttering up a user’s SkyDrive. Our recommendation is that apps should store data using the following folder hierarchy: [SkyDrive root] '- ApplicationData '- [Application Name] ([Publisher Name or Company Name]) e.g. Photosky (Contoso) The application name should be provided as a human readable name that the end user understands, while the publisher name should be included in parenthesis in the folder name to disambiguate your app from another app that may have the same name. - Ho John Lee
Ho John Lee
Sniffing open WiFi networks is not wiretapping, judge says | Ars Technica - http://arstechnica.com/tech-po...
The ruling is a preliminary step in a larger patent trolling case. A company called Innovatio IP Ventures has accused various "hotels, coffee shops, restaurants, supermarkets," and other businesses that offer WiFi service to the public of infringing 17 of its patents. Innovatio wanted to use packet sniffing gear to gather WiFi traffic for use as evidence in the case. It planned to immediately delete the contents of the packets, only keeping the headers. Still, the firm was concerned that doing so might violate federal privacy laws, so it sought a preliminary ruling on the question. Federal law makes it illegal to intercept electronic communications, but it includes an important exception. It's not illegal to intercept communications "made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public." Judge James Holderman ruled that this exception applies to Innovatio's proposed packet sniffing. In the - Ho John Lee
Ho John Lee
White House circulating draft of executive order on cybersecurity - The Hill's Hillicon Valley - http://thehill.com/blogs...
According to the people familiar with the draft, the executive order would set up an inter-agency council that would be led by the Department of Homeland Security (DHS). Members of the council would include the Department of Defense and the Commerce Department, and discussions are ongoing about including other agencies and officials, such as representatives from the Department of Energy and Treasury Department, as well as the attorney general and the director of national intelligence. DHS would be responsible for the overall management of the program, but the Commerce Department's National Institute of Standards and Technology (NIST) would work with industry to help craft the framework for it. The agency would work with the private sector to develop cybersecurity guidelines and best practices. DHS would receive the guidance from NIST and work with so-called sector coordinating councils to identify which industry sectors would be considered critical infrastructure, as well as determin - Ho John Lee
Ho John Lee
We Don't Need No Stinking Warrant: The Disturbing, Unchecked Rise of the Administrative Subpoena | Threat Level | Wired.com - http://www.wired.com/threatl...
Anecdotal evidence suggests that federal officials from a broad spectrum of government agencies issue them hundreds of thousands of times annually. But none of the agencies are required to disclose fully how often they utilize them — meaning there is little, if any, oversight of this tactic that’s increasingly used in the war on drugs, the war on terror and, seemingly, the war on Americans’ constitutional rights to be free from unreasonable government trespass into their lives. That’s despite proof that FBI agents given such powers under the Patriot Act quickly began to abuse them and illegally collected Americans’ communications records, including those of reporters. Two scathing reports from the Justice Department’s Inspector General uncovered routine and pervasive illegal use of administrative subpoenas by FBI anti-terrorism agents given nearly carte blanche authority to demand records about Americans’ communications with no supervision. When the 9th U.S. Circuit Court of Appeals, - Ho John Lee
Ho John Lee
3 years later, hackers who hit Google continue string of potent attacks | Ars Technica - http://arstechnica.com/securit...
Google's disclosure in 2010 that it and more than a dozen other sensitive companies were penetrated by the sophisticated attackers cemented the security industry's use of the phrase advanced persistent threat. Although many, this reporter included, once viewed it as a largely meaningless buzz phrase, APTs are useful in distinguishing these types of attacks from more common crime-motivated exploits. The chief difference is this: crime-based attacks, which use malware to obtain online banking passwords or credit card data, are opportunistic, so they're directed at everyone. Defending against them mainly involves having security that's better than other people on the Internet. APTs, by contrast, are directed at a specific person or organization that has unique assets. If attackers don't succeed against a specific target with one campaign, they'll direct a new campaign at the same target and hope for better results. They will repeat the process until they succeed. That makes defending aga - Ho John Lee
Ho John Lee
Big Data vs Intelligent Data for Startups - http://www.klaviyo.com/blog...
What is Intelligent Data I’d offer a few specific criteria for what makes intelligent data: Data that is clear and unambiguous – i.e. the data values can be defined and measured in a repeatable fashion Data that is concise – i.e. the data represents the smallest number of data points that would lead to the same action. If you need 90% certainty to take action, it’s the amount of data that will safely give you that. Data that is directly linked to action – i.e. based on different values of that data, different decisions will be made and implemented. In short, intelligent data is data that is a direct input to analysis – and very specifically to the right analysis needed to decide between decision A or B. - Ho John Lee
Ho John Lee
i2b2: Informatics for Integrating Biology & the Bedside - https://www.i2b2.org/
i2b2 (Informatics for Integrating Biology and the Bedside) is an NIH-funded National Center for Biomedical Computing based at Partners HealthCare System. The i2b2 Center is developing a scalable informatics framework that will enable clinical researchers to use existing clinical data for discovery research and, when combined with IRB-approved genomic data, facilitate the design of targeted therapies for individual patients with diseases having genetic origins. This platform currently enjoys wide international adoption by the CTSA network, academic health centers, and industry. i2b2 is funded as a cooperative agreement with the National Institutes of Health. - Ho John Lee
Ho John Lee
Tarsnap - Online backups for the truly paranoid - https://www.tarsnap.com/index...
Online backups for the truly paranoid Tarsnap is a secure online backup service for BSD, Linux, OS X, Minix, Solaris, Cygwin, and probably many other UNIX-like operating systems. The Tarsnap client code provides a flexible and powerful command-line interface which can be used directly or via shell scripts. At the present time, Tarsnap does not support Windows (except via Cygwin) and does not have a graphical user interface. - Ho John Lee
Ho John Lee
What Color is this? in 9 languages | The CrowdFlower Blog - http://blog.crowdflower.com/2012...
Four years ago, we showed English language speakers random colors and asked for the color names. Four years later, with CrowdFlower contributors now in every country of the world, the experiment becomes much richer. The question is not only “Where does blue end, and red begin?”, but do people from different countries have different concepts of color boundaries? - Ho John Lee
Ho John Lee
Do You Need a Data Dictator? - http://sloanreview.mit.edu/feature...
Could you explain the idea of sacred data that you talked about in your recent e-Chat with AllAnalytics.com? First, I should tell you I learned this term from Tom Nealon, the former CIO at Southwest Airlines [now a board director there], and he got it from Charlie Feld, who was the CIO at Frito-Lay and a variety of other places. But the idea is simply that your data is not all equal, and if you treat it as if it is all equal, you’re never going to get anywhere. So figure out first of all, what’s the single most important thing. Tom said that at J.C. Penney’s, which is where he went after he was at Southwest, the purchases were the single most important thing. You needed to know product, basically. At Southwest, it had been the customer reservation, because that runs through the entire system. At UPS, it’s the package data. By the way, UPS is brilliant at analytics. There are other things that matter. But you have to let the others go until you’ve got the single most important data f - Ho John Lee
Ho John Lee
The Common Crawl data set contains approximately 6 billion web documents stored on a publicly accessible, scalable computer cluster. Here is some more information on the content and storage of the data set. File Locations The entire Common Crawl data set is stored on Amazon S3 as a Public Data Set: http://aws.amazon.com/dataset... The data set is divided into three major subsets: Archived Crawl #1 - s3://aws-publicdatasets/common-crawl/crawl-001/ - crawl data from 2008/2010 Archived Crawl #2 - s3://aws-publicdatasets/common-crawl/crawl-002/ - crawl data from 2009/2010 Current Crawl - s3://aws-publicdatasets/common-crawl/parse-output/ - crawl data from 2012 The two archived crawl data sets are stored in folders organized by the year, month, date, and hour the content was crawled. For example: s3://aws-publicdatasets/common-crawl/crawl-002/2010/01/06/10/1262847572760_10.arc.gz the contents of this file were crawled started on January 6th, 2010 at 10 AM. The curren - Ho John Lee
Ho John Lee
Doodle Jump Game using HTML5 | CSSDeck - http://cssdeck.com/labs...
This is a recreation of Doodle Jump that originally comes for Android and iOS devices. This game is created using awesome HTML5 API and Canvas. It does not have all of the features that the original game has (for now) like Monsters, Power ups etc. - Ho John Lee
Ho John Lee
My Python Code for the Netflix Prize | Hacker News - http://news.ycombinator.com/item...
commentary on previous - Ho John Lee
Ho John Lee
alexbw/Netflix-Prize · GitHub - https://github.com/alexbw...
Specifically, the lessons I learned: Get the raw data into a saved and manageable format fast. The easier it is to load your data in and start mutating it, the better. If doing simple pivots on your data is hard, and slows you down from visualizing whats in your data, spend time making data structures which make that easy. Generalize. Iterate. If you have a method you think will work, but it has a lot of knobs, and you don't know the best way to set those knobs, make it easy for you to try every possible iteration. There is often not a good way to figure out what the best approach is. You will have to try many of them in order to build up an intuition. Specifically, that means (for me) a pluggable architecture. If there's ten ways to try a particular step, make sure you write your overarching algorithm so that it takes a function that you can pass to it, as opposed to having a method hardwired in the code. That way, you can hotswap all your ideas. Speed is a feature. O - Ho John Lee
Ho John Lee
The fall of Angry Birds, what is next? | Trey Smith App Blog - http://www.treysmithblog.com/the-fal...
They discuss how this new game bombed and even attempt to blame free to play games which the developer later retracted, saying he was upset at the time of interview. After reading the article I immediately knew what went wrong: 1. They had limited in app purchase options 2. They didn’t have a call to action It’s that simple. They literally had friends trying to support the game and didn’t know how. Also, they didn’t have mass in app purchases, just a few including one to unlock the game. This is a bad in app purchase that has no emotional attachment and doesn’t give the player something to strive for. I could go on about this forever, but basically you either want an in app purchase to solve some curiosity for the player or benefit gameplay. Boring in app purchases like “full game” or “remove ads” are not as effective. - Ho John Lee
Ho John Lee
Customize Twitter Bootstrap To Not Look Bootstrap-y - Aj freelancer - http://antjanus.com/blog...
http://jetstrap.com/ - Jetstrap is an online tool to build UI with Bootstrap via drag-drop. Web-based. ColourLovers – alternative to ColorSchemeDesigner. Find swatches here. Used not JUST for web. StyleBootstrap - similar to boottheme Bootstrap Image Gallery - an extension for image gallery KickStrap - bootstrap enhancement suite with custom themes, js plugins, and more. Perfect solution for those that don’t want to customize WrapBootStrap - Bootstrap themes gallery. Paid Bootswatch - free bootstrap themes Kuler – Adobe’s color swatch library. If you can’t figure out the right colors even with colorschemedesigner, this is the place to go. - Ho John Lee
Ho John Lee
venomous porridge - Is a federated Twitter even possible? - http://venomousporridge.com/post...
here’s a list of three constraints we’ve come to expect of our social timelines: Immediacy: if a post has been made by someone I follow, I can see it in my timeline right away (or close enough that I don’t notice the difference). Chronology: posts always appear in order by time posted. Monotonicity: timelines grow only from the top; older posts are never retroactively inserted. The problem appears to be that no federated architecture can simultaneously satisfy all three of these conditions. You can have any two: for example, if you let go of immediacy, your node can just wait until it’s received the latest content from every other node before displaying anything. But that’s not very scalable, and it makes real-time conversation impossible, so let’s keep immediacy. Now we have to decide what to do when content from a far-away node arrives late: if we’ve already displayed newer posts, we have to violate either chronology (by posting the older content above the newer) or mon - Ho John Lee
Ho John Lee
Cloud service cracks VPN passwords in 24 hours - The H Security: News and Features - http://www.h-online.com/securit...
With the help of a company called Picocomputing, Marlinspike has developed a processing server which is able to test 18 billion keys per second – a feat which would normally require 80,000 CPUs. The server is equipped with 48 programmable processing units known as field programmable gate arrays (FPGA). Each FPGA is programmed to provide 40 parallel processing units, each with a clock speed of 450 MHz, for cracking DES. Users who want to take advantage of the service will first have to extract the client-server handshake from a record of the network traffic. Marlinspike has developed an open source tool called chapcrack for this purpose. - Ho John Lee
Other ways to read this feed:Feed readerFacebook