Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »

Ho John Lee › Comments

Ho John Lee
MALLET homepage - MAchine Learning for LanguagE Toolkit - http://mallet.cs.umass.edu/
MALLET is a Java-based package for statistical natural language processing, document classification, clustering, topic modeling, information extraction, and other machine learning applications to text. MALLET includes sophisticated tools for document classification: efficient routines for converting text to "features", a wide variety of algorithms (including Naïve Bayes, Maximum Entropy, and Decision Trees), and code for evaluating classifier performance using several commonly used metrics. In addition to classification, MALLET includes tools for sequence tagging for applications such as named-entity extraction from text. Algorithms include Hidden Markov Models, Maximum Entropy Markov Models, and Conditional Random Fields. These methods are implemented in an extensible system for finite state transducers. Topic models are useful for analyzing large collections of unlabeled text. The MALLET topic modeling toolkit contains efficient, sampling-based implementations of Latent Dirichlet A - Ho John Lee
Ho John Lee
Large Scale Learning at Twitter - videolectures.net - http://videolectures.net/eswc201...
Twitter represents a large complex network of users with diverse and continuously evolving interests. Discussions and interactions range from very small to very large groups of people and most of them occur in the public. Interests are both long and short term and are expressed by the content generated by the users as well as via the Twitter follow graph, i.e. who is following whose content. Understanding user interests is crucial to providing good Twitter experience by helping users to connect to others, find relevant information and interesting information sources. The manner in which information is spread over the network and communication attempts are made can also help in identifying spammers and other service abuses. Understanding users and their preferences is also a very challenging problem due to the very large volume information, the fast rate of change and the short nature of the tweets. Large scale machine learning as well as graph and text mining have been helping us to ta - Ho John Lee
Ho John Lee
Apache Mesos: Dynamic Resource Sharing for Clusters - http://www.mesosproject.org/
Apache Mesos is a cluster manager that provides efficient resource isolation and sharing across distributed applications, or frameworks. It can run Hadoop, MPI, Hypertable, Spark (a new framework for low-latency interactive and iterative jobs), and other applications. Mesos is open source in the Apache Incubator. Mesos block diagram You can use Mesos to: Run Hadoop, MPI, Spark, and other frameworks on a dynamically shared pool of nodes. Run multiple instances of Hadoop on the same cluster to isolate production and experimental jobs, or even multiple versions of Hadoop. Run long-lived services (e.g. Hypertable and HBase) on the same nodes as batch applications and share resources between them. Build new cluster computing frameworks without reinventing low-level facilities for farming out tasks, and have them coexist with existing ones. - Ho John Lee
Ho John Lee
Interactive Dynamics for Visual Analysis - ACM Queue - http://queue.acm.org/detail...
The goal of this article is to assist designers, researchers, professional analysts, procurement officers, educators, and students in evaluating and creating visual analysis tools. We present a taxonomy of interactive dynamics that contribute to successful analytic dialogues. The taxonomy consists of 12 task types grouped into three high-level categories, as shown in table 1: (1) data and view specification (visualize, filter, sort, and derive); (2) view manipulation (select, navigate, coordinate, and organize); and (3) analysis process and provenance (record, annotate, share, and guide). These categories incorporate the critical tasks that enable iterative visual analysis, including visualization creation, interactive querying, multiview coordination, history, and collaboration. Validating and evolving this taxonomy is a community project that proceeds through feedback, critique, and refinement. Our focus on interactive elements presumes a basic familiarity with visualization design. - Ho John Lee
Ho John Lee
Stop Publishing Web Pages - Anil Dash - http://dashes.com/anil...
Obviously, I've written this in an old-style content publishing system, and this piece lives on my website as an old-fashioned HTML page. But if I had my preference, I'd write up an article like this, and it'd seamlessly glide into a clean, simple stream of my writing, organized by topic and sorted with the newest stuff on top. Blogs have always worked this way, but they were shoehorning this stream-like behavior into the best representation possible under the old page model. I don't have a tool I can use to run my website which will output a stream that works the right way. "What about using Tumblr to publish your blog?" you ask. Well, besides the fact that my site would have to run on their infrastructure, individual tumblr-style blogs don't allow you as a reader to personalize or customize the types of content in the stream, the way you would be choosing people to follow on Tumblr, Facebook or Twitter. You can't choose to follow just the music-related posts on my blog, ignoring the - Ho John Lee
Ho John Lee
Three years later, deleting your photos on Facebook now actually works | Ars Technica - http://arstechnica.com/informa...
Since February, all of the direct photo links that were sent to me by Ars readers disappeared, and I began deleting my own photos again from Facebook's site to see how long it would take for them to be removed from the CDN. I tested this with two photos while saving their direct URLs, and both photos became inaccessible within two days of deletion. Other readers wrote to me about different aspects of their Facebook experience remaining online indefinitely. Many pointed out that Facebook chats are only hidden and not deleted when a user thinks they're deleting them. Others said that deleted private messages seemed to magically resurrect themselves when using any one of Facebook's mobile apps or outside applications. And more than one user told me horror stories about how their friends-only Facebook albums somehow ended up being publicly accessible, and there's at least one unanswered Get Satisfaction thread on the topic. - Ho John Lee
Ho John Lee
‘Friends’ can share your Facebook profile with the government, court rules — Tech News and Analysis - http://gigaom.com/2012...
A federal judge has ruled that investigators can go through your Facebook profile if one of your friends gives them permission to do so. The decision, which is part of a New York City racketeering trial, comes as courts struggle to define privacy and civil liberties in the age of social media. In an order issued on Friday, US District Judge William Pauley III ruled that accused gangster Melvin Colon can’t rely on the Fourth Amendment to suppress Facebook evidence that led to his indictment. Colon had argued that federal investigators violated his privacy by tapping into his profile through an informant who was one of this Facebook friends. - Ho John Lee
Ho John Lee
Detecting Overlapping Communities in Facebook with NodeXL | beamtenherrschaft - http://beamtenherrschaft.blogspot.com/2012...
Arber has implemented an importer of Facebook data in NodeXL together with two state-of-the-art algorithms for overlapping community detection, i.e. MONC and SPLA. The visualization is nicely done. Each node is a pie chart where colors code the percentage of community belonging. You can download and install the importer for free. Overlapping communities are present in social network sites like Facebook. A Facebook user is on average member of seven communities (paper, slides). Computer scientists and social scientists are interested in analyzing communities. They can detect e.g. formation of trends and voter behavior in the data sets or make use of them for personalized advertisement and stock data. Also for system design data can be used for e.g. system optimization. Overlapping community detection algorithms (OCDA) are a recent further development of community detection algorithms (CDA). CDA always detect disjoint communities in network data, i.e. each node in the network belongs t - Ho John Lee
Ho John Lee
Federal court rules cops can warrantlessly track suspects via cellphone | Ars Technica - http://arstechnica.com/tech-po...
However, by May and June 2006, law enforcement agents received authorization to intercept the communications of two phones established in West’s name. In an order written by a Tennessee federal magistrate judge, the prosecuting United States attorney received authorization to install a pen register, a trap and trace device, and to receive location data from the call’s origination and termination points, in addition to GPS and ping data from those phones. Among other rationales, the judge cited the Stored Communications Act (also known as a 2703(d) order) as grounds to provide this order. Under that federal statute, authorities can’t receive the contents of electronic communication (what was said), but can find out where and to whom it was said. In contemporary cases within the last decade, law enforcement and judges have increasingly used this reasoning to obtain extensive location data that can effectively turn the phone into a tracking device. Such information previously would have - Ho John Lee
Ho John Lee
TED Blog | How pervasive has government distrust gotten? - http://blog.ted.com/2012...
“Transparency is not about restoring trust in institutions. Transparency is the politics of managing mistrust,” says Krastev. He suggests that when officials are watched with an eagle eye, fewer talented people will want to enter the field of governance. And transparency is relative: “Any unveiling is also veiling. No matter how transparent our governments want to be, governments will be selectively transparent.” - Ho John Lee
Ho John Lee
Trading Rules Over Fundamentals: A Stock Price Formula for High Frequency Trading, Bubbles and Crashes by Godfrey Cadogan :: SSRN - http://papers.ssrn.com/sol3...
Ryerson University - Ted Rogers School of Management, Institute for Innovation and Technology Management; IHA Consultants January 21, 2012 Abstract: In this paper we present a simple closed form stock price formula, which captures empirical regularities of high frequency trading (HFT), based on two factors: (1) exposure to hedge factor; and (2) hedge factor volatility. Thus, the parsimonious formula is not based on fundamental valuation. For applications, we first show that in tandem with a cost of carry model, it allows us to use exposure to and volatility of E-mini contracts to estimate dynamic hedge ratios, and mark-to-market capital gains on contracts. Second, we show that for given exposure to hedge factor, and suitable specification of hedge factor volatility, HFT stock price has a closed form double exponential representation. There, in periods of uncertainty, if volatility is above historic average, a relatively small short selling trade strategy is magnified expo - Ho John Lee
Ho John Lee
Hear, All Ye People; Hearken, O Earth (Part One) - NYTimes.com - http://opinionator.blogs.nytimes.com/2012...
We all know that we are influenced in many, many ways — many of which we remain blissfully unaware of. Could fonts be one of them? Could the mere selection of a font influence us to believe one thing rather than another? Could fonts work some unseen magic? Or malefaction? Wikimedia Commons (Greg Robson) Don’t get me wrong. The underlying truth of the sentence “Gold has an atomic number of 79” is not dependent on the font in which it is written. The sentence is true regardless of whether it is displayed in Helvetica, Georgia or even the much-maligned Comic Sans. But are we more inclined to believe that gold has an atomic number 79 if we read it in Georgia, the font of The New York Times online, rather than in Helvetica? - Ho John Lee
Ho John Lee
The effect of typefaces on credibility | Hacker News - http://news.ycombinator.com/item...
Discussion on whether fonts have an effect on perceived credibility of content. - Ho John Lee
Ho John Lee
A Guide to Claims-Based Identity and Access Control (2nd Edition) - http://msdn.microsoft.com/en-us...
September 2011 Summary Imagine a world where you don't have to worry about authentication. Imagine instead that all requests to your application already include the information you need to make access control decisions and to personalize the application for the user. In this world, your applications can trust another system component to securely provide user information, such as the user's name or email address, a manager's email address, or even a purchasing authorization limit. The user's information always arrives in the same simple format, regardless of the authentication mechanism, whether it's Microsoft® Windows® integrated authentication, forms-based authentication in a web browser, an X.509 client certificate, or something more exotic. Even if someone in charge of your company's security policy changes how users authenticate, you still get the information, and it's always in the same format. This is the utopia of claims-based identity that A Guide to Claims-Based Identity and - Ho John Lee
Ho John Lee
FTC Settles with Google over Cookie Control Override | Tech @ FTC - http://techatftc.wordpress.com/2012...
Safari allows a site to deposit a cookie onto your computer whenever at least one of the following things is true: you are visiting the site directly–that is, it is the “first party” site whose URL appears in the browser’s address bar, or the site already has a cookie present in your browser, or the site is responding to a form that you submitted. One consequence of this design is that Google’s opt-out cookie mechanism doesn’t work for Safari users–Google’s attempt to deliver the opt-out cookie will fail because none of the three conditions hold. The FTC alleged that Google told Safari users that they didn’t need to worry about the unavailability of opt-out, because Safari’s cookie controls would provide the same protection as the opt-out. - Ho John Lee
Ho John Lee
IdentityBlog - Digital Identity, Privacy, and the Internet's Missing Identity Layer - http://www.identityblog.com/...
Redefining Identity Management The term “Identity Management” will be redefined to include everything needed to provide and consume identity in our increasingly networked and federated world. This is so profound that it constitutes a “reset”. As a category, Identity Management will expand to encompass all aspects of identity: registration of people, organizations, devices and services; management of credentials; collection and proofing of attributes; claims issuance; claims acceptance; assignment of roles; management of groups; cataloging of relationships; maintenance of personalization information; storage and controlled publication of information through directory; confidential auditing; and assurance of compliance. - Ho John Lee
Ho John Lee
Identity management as a service | ZDNet - http://www.zdnet.com/blog...
One hallway conversation with Jamie Lewis, CEO of Burton Group found me asserting that identity management as a service ("IdMaaS" ?) was going to happen, while Jamie argued that companies would find identity data too important to hand-over to others. That last part is the part that is especially pertinent to this screed, as I will say that on more than one occasion, prospects expressed the desire for a federated identity *service* that both they and their partners could hook up to. The irony, of course, is that this type of service was tried once before -- you might know it as Passport. The difference being that Passport sought to centralize identity data, while federation seeks to integrate and transport distributed identity data (to be fair, Microsoft is now following the same model with Active Directory Federation Server). - Ho John Lee
Ho John Lee
Reimagining Active Directory for the Social Enterprise (Part 1) - Windows Azure - Site Home - MSDN Blogs - http://blogs.msdn.com/b...
But for many smaller organizations, building and maintaining an identity management system and the associated application integration has been too hard and too costly to consider. Even organizations that have successfully deployed identity management solutions are looking for ways to make identity management easier and to broaden its reach. Here in part 1 of a two-part posting, we will look at how the use of cloud architectures and cloud economies of scale is enabling us to offer Active Directory as a turnkey service at a cost that puts this powerful collection of capabilities within reach of essentially everyone—even small organizations without an IT staff. We see this as very important. It opens the door to “democratizing” identity management so it becomes a foundational capability that every organization and every software developer can count on—no matter what platform or technology base they are building from. - Ho John Lee
Ho John Lee
DailyCred - Authentication done right, instantly - https://www.dailycred.com/
User account system as a service. " Stop building account systems Sign up for DailyCred, add your logo and a link on your site and we'll take care of the rest. Everything you need is included: email verification, password resets, session cookies, and all the UI you need for sign in, and sign up. Simply connect to us with OAuth, and you're ready to go." - Ho John Lee
Ho John Lee
Reimagining Active Directory for the Social Enterprise (Part 2) - Windows Azure - Site Home - MSDN Blogs - http://blogs.msdn.com/b...
On June 7, as part of the spring release of Windows Azure, we announced the developer preview for Windows Azure Active Directory. The developer preview adds two major capabilities to the Windows Azure Active Directory service that we described in Part 1 of this post. First, it enables developers to connect to and use information in the directory through an easy-to-use REST interface. Second, it allows developers to connect to the organizational single-sign-on (SSO) capabilities of Windows Azure Active Directory—the same capabilities that are currently used by Microsoft Office 365, Windows Intune, and other Microsoft products. The developer preview, which will be available soon, builds on capabilities that Windows Azure Active Directory is already providing to customers. These include support for integration with consumer-oriented Internet identity providers such as Google and Facebook, and the ability to support Active Directory in deployments that span the cloud and enterprise - Ho John Lee
Ho John Lee
Study: Our Smartphones Are Turning Us Into “Real-Time Information Seekers And Problem Solvers” | TechCrunch - http://techcrunch.com/2012...
Here is evidence the Pew report cites for how this access to information is “creating a new culture of real-time information seekers and problem solvers:” 41% of cell phone owners used their phone in the previous 30 days to coordinate a meeting or get-together. 35% used their phone to solve an unexpected problem they or someone else had encountered in the previous 30 days. 30% used their phone in the previous 30 days to decide whether to visit a business, such as a restaurant 27% used their phone in the previous 30 days to get information to help settle an argument they were having. 23% used their phone in the previous 30 days to look up a score of a sporting event. 20% used their phone in the previous 30 days for up-to-the-minute traffic or public transit information to find the fastest way to get somewhere. - Ho John Lee
Ho John Lee
What's this? A collection of nerdy interviews asking people from all walks of life what they use to get the job done. - Ho John Lee
Ho John Lee
We Use That | About - http://weusethat.com/about
What is this? We ask startups about their favorite tools for getting things done. We were heavily, ahem, inspired by The Setup. Can I submit my startup to be featured? Sure! The easiest thing to do is to send us a pull request. What's a pull request? You can also email submissions@weusethat.com, but a pull request is much easier. - Ho John Lee
Ho John Lee
macro bellows.com - Close Up Exposure / Magnification Tables for macro photography - http://www.macrobellows.com/techniq...
These Close Up Exposure / Magnification Tables are for lenses of focal lengths including 50mm, 80mm, 100mm and 135mm. The tables show the exposure factor which needs to be multiplied by the metered exposure to determine the exposure increase when using non-TTL metering cameras or flash. These tables can be used for photographs taken using bellows or extension tubes. - Ho John Lee
Ho John Lee
Who's That Woman In The Twitter Bot Profile? | Fast Company - http://www.fastcompany.com/3000064...
Bots are like a sorority party at 3 a.m.--a massive compilation of young, pretty faces who talk a lot of nonsense. But the women they portray are actual people, somewhere in this world. Who are they? And how were their photos dislodged from their original place? This is a mostly pointless exercise, I knew: The story behind every photo would be different. And what would one of these women say--that she's flattered to find her face spamming everyone on Twitter? Clearly, no. But it seemed worth doing, if only to tell one story, to have one answer. So I asked Elizabeth's old friend: Did he still know her? He did, he said, though she's since gotten married and changed her name. He promised to pass my message along. After four days of silence, though, I did more sleuthing and found her on Facebook under her married name. Then I emailed my plea: You've become a bot, Elizabeth. Can we talk about it? Silence. Can't say I blame her. So I started over. - Ho John Lee
Ho John Lee
Hype Cycle for Cloud Computing Shows Enterprises Finding Value in Big Data, Virtualization - Forbes - http://www.forbes.com/sites...
"While the hype surrounding cloud computing may have peaked, cloudwashing continues to cause confusion and inflated expectations with enterprise buyers. This just slows down sales cycles, when more straightforward selling could lead to more pilots, sales and a potentially larger market. Cloud vendors who have the expertise gained from delivering cloud platforms on time, under budget, with customer references showing results are starting to overtake those that using cloudwashing as part of their selling strategies." - Ho John Lee
Ho John Lee
AppRights - EFF's 'Mobile User Privacy Bill of Rights' - A Starting Point for Legislation? - http://hankjohnson.house.gov/apprigh...
EFF's Mobile User Privacy Bill of Rights proposes six mobile privacy principles: 1. Individual control: "Users have a right to exercise control over what personal data applications collect about them and how they use it. 2. Focused data collection: Developers of mobile applications should only collect the minimum amount required to provide the service, with an eye towards ways to archive the functionality while anonymizing personal information." 3. Transparency: "Users need to know what data an app is accessing, how long the data is kept, and with whom it will be shared. 4. Respect for context: "Applications that collect data should only use or share that data in a manner consistent with the context in which the information was provided. 5. Security: "Developers are responsible for the security of the personal data they collect and store 6. Accountability: "Ultimately, all actors in the mobile industry are responsible for the behavior of the hardware and software they create - Ho John Lee
Ho John Lee
Starting a Django Project the Right Way - http://www.jeffknupp.com/blog...
Tutorial on setting up a new Django project with virtualenv, git, south, and fabric. - Ho John Lee
Ho John Lee
Troy Hunt: Everything you ever wanted to know about building a secure password reset feature - http://www.troyhunt.com/2012...
Practical anecdotes regarding approaches to online password reset workflows. - Ho John Lee
Ho John Lee
The Pixar Touch - history of Pixar - Blog - Pixar story rules (one version) - http://www.pixartouchbook.com/blog...
storytelling rules from Pixar - Ho John Lee
Other ways to read this feed:Feed readerFacebook