2015 Oct 3, 7:44
Crunching
@nytimes ad analysis: It costs
consumers 16.6x more in data costs than top 50 news sites make on them in mobile ad$
@BenedictEvans
2015 Feb 8, 11:17 2014 Jun 3, 9:10
A high-profile fork: one year of Blink and Webkit
Some stats and analysis at a very high level of the Blink fork from Webkit.
technology browser webkit blink apple google 2012 Sep 19, 6:03
An analysis of leaked PIN numbers.
… nearly 11% of the 3.4 million passwords are 1234 !!!
pin security technical password 2012 Jun 20, 5:05
Far-fetched tales ofWest African riches strike most as comical. Our analysis suggests that is an advantage to the attacker, not a disadvantage. Since his attack has a low density
of victims the Nigerian scammer has an over-riding need to reduce false positives. By sending an email that repels all but the most gullible the scammer gets the most promising
marks to self-select, and tilts the true to false positive ratio in his favor.
humor security scam 2012 Jun 7, 9:12
So this is another Stuxnet by Israel/US?
The analysis reinforces theories that researchers from Kaspersky Lab, CrySyS Lab, and Symantec published almost two weeks ago. Namely, Flame could only have been developed with the backing of a
wealthy nation-state. … “It’s not a garden-variety collision attack, or just an implementation of previous MD5 collisions papers—which would be difficult enough,” Matthew Green, a professor
specializing in cryptography in the computer science department at Johns Hopkins University, told Ars. “There were mathematicians doing new science to make Flame work.”
technical security web internet md5 cryptography flame 2010 Aug 13, 11:46RESTful machine learning API from Google... "The Prediction API implements supervised learning algorithms as a RESTful web service to let you leverage patterns in your data, providing more relevant
information to your users. Run your predictions on Google's infrastructure and scale effortlessly as your data grows in size and complexity."
rest ai google programming analysis machine-learning development technical 2010 Apr 16, 1:08Analysis of a potentially time travelling individual captured in a 40s photo "Reopening of the South Fork Bridge after flood in Nov. 1940".
humor history photo photography time-travel via:boingboing 2010 Feb 22, 5:52Analysis of Facebook friend connections by US cities to determine partitioning of the US.
blog visualization facebook social map geo network graph 2009 Nov 19, 3:46A free tool dynaTrace Ajax provides "full tracing analysis of Internet Explorer 6-8 (including JavaScript, rendering, and network traffic)". Looks pretty too...
ie ie6 ie7 ie8 performance web http html javascript browser technical 2009 Jun 12, 12:20"We have discovered remotely-exploitable vulnerabilities in Green Dam, the censorship software reportedly mandated by the Chinese government. Any web site a Green Dam user visits can take control of
the PC. According to press reports, China will soon require all PCs sold in the country to include Green Dam. This software monitors web sites visited and other activity on the computer and blocks
adult content as well as politically sensitive material."
censorship china hack security internet greendam 2009 Feb 10, 11:22Game theory analysis of the opening scene of Dark Knight.
game-theory analysis economics movie batman 2008 Nov 5, 3:55A graphing library which includes variaous graph visualization algorithms. GNU licensed. "igraph is a free software package for creating and manipulating undirected and directed graphs. It includes
implementations for classic graph theory problems like minimum spanning trees and network flow, and also implements algorithms for some recent network analysis methods, like community structure
search."
reference free development programming visualization graph math library opensource c++ igraph graphviz via:mattb 2008 Oct 27, 1:39Rubber-hose cryptanalysis is first defined by Marcus J. Ranum on Oct 15 1990: "..unless you resort to the rubber-hose technique of cryptanalysis. (in which a rubber hose is applied forcefully and
frequently to the soles of the feet until the key to the cryptosystem is discovered, a process that can take a surprisingly short time and is quite computationally inexpensive)"
humor cryptography rubber-hose security 2008 Oct 13, 10:53"This is an FAQ (Frequently Asked Questions list) for the 2008 United States Presidential Election. I need to disclose up front that I am an Obama supporter. However, with the exception of the very
last question, this FAQ is designed as a collection of factual information (such as the latest poll results) and of analysis that is as objective as possible."
via:kris.kowal politics election obama mccain 2008 Jul 14, 4:37"Neal Stephenson delivered a talk entitled The Fork: Science Fiction versus Mundane Culture at Gresham College." Talk is sort of pop analysis of geeky entertainment. Lots of annecdotal evidence but
interesting ideas anyway.
geek history neal-stephenson scifi fiction literature culture video 2008 Feb 11, 3:05Why major carmakers won't want to participate in the Automotive X Prize, a contest to develop a 100mpg car.
xprize contest blog post analysis car x-prize