52-card Psycho

There are exactly 52 playing cards in a standard deck. There are also exactly 52 shots in the famous shower scene in Alfred Hitchcock’s movie Psycho. From this amazing coincidence comes 52 Card Psycho, a new augmented-reality experimental film piece my brother recently designed in collaboration with the Future Cinema Lab at York University:

52 Card Psycho is an installation-based investigation into cinematic structures and interactive cinema viewership; the concept is simple: a deck of 52 cards, each printed with a unique identifier, are replaced in the subject’s view by the 52 individual shots that make up Hitchcock’s famous shower scene in Psycho. The cards can be manipulated by the viewer: stacked, dealt, arranged in their original order or re-composed in different configurations, creating spreads of time, and allowing a material interaction with the ‘cinema screen’— an object which normally is removed and exalted, and unchangeable in its linearity.

52-card Psycho Read More »

New York Times is developing an API

This may be old news, but it looks like the New York Times is developing an API for accessing their content:

The goal, according to Aron Pilhofer, editor of interactive news, is to “make the NYT programmable. Everything we produce should be organized data.”

Once the API is complete, the Times’ internal developers will use it to build platforms to organize all the structured data such as events listings, restaurants reviews, recipes, etc. They will offer a key to programmers, developers and others who are interested in mashing-up various data sets on the site. “The plan is definitely to open [the code] up,” Frons said. “How far we don’t know.”

Pilhofer and Frons both declined to give any specific dates, but Pilhofer said the API itself will be done “within a matter of weeks.” In the next six months, “we’ll have some of the major pieces — a restaurant guide, weekend events listings and books,” Frons added.

(Link by way of the IdeaLab Blog.)

New York Times is developing an API Read More »

Articles on the future of search

John Battelle (John Battelle’s Searchblog) and Danny Sullivan (Search Engine Land) are writing a series of posts on The Future of Search. From the first post:

What I find interesting are entirely new approaches to the interface of search. What happens when search is no longer driven by the command line and the blinking cursor? What happens when, for example, your query is informed by where you happen to be, or who you happen to be, or what you happen to be doing at the time of the request? To explore these ideas, it’s best to step outside the current box of a web browser on your PC, and think about mobility.

As Battelle says in his announcement the themes will look familiar to folks who’ve been following search for a while, but it should be an interesting series regardless.

Articles on the future of search Read More »

Microsoft builds tool to steal data off computers

From the “what could possibly go wrong” department, Microsoft just announced that they’ve developed a simple one-button tool to break into a computer and suck down an entire hard drive’s contents onto a thumb drive:

COFEE, a preconfigured, automated tool fits on a USB thumb drive. Prior to COFEE the equivalent work would require a computer forensics expert to enter 150 complex commands manually through a process that could take three to four hours. With COFEE, you simply plug into a running computer to extract the data with the click of one button –completing the work in about 20 minutes.

It’s basically a whole bunch of existing password guessers and other cracking software into a single one-touch device — and since it works on the live computer it can bypass encrypted disks like Vista’s BitLocker so long as the user is still logged in.

Apparently Microsoft isn’t concerned that they’re building tools that can turn any two-bit felon into a highly-skilled data thief, or that they’re providing products that exploit their very own security holes. After all, they’re only supplying these devices to law enforcement — so what could possibly go wrong?

Microsoft builds tool to steal data off computers Read More »

Calculating the Birthday Paradox

For the last couple years I’ve been working on a program that generates a large number of essentially random ID strings (it’s actually a replicated document storage system that uses the hash of a file’s content as its ID, but the details don’t matter). Since IDs are independently generated there will always be some chance that two different files will just happen to have the same ID assigned — so how long do I need to make my ID string before that probability is small enough that I can sleep at night?

This is essentially the Birthday Paradox, just with bigger numbers and in a different form. For those who haven’t heard of it, the canonical form of the Birthday Paradox asks what the probability is that, out of a random group of 23 people, at least two in share the same birthday. (The “paradoxical” part is that the answer is just over 50%, much higher than most people’s intuition would suggest.) My question just turns that around and asks “how many random N-bit IDs have to be generated before there is a one in a million chance of any two of them being identical?”

Rejiggering the formulas given in Wikipedia, here’s the approximation:

n ≅ (-2 · S · ln(1 – P))1/2

where:

  • n is the number of entities required to reach the given probability
  • P is the probability desired
  • S is the size of the set of all possible entities

For example, the number of people you would need for a 50% chance that at least two of them have the same birthday is (-2 · 365 · ln(1/2))1/2, or between 22 and 23 people. As a more practical example, you would only need to generate 77,163 PGP keys before having a 50% chance of a collision between their 8-character short-form fingerprints.

As for my one-in-a-million chance, you’d need to randomly generate roughly 2(N – 19)/2 N-bit strings before having a one-in-a-million chance of a collision, which means I would need to randomly generate around 270 of my 160-bit ID strings before there would be a one-in-a-million chance of having a collision. I think I can sleep at night.

Calculating the Birthday Paradox Read More »

iPhone fix: blow out the lint

Here’s a simple iPhone fix that others may appreciate. A few weeks ago my microphone started to cut out — I could listen to music over the headphones, but with both pairs of earbuds the microphone would cut out, and disconnecting and reconnecting them would cause the call to drop. I finally took it to the Genius Bar today and they immediately took out an otoscope and discovered that the hole where the headphone jack fits in was filled with pocket lint! One quick burst of compressed air later and it was working perfectly again! (Apparently they get this problem a lot, as they’ve got a special mini-jack attachment for their compressed air can.)

A nice side effect was he noticed the screen’s hairline crack I’d gotten when the phone fell out of my pocket. From all I’d read on the Net I thought I’d have to pay $250 to have that repaired, but he said so long as it was just a single hairline crack and there was no damage to the case itself they could do a warranty replacement — five minutes later I was walking out of the store with a fresh-out-of-the-box iPhone.

iPhone fix: blow out the lint Read More »