Microsoft looking into just-in-time information retrieval

Last night I finally got around to watching Microsoft’s Comdex presentation, specifically the section where Susan Dumais shows off her new search technology “Stuff I’ve Seen.” (Search for “switch gears” at the bottom of the transcript or go to 1:07:50 on the video.)

Most of Stuff I’ve Seen is concentrating on the problem of quickly indexing and searching your entire hard drive, regardless of media format. (I sometimes jokingly refer to projects like this as YAPIM, or Yet Another Project Invoking Memex, my own thesis work fitting that description as well.) However, the part that interests me most is what they’re calling implicit query. As CNET describes the Comdex demo:

In demonstrating Implicit Query, Dumais began to type an e-mail asking a colleague about a set of slides for an upcoming conference. Before the message was complete, the program — which appears in a window on the side of the screen — pulled up e-mails, slide decks and Word documents containing the name of the conference and the future recipient. Each hit came with a brief summary of the internal content, date, the type of software the file was written in, and its potential relevance, among other information.

This is the same functionality that in my PhD I call Just-In-Time Information Retrieval, and is the main focus of the Remembrance Agent software I developed. It can be incredibly powerful (I use it regularly to suggest email discussions related to my blog entries, for example) and I hope Dumais pursues it. It looks like she’s still in early stages with the concept though, and and more importantly the current interface is still designed for explicit query — far too intrusive for something that runs all the time in the background. By contrast, Autonomy has had an actual product in this area for over three years, though I’d say the interface is still the real trickiness for this kind of application. Still, as is often the case one of the more interesting aspects of Microsoft doing something is that it’s Microsoft doing it. If implicit query makes it into a future version of the OS (and if MS doesn’t screw it up they way they did with that annoying paperclip) that’ll be quite interesting.

References

Microsoft looking into just-in-time information retrieval Read More »

I got the horse right here, reloaded

Back in July there was a big scandal over DARPA’s funding of a futures market where people bet on things like whether Arafat will be assassinated or when the US will pull out of Iraq. The project was canceled, and also became the straw that forced John Poindexter’s resignation. Now the Guardian reports that San Diego-based Net Exchange, the company that was implementing the project, is going ahead and launching it without government support or involvement. Given the previous uproar, Net Exchange is being understandably quiet about the whole thing.

Personally I’d be happy to see them try this out. As I said before, the U.S. Government shouldn’t be involved in something as shady as gallows gambling, but as a private experiment the whole thing intrigues me and I don’t have a problem with seeing where it goes. My guess is it will wind up being an interesting past-time for armchair analysts, but like most markets will fluctuate far too much to provide any real security data. The only real danger I see is if the stakes get high (unlikely) and attract corruption — unlike sports gambling or its Wall-Street counterpart, Middle-East politics has neither conflict-of-interest nor insider-trading laws. The more likely danger is simple lack of interest, the risk all seemed-like-a-good-idea-at-the-time Internet projects face.

References

I got the horse right here, reloaded Read More »

Trusted Computing

I’ve finally gotten around to reading up on Trusted Computing (a process that, ironically enough, was interrupted by my being rootkitted a couple of weeks ago). I’d heard some pretty unsettling things about trusted computing, but now that I’ve done some digging… well it’s still pretty disturbing.

Trusted Computing (TC) is one of several names for a set of changes to server, PC, PDA and mobile phone operating systems, software and hardware that will make these computers “more trustworthy.” Microsoft has one version, known as Palladium or Next Generation Secure Computing Base (NGSCB), and an alliance of Intel, Microsoft, IBM, HP and AMD known as the Trusted Computing Group has a slightly different one called either trusted computing, trustworthy computing, or “safer computing.” Some parts of Trusted Computing are already in Windows XP, Windows Server 2003, and the in the hardware for the IBM Thinkpad, and many more will be in Microsoft’s new Longhorn version of Windows scheduled for 2006.

The EFF has a nice introduction to trusted computing systems, written by Seth Schoen, and Ross Anderson has a more detailed and critical analysis. A brief summary of the summary is that a trusted computer includes tamper-resistant hardware that can cryptographically verify the identity and integrity of the programs you run, verify that identity to online “policy servers,” encrypt keyboard and screen communications, and keep an unauthorized program from reading another program’s memory or saved data. The center of this is the so-called “Fritz” chip, named after Senator Fritz Hollings of South Carolina, who tried to make digital rights management a mandatory part of all consumer electronics. (He failed and is retiring in 2004, but I’ve no doubt there will be attempts to pass similar laws in the future.)

When most people think about computer security they think about virus detectors, firewalls and encrypted network traffic — the computer analogs to burglar alarms, padlocks and opaque envelopes. The Fritz chip is a different kind of security, more like the “political officer” that the Soviet Union would put on every submarine to make sure the captain stayed loyal. The whole purpose of the Fritz chip is to make sure that you, the computer user, can’t do anything that goes against the policies set by the people who wrote your software and/or provide you with web services.

There are many people who would like such a feature. Content providers such as Disney could verify that your version of Windows Media Player hasn’t had digital rights management disabled before sending you a decryption key for a movie. Your employer could prevent email from being printed or read on non-company machines, and could automatically delete it from your inbox after six months. Governments could prevent leaks by doing the same with sensitive documents. Microsoft and AOL could prevent third-party instant-message software from working with the MSN or AIM networks, or lock-in customers by making it difficult to switch to other products without losing access to years worth of saved documents. Game designers could keep you from cheating in networked games. Distributed computing and mobile agents programs could be sure their code isn’t being subverted or leaked when running on third-party systems. Software designers could verify that a program is registered and only running on a single computer (as Windows XP does already), and could even prevent all legitimate trusted computers from reading files encrypted by pirated software. Trusted computing is all about their trust, and the person they don’t trust is you.

End users do get a little bit of “trust” out of trusted computing, but not as much as you might think. TC won’t stop hackers from gaining access to a system, but it could be used to detect rootkits that have been installed. TC also won’t prevent viruses, worms or Trojans, but it can prevent them from accessing data or keys owned by other applications. That means a program you download from the Internet won’t be able to email itself to everyone in your (encrypted) address book. However, TC won’t stop worms that exploit security holes in MS Outlook’s scripting language from accessing your address book, because Outlook already has that permission. In spite of what the Trusted Computing Group’s backgrounder and Microsoft’s Palladium overview imply, TC won’t help with identity theft or computer thieves physically accessing your data any more than current public key cryptography and encrypted file systems do.

As long as you agree with the goals of the people who write your software and provide your web services, TC isn’t a bad deal. After all, most people don’t want people to cheat at online games and can see the value of company email deletion policies. The same can be said of the political officer on Soviet submarines — they were great as long as you believed in what the Communist Party stood for. And unlike Soviet submarine commanders, you won’t get shot for refusing to use TC on your computer. Your programs will still run as always, you just won’t be able to read encrypted email from your customers, watch downloaded movies, or purchase items through your TC-enabled cellphone. Some have claimed that this is how it should be, and that the market will try out all sorts of agreements and those that are acceptable to both consumers and service providers will survive. That sounds nice in theory, but doesn’t work when the market is dominated by a few players (e.g. Microsoft for software, wireless providers for mobile services, and the content cartel for music and movies) or when there are network externalities that make it easy to lock in a customer base (e.g. email, web, web services and electronic commerce). What choice will you have in wordprocessors if the only way you can read memos from your boss is by using MS Word? What choice will you have in stereo systems when the five big record companies announce that new recordings will only be released in a secure-media format?

Of course, even monopolies respond to strong enough consumer push-back, but as Ross Anderson points out there are subtle tricks software and service providers can pull to lock in unwary consumers. For example, a law firm might discover that migrating years of encrypted documents from Microsoft to OpenOffice requires sign-off for the change by every client that has ever sent an encrypted email attachment. That’s a nasty barrel to be over, and the firm would probably grudgingly pay Microsoft large continuing license fees to avoid that pain. These kinds of barriers to change can be subtle, and you can bet they won’t be a part of the original sales pitch from Microsoft. But then what do you expect when you invite a political officer into your computer?

References

Trusted Computing Read More »

Wearable Computing Conference Highlights

Just got back from the 7th IEEE International Symposium on Wearable Computers. As always, the subjects spanned several fields including augmented reality, machine perception, biosensors, fashion design and ergonomics, human-computer interaction, textiles, and systems. I’ll post a link to a full trip report in a few days, but here are a few highlights:

  • Implantables (keynote): it’s always nice when a keynote can do a conference one better, and that was certainly the case this year. Dr. Michael Okun, co-director of the University of Florida Movement Disorders Center, discussed and showed videos from his work on surgical treatment of Parkinson’s disease and other movement disorders using deep brain stimulator therapy (DBS). Okun and his colleague probe deep inside a fully awake patient’s brain with a micrometer lead and start “listening” to individual neuron firings to tell what part of the brain they’re probing. The target is the part of the brain that controls motion for the body part experiencing tremors — a spot about the size of a small pea. Then they insert a deep-brain lead attached to an embedded pacemaker-like device that sits in the chest. The device emits electrical pulses that change the pattern with which the neurons fire, and within seconds the patient’s tremor stops. The videos he showed were almost like magic; you can literally turn on and off a person’s tremor using a remote control.

    Even more thought-provoking is that when you move the deep-brain lead you can affect not just other motor functions but also cognition and emotions. Some of the videos he showed were of patients with slightly misplaced electrodes (placed by other labs). Depending on where the electrode has been placed, activation can induce face twitches, contralateral (one-sided) smiling, giggling and laughter, crying attacks, manic attacks, euphoria, severe depression, fear or anxiety. Some patients would cry while experiencing a sudden overwhelming feeling of sadness, while others would go into a fit of uncontrollable sobbing but have no feeling of sadness at all. To see all these effects induced with what looks like a normal TV remote is rather amazing, as is the thought that Okun thinks such techniques might one day be used to treat affective disorders, severe depression, or possibly even conditions like obsessive-compulsive disorder.

  • Memory Glasses: Last year Rich DeVaul presented a poster on some preliminary work showing that he could successfully cue people’s memory by displaying subliminals on a head-up display. The idea is that such a system might be used as a “zero attention memory aid,” designed to help a person remember names, facts or conversations without the additional cognitive load usually required. This year he presented a more complete study that bears out his hypothesis: subjects did about 1.5 times better on a match-names-to-faces recall test when they had subliminal cuing with names than when they didn’t have cuing. Even more intriguing, when subjects were given an incorrect subliminal cue (a name that matches a different face), they still did slightly better at remembering the correct name, presumably because the subliminal primed the memorization process as a whole even if it didn’t prime the specific name. This secondary effect was not quite statistically significant (p = 0.06) but if real it might mean that the subliminal only needs to be related to an event to have a positive effect. For example, you might better remember a conversation with your boss just by having a subliminal flashback of an image of what he was wearing at the time.

  • Sociometer: The real structure of a business isn’t the official organization chart but the informal network of who communicates with whom. In the late 1980s Olivetti and Xerox PARC used their active badge technology to explore some aspects of these networks, but Tanzeem Choudhury is taking it several steps further with active badges that can not only map out who talks to whom (using infrared beacons) but also the style of turn-taking that is used in a conversation (using microphones). Through this she’s able to, for example, determine who has more social prestige in a group by who modifies his or her speech patterns to match the other person in a conversation.

Wearable Computing Conference Highlights Read More »

New iPod Accessories

Just in case anyone was still in doubt that Apple’s iPod is going to slowly grow into a universal portable media server, Apple has just announced several new iPod accessories, including a voice recorder (microphone to turn the iPod into a dictaphone) and media reader (accepts various media cards and slurps the data onto the hard drive for later retrieval). The iPod isn’t the first hard-drive based MP3 player to offer these extras (Archos has had one for a while), but Apple goes one step further with automatic synchronization of recorded audio and stored pictures with iTunes and iPhoto respectively. Now if they can just add Bluetooth the iPod will be well on its way to becoming the personal server it’s destined to become.

New iPod Accessories Read More »

It was just a matter of time…

I just got my first automated blog-comment spam, attached to my post about artificial diamonds (I’ve since deleted it). Interestingly enough, the spam wasn’t meant for me or my readers but for Google — it was just random snatches of English peppered with the word “jewelry” and links to http://jewelry.lstor.com/, which produces more random phrases. No doubt the idea is to raise the pagerank of some real page that will go there later.

Wonder if this is what they mean when all those spammers keep telling me they can raise my Google ranking?

It was just a matter of time… Read More »

Thoughts on the recall…

When the California recall started I saw it as an end-run around the Democratic process and a way for Republicans to do over an election they lost. I’ve changed my mind. However the recall started, it ended as a clear message from the people of California.

Some statistics helped put this in perspective for me. First, an LA Times exit poll reports that 25% of self-described liberals and 30% of Democrats voted in favor of the recall. (Annoying but free registration required for that link — may I suggest username cypherpunks22, password cypherpunks.) A fifth of Democrats, more than 40% of independents and 69% of conservatives voted for Schwarzenegger.

As for this being a do-over of an election that was already won, the people of California (myself included) were not very happy about the choices we got in that election. Democrats were stuck with an unpopular incumbent, and Republicans were egged on by Davis himself to nominate a candidate too far from center to be electable. Our dissatisfaction in that election was demonstrated by the lowest voter turnout on record and a full 3% of voters leaving the governor slot blank. To quote Jim Hightower, if the Gods had meant us to vote they would have given us candidates.

That said, I think Davis was a scapegoat for a much broader problem with how California is being run. As Governor he gets the spotlight, but blame goes to all. To Davis for not leading through force of personality and bully pulpit in times of crisis. To our partisan legislature for gridlock, sweetheart deals and gerrymandering of districts to offer safe havens for both Democrat and Republican incumbents. To previous administrations and legislatures for screwing up our energy deregulation process, and the Federal government for failing in their energy oversight. And to us, the citizens of California, for letting them get away with it and for misguided or poorly written initiatives like Prop. 13 and term limits that keep our system from running as it should.

Now with record voter participation, we have thrown the bum out and replaced him with an unknown. Incumbents throughout the state are no doubt aware that the anger directed against Davis will focus on others unless things change. I hope our new Governor will be able to leverage this mandate for change to turn things around before that happens, for all our sakes.

References

Thoughts on the recall… Read More »

Remember to vote if you’re in CA

Don’t forget to go vote today if you live in California.

And just so I don’t leave this ludicrous affair without a single post, Schwarzenegger yesterday said he would address all charges of sexual harassment in detail after the election.

He has also promised that after the election is over he will start answering questions from non-entertainment California press, debate (former) opposing candidates without requiring questions be given in advance, and start forming a policy.

Remember to vote if you’re in CA Read More »

Misperceptions, the Media and the Iraq War

The Program on International Policy Attitudes at the University of Maryland and Knowledge Networks have just released a report that sheds a lot of light on the much-reported polls that show Americans have serious misconceptions about the facts surrounding the Iraq War. (PIPA’s press release and questionnaire are also available).

At the heart of the PIPA study are three questions:

  • Is it your impression that the US has or has not found clear evidence in Iraq that Saddam Hussein was working closely with the al Qaeda terrorist organization?
  • Since the war with Iraq ended, is it your impression that the US has or has not found Iraqi weapons of mass destruction?
  • Thinking about how all the people in the world feel about the US having gone to war with Iraq, do you think the majority of people favor the US having gone to war?

The answers, by the way, are “no clear evidence has been found,” “no weapons of mass destruction have been found,” and “the majority of people in the world do not favor the US having gone to war.” If you got at least one wrong don’t feel too bad: only 30% of people surveyed in three polls (June, July, and August-September) got all three correct.

The report is well worth reading, but here’s a brief summary of their findings:

Misperceptions, the Media and the Iraq War Read More »

NeoMedia coming out with portable price-checker

NeoMedia has just announced a service where you can take a picture of an ISBN code (the barcode printed on every book jacket) with a cellphone camera and be automatically brought the the Amazon.com page for that book. From their press release:

“Now, shoppers can take out their Nokia(R) 3650 camera phone at Barnes & Noble, Border’s, or just about any other book store, and just take a picture of the ISBN on the book to comparison shop at Amazon.com right on the screen of their wireless Web browser,” Jensen said. “It’s kind of a high-tech version of the Santa Claus at Macy’s(R) sending Christmas shoppers to Gimbels in the classic movie, ‘Miracle on 34th Street’,” he mused.

Gizmodo suggests this is Barnes & Noble’s worst nightmare, but I expect it won’t hurt the large chains, as their volume keeps prices fairly close to Amazon’s as it is. It’ll be harder on independent bookstores, but even then there’s a premium that people are willing to pay for a book that’s already in their hot little hands. That premium will be even larger than the usual amount people will pay for bricks-and-mortar convenience because the customer is already in the store — I expect a lot more.

The biggest question for me is whether “now is the time.” I first saw this kind of technology about 6 years ago, both in a class project at MIT and in Anderson Consulting’s (now Accenture‘s) Shopper’s Eye project, and even briefly looked at doing a startup in this area just before the crash. It never quite felt like the time was right for this to go mainstream because the technology wasn’t in the hands of enough consumers. Clearly NeoMedia thinks we’re getting close.

References

NeoMedia coming out with portable price-checker Read More »