2012年11月27日 星期二

Ernesto Sirolli: Want to help someone? Shut up and listen!


- The smartest local people knew better how to solve problem than you; instead of starting initiative, think of how to support their cause.

-> counter case: would it be too small/customized service; impossible to scale? 

- People are important, nobody start company along.



Brené Brown: The power of vulnerability



- Connection: why people can't connect -> shame
- shameful vs. full-hearted: Courage, Compassion, Connection to yourself, Vulnerability

Vulnerability as necessity: the vulnerability to reach out, to trial and fail, to say I love you first, to make attempt.

- been turn down
- been layoff
- initiating sex

You can't selectively turn off (numb) these feeling without numb other good things, too (gratitude);

side effect:
- try to make uncertain certain
- blame, a way to discharge pain and discomfort
- perfect

wired for struggle, but deserved to be loved.

love with our heart, even though there is no guarantee.

2012年11月19日 星期一

Julia Sweeney: Letting go of God





- Age of reason, 7 years old.
- Change of birthday.

- "Did you really believed in that God love you for all his heart?"

2012年11月18日 星期日

David Pizarro: The strange politics of disgust




- feces, urine, blood, vomit, rotten flesh, many sexual act, diseased appearance
 Disgust that has something to do w/ survival.

- Disgust thing touch a clean thing; clean thing become disgust.

- Disgust sensitivity has a general pattern: conservative people are more easily disgust. 







- People who have viewed disgusting things became conservative. (Even if it is just a reminder to wash hands.)


2012年11月17日 星期六

Misha Glenny: Hire the hackers!


- anonymous: hacker who have a political agenda. They are providing a service to prove that security is useless. They are protecting the internet from the government.

- Demand of security vs. Freedom

- Hacker Profiler Project (UN operation)

- CarderPlanet by a group of Ukrainian hackers. Buy sell credit cards info. Supermarket for cyber criminal. Faced Challenge: How do you do business with the hackers?

-> The escrow system: (Stolen Credit Card #) Customer -> Officer -> Vendor (Money)

- 150,000 dollars/ week; not an advance programmer

- Hackers are only one element in the eco system. And the most vulnerable one.

- China and Russian are mobilizing hacker, making them to use.

Relentlessly obsessive about something. Just looking for a chance to work for something good.







Mikko Hypponen: Fighting viruses, defending the net




- The PC virus problem is 25 years old
- Visit the first hackers ever in Pakistan;they got infected themselves, too.

- Online criminal can afford to invest their attack; use around the world.

- You must have something that can works, even when computer fails.
- Invest in backup power, system that works independently from the internet.

- Thinking about backup; thinking about when the service of internet is taken away from you.

- Find the people with the skills but without the opportunity; and give them the opportunity to do good. 

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon


how he analysis what is the target.


- Stuxnet, weapon to attack Iran nuclear facility in Iran 15,000 line of code

- Slowly, creepy, not be able to find it quickly
- Can lead to plant blow up
- Broke spin rate, waste the controller's time

- It turns out that USA develops it, but israelis modify to make it more powerful. It then escape to the target nuclear plan in Iran, and the virus got to the outside world. (more)




- This attack is generic: attack every power plant. Biggest target is USA, euro, JP.


fool input, might lead to a blow up of plant.

use data structure to find where the virus attack

use data structure to find where the virus attack






Avi Rubin: All your devices can be hacked



Take away: With machine learning and C, seems to be able to hack w/ many device's security. There are really important opportunity here.

Use memory overflow.

- Been able to get a virus from your computer
- Implanted medical devices hack

- ICD allows wireless communicate the protocol to the implemented device.

- attack on car: short-range: wifi; long range: cellular network,
- smartphone vibration sensor accelerometer to detect near keyboard tapping ( what about using this as sms input)








- Use machine learning

- PacMan on voting machine

- Need to consider security from the start



David Binder: The arts festival revolution


- Minto, international w/ local art festival.
- Open, transform city and community
- Outdoor world

- Choose 100 people of that city

- Artist help us explore the city.

- "If art is about transformation.."

- a great festival can show us a map of the world, a map of the city and a map of ourselves, but there is no one fixed festival model.





2012年11月16日 星期五

2012年11月15日 星期四

2012年11月14日 星期三

Seth Godin: This is broken





- Not my job
- Selfish Jerks
- The world Changed
- I don't know
- I am not a fish
The person that design, doesn't use it.

- Contradiction
- Broken on purpose
See the brokenness in purpose.
SethGodin@yahoo.com


2012年11月12日 星期一

Jeff Hancock: 3 types of (digital) lies

From TEDxWinnipeg


- Three kinds of deception:


(from Jeff Hancock Speech)

- Butlers: Ambiguity buffer, such as "sorry, my battery is dead" (white lie)
- Sock Puppets: such as: author write own book review (mean to deceive, one person)
- Chinese Water Army: such as: many fake blog reviews (mean to deceive, brought up to scale)

- e-mail is the less lies, phone is the most lies, f2f in the middle.
- resume: paper vs. linkedin (more honest)
- facebook profile: (high correlation btw) four knew and four stranger judge on personality

- online dating: guys lie about height, lie frequently but by little bit

- How to explain why online deception is small?
- We are very bad at detecting lies (54% accuracy)

- We lie for a reason.

- Talking when there was no record.

- Now, all the fake review are staying.

- Fake review w/ algorithm; think about the situation, thus more on "I", and imaginable setting vs. real small details

- Lying online can be very dangerous, do I want to this to be part of my record?


2012年11月11日 星期日

1,000,000,000,000 Frames/Second Photography - Ramesh Raskar


- Trillion Frames per second; Femto Photography, it can capture light.
- The light bounce inside tomato.

- Expose many light on the object, scatter in all direction, GB of information integrate together. Tiny photons that come back.

Next area of imaging, not about mega pixel, but about time.

2012年11月8日 星期四

Gary Greenberg: The beautiful nano details of our world


- Beautiful Science. What we can see in very very small scale.
- The grain of sand are beautiful
- Three dimension microscope: easy to loose focus on small scale, need to take many different picture. And put them together using a program.

- "To see a world, in a grain of sand, And a heaven in a wild flower.
Hold infinity in your hand, and eternity in one hour." William Blake


(Photo from Gary Greenberg TED speech)


2012年11月5日 星期一

Benjamin Zander: The transformative power of classical music



- Classical Music
- The impulse is reduced; 6-> 11 years one-buttock playing
- Maybe it's not the audience, is the player

- One-buttock play, is the vision

- Why I am clapping, 7th grade kids said: "Because we were listening"

- How would you be, talk for "moving everybody love classical music" vs.  "moving 3% -> 4% to love classical music"

- My job is silence, and to awaken possibility with other people.

- If the eyes are not shinning, you get to ask: "Who am I being, that my players' eyes are not shining?"

- Definition for success: how many shining eyes around me?

- "I will never say anything, that couldn't stand at the last thing that I have ever said."


Takeaway:

That is how a video about passion should be, the speaker should be so full of passion, that there are many spillover on the audience. A evangelist that can't wait to convert everyone into.

I can't remembered a more passionate TED talk.


Malcolm Gladwell:The strange tale of the Norden bombsight




- It is machine that spent US$ 1.5 billion in WW II to developed (as compared to 3 billion in Manhattan project)
- A device to drop bomb from the air with precision (in practice).
- Only works Cloudless sky, low speed, low attitude.
- 750 acre chemical plant, 85,000 bombs only 10% lands, with 16% didn't go off.
- Many gadgets that claims to be Norden bombs, but it actually means very little: it solves the wrong problem.
- Droid killing in war was 95% effective, but suicide bombing increase 1000%.

Takeaway: 
Be flexible, change your way of attacking a problem. Be careful of metrics and KPI.








2012年11月1日 星期四