machine readable

234 results back to index


Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data by Leslie Sikos

AGPL, Amazon Web Services, bioinformatics, business process, cloud computing, create, read, update, delete, Debian, en.wikipedia.org, fault tolerance, Firefox, Google Chrome, Google Earth, information retrieval, Infrastructure as a Service, Internet of things, linked data, machine readable, machine translation, natural language processing, openstreetmap, optical character recognition, platform as a service, search engine result page, semantic web, Silicon Valley, social graph, software as a service, SPARQL, text mining, Watson beat the top human players on Jeopardy!, web application, Wikidata, wikimedia commons, Wikivoyage

A personal description extracted from RDF and displayed on a web page 22 Chapter 2 ■ Knowledge Representation Figure 2-4. A graph generated from an RDF file While such machine-readable RDF files are useful, their primary application is data modeling, so the RDF files are separate from the markup of your web site. You can add structured data directly to the markup, such as (X)HTML5, by using machine-readable annotations, which can be processed by semantic data extractors and, if needed, converted into RDF. Machine-Readable Annotations There are four machine-readable annotation formats for web sites (by order of introduction): • Microformats, which publish structured data about basic concepts,1 such as people, places, events, recipes, and audio, through core (X)HTML attributes • RDFa, which expresses RDF in markup attributes that are not part of the core (X) HTML vocabularies • HTML5 Microdata, which extends the HTML5 markup with structured metadata (a HTML5 Application Programming Interface) • JSON-LD, which adds structured data to the markup as JavaScript code RDFa and JSON-LD can be used in most markup language versions and variants, while HTML5 Microdata can be used in (X)HTML5 only.

Without context, the information provided by web sites can be ambiguous to search engines. 3 This is only supported in (X)HTML5. 3 Chapter 1 ■ Introduction to the Semantic Web Figure 1-3. Traditional web site contents are meaningless to computers The concept of machine-readable data is not new, and it is not limited to the Web. Think of the credit cards or barcodes, both of which contain human-readable and machine-readable data (Figure 1-4). One person or product, however, has more than one identifier, which can cause ambiguity. Figure 1-4. Human-readable and machine-readable data 4 Chapter 1 ■ Introduction to the Semantic Web Even the well-formed XML documents, which follow rigorous syntax rules, have serious limitations when it comes to machine-processability.

Accessed 18 January 2015. 11 Chapter 2 Knowledge Representation To improve the automated processability of web sites, formal knowledge representation standards are required that can be used not only to annotate markup elements for simple machine-readable data but also to express complex statements and relationships in a machine-processable manner. After understanding the structure of these statements and their serialization in the Resource Description Framework (RDF), the structured data can be efficiently modeled as well as annotated in the markup, or written in separate, machine-readable metadata files. The formal definitions used for modeling and representing data make efficient data analysis and reuse possible. The three most common machine-readable annotations that are recognized and processed by search engines are RDFa (RDF in attributes), HTML5 Microdata, and JSON-LD, of which HTML5 Microdata is the recommended format.


pages: 282 words: 28,394

Learn Descriptive Cataloging Second North American Edition by Mary Mortimer

California gold rush, clean water, corporate governance, deskilling, illegal immigration, machine readable, Norman Mailer

., a set of slides and an audiocassette LCMARC Library of Congress machine-readable cataloging format leader Top line of a MARC record that gives information about the record to the computer program that processes it leaf A sheet of paper consisting of two pages, one on each side legend Bytes 6-9 of the MARC leader GLOSSARY 273 limited edition An edition in which a restricted number of copies is printed, often more expensively produced than a regular edition logical record length The length of a self-contained MARC record machine-readable Needing a computer to process or interpret Machine-Readable Bibliographic Information Committee machine-readable cataloging See MARBI See MARC main entry The principal entry in a catalog that contains the complete record of an item manuscript A hand-written or typescript document map A representation, normally to scale, of an area of the earth’s surface or another celestial body MARBI Machine-Readable Bibliographic Information Committee. North American committee that revises and develops the MARC format MARC Machine readable cataloging. A system developed by the Library of Congress in 1966 so that libraries can share machine-readable bibliographic data MARC 21 The MARC format created by harmonizing USMARC and CANMARC; increasingly becoming the world standard for bibliographic data mark of omission masthead Punctuation mark showing something has been left out ...

., a set of slides and an audiocassette LCMARC Library of Congress machine-readable cataloging format leader Top line of a MARC record that gives information about the record to the computer program that processes it leaf A sheet of paper consisting of two pages, one on each side legend Bytes 6-9 of the MARC leader GLOSSARY 273 limited edition An edition in which a restricted number of copies is printed, often more expensively produced than a regular edition logical record length The length of a self-contained MARC record machine-readable Needing a computer to process or interpret Machine-Readable Bibliographic Information Committee machine-readable cataloging See MARBI See MARC main entry The principal entry in a catalog that contains the complete record of an item manuscript A hand-written or typescript document map A representation, normally to scale, of an area of the earth’s surface or another celestial body MARBI Machine-Readable Bibliographic Information Committee.

What would you consult if you were unsure about the difference between a leaf, a plate and a page? Chapter 5 MARC (CatSkill—module 5) Introduction MARC stands for MAchine Readable Cataloging. The description and headings of all items in the catalog are created according to the Anglo-American cataloguing rules. Coding into MARC format is simply transcribing the description and headings into a form that a computer system can read and manipulate. In the 1960s, librarians at the Library of Congress began work on a system for distributing cataloging information in machine-readable form. The Library of Congress, in consultation with other libraries, developed a standard format for recording cataloging information on computer tape.


pages: 283 words: 78,705

Principles of Web API Design: Delivering Value with APIs and Microservices by James Higginbotham

Amazon Web Services, anti-pattern, business intelligence, business logic, business process, Clayton Christensen, cognitive dissonance, cognitive load, collaborative editing, continuous integration, create, read, update, delete, database schema, DevOps, fallacies of distributed computing, fault tolerance, index card, Internet of things, inventory management, Kubernetes, linked data, loose coupling, machine readable, Metcalfe’s law, microservices, recommendation engine, semantic web, side project, single page application, Snapchat, software as a service, SQL injection, web application, WebSocket

It combines the idea of easy documentation generation using Markdown with a structure that makes it machine-readable for supporting code generation and other tooling needs. Since API Blueprint is based on Markdown, any tool capable of rendering and editing files using the Markdown format, including developer IDEs, is able to work with this format. While the ecosystem of tooling isn’t as vast as OAS, it does have considerable community support due to the pre-acquisition efforts of Apiary. As Listing 13.2 shows, it is easy to work with and therefore a popular choice for those seeking to combine Markdown-based documentation alongside a machine-readable API description format.

Keith Casey</doc> </descriptor> </descriptor> </descriptor> </alps> * * * Improving API Discovery Using APIs.json There are multiple API description formats that may be necessary to help developers consume the API using various tools. APIs.json is a description format that assists in API discovery through a machine-readable index file. It is similar to a site map for a website that helps direct search engine indexers to important areas of the website. A single APIs.json file may reference multiple APIs, making this format useful for bundling multiple, separate API description files into a single product or platform view. When combined with other machine-readable formats, APIs may be discovered, indexed, and made available within public or private API catalog. As the name indicates, the default format is JSON although the YAML-based format, shown in Listing 14.6, is also available.

Using a tool that is only provisioned for a subset of the organization is not recommended. Figure 6.2 shows a template that is easy to read and fits both spreadsheet and document formats. Figure 6.2 A template for capturing API profiles in a spreadsheet or document. What About Using the OpenAPI Specification (OAS)? The OpenAPI Specification (OAS) is a machine-readable format used to capture the description of REST-based and RPC-based APIs. The format was designed to aid in the generation of API reference documentation and boilerplate code. As such, the OAS structure is rooted in URL paths. Since API modeling is prior to a complete API design that includes resource paths, OAS isn’t an appropriate format for API profiles.


The Data Journalism Handbook by Jonathan Gray, Lucy Chambers, Liliana Bounegru

Amazon Web Services, barriers to entry, bioinformatics, business intelligence, carbon footprint, citizen journalism, correlation does not imply causation, crowdsourcing, data science, David Heinemeier Hansson, eurozone crisis, fail fast, Firefox, Florence Nightingale: pie chart, game design, Google Earth, Hans Rosling, high-speed rail, information asymmetry, Internet Archive, John Snow's cholera map, Julian Assange, linked data, machine readable, moral hazard, MVC pattern, New Journalism, openstreetmap, Ronald Reagan, Ruby on Rails, Silicon Valley, social graph, Solyndra, SPARQL, text mining, Wayback Machine, web application, WikiLeaks

With all those great technical options, don’t forget the simple options: often it is worth it to spend some time searching for a file with machine-readable data or to call the institution that is holding the data you want. In this chapter we walk through a very basic example of scraping data from an HTML web page. What Is Machine-Readable Data? The goal for most of these methods is to get access to machine-readable data. Machine-readable data is created for processing by a computer, instead of the presentation to a human user. The structure of such data relates to contained information, and not the way it is displayed eventually. Examples of easily machine-readable formats include CSV, XML, JSON, and Excel files, while formats like Word documents, HTML pages, and PDF files are more concerned with the visual layout of the information.

Speaking to experienced data journalists and journalism scholars on Twitter it seems that one of the earliest formulations of what we now recognize as data journalism was in 2006 by Adrian Holovaty, founder of EveryBlock, an information service that enables users to find out what has been happening in their area, on their block. In his short essay “A fundamental way newspaper sites need to change”, he argues that journalists should publish structured, machine-readable data, alongside the traditional “big blob of text”: For example, say a newspaper has written a story about a local fire. Being able to read that story on a cell phone is fine and dandy. Hooray, technology! But what I really want to be able to do is explore the raw facts of that story, one by one, with layers of attribution, and an infrastructure for comparing the details of the fire with the details of previous fires: date, time, place, victims, fire station number, distance from fire department, names and years experience of firemen on the scene, time it took for firemen to arrive, and subsequent fires, whenever they happen.

But what makes this distinctive from other forms of journalism that use databases or computers? How, and to what extent is data journalism different from other forms of journalism from the past? Computer-Assisted Reporting and Precision Journalism Using data to improve reportage and delivering structured (if not machine-readable) information to the public has a long history. Perhaps most immediately relevant to what we now call data journalism is computer-assisted reporting, or CAR, which was the first organized, systematic approach to using computers to collect and analyze data to improve the news. CAR was first used in 1952 by CBS to predict the result of the presidential election.


The Card Catalog: Books, Cards, and Literary Treasures by Library Of Congress, Carla Hayden

In Cold Blood by Truman Capote, index card, information retrieval, Johannes Kepler, late fees, machine readable, W. E. B. Du Bois

Avram, who joined the Library of Congress in 1965. Avram hastily evaluated the card catalog and devised the first automated cataloging system in the world, known as Machine-Readable Cataloging (MARC). Launched in January 1966, MARC attempted to both convert and manipulate the data stored on a catalog card. Representatives from sixteen libraries were invited to participate in its development, and the collaboration yielded approximately 50,000 machine-readable records containing information for English-language books. Stored on magnetic tape, these catalog records, which incorporated the standard classification scheme, could be searched at a computer terminal.

., 12 L L’Enfant, Pierre Charles, 46 La Fontaine, Henri, 161 Leypoldt, Frederick, 87 Library Bureau, 84 Library Company of Philadelphia, 46 Library Journal, 84, 87, 147, 148, 151 Library of Babel, 9 Library of Congress, 7, 82, 87, 102, 112, 146 M Machine-Readable Cataloging (MARC), 113, 152, 158 Madison, James, 46, 49 Mann, Thomas, 157 MARC. See Machine-Readable Cataloging Martel, Charles, 108 McKinley, William, 108 Mearns, David, 102 Meehan, John Silva, 79 Mercier, Barthélemy, 21 Mesopotamia, 12 Monroe, James, 49 Morrill, Justin, 104 movable type, 18 Mumford, Lawrence Quincy, 152, 154 N National Constituent Assembly, 21 National Library, 113 New York Public Library, 147, 154 New York State Library School Handbook, 111 New Yorker, The, 159 Nippur, 12 O Odyssey, 12 Online Public Access Catalog (OPAC), 154 Otlet, Paul, 161 P Pandectae, 18 pantographic card-punching machine, 151 paper slip, 82 papyrus, 13 Pearce, James A., 102 Pelz, Paul J., 104 Pinakes, 14, 50 Poor Richard’s Almanack, 57 printing press, 18–19 Proulx, Annie, 156 Publishers Weekly, 87 Putnam, Herbert, 7, 82, 107, 112, 146 Q Qin dynasty, 15 R Rather, John, 159 reeds, 12 Report of the Librarian, 106 Rider, Fremont, 148, 155 Roman Catholic Church, 17, 20 Roosevelt, Theodore, 110 S Saunders, Richard, 57 Schneider, Hope, 155 scrolls, 13–15 Smithmeyer, John L., 104 Smithsonian Institution Library, 102 space concerns, 157.

Anyone who ever thumbed through the cards at a local public library probably referred to many that came from the Library of Congress. The operation grew exponentially over the years and at its peak in 1969, approximately seventy-nine million cards were printed and distributed annually. Coincidentally, this was the same year the Library introduced Machine-Readable Cataloging (MARC), which eventually would supplant the card catalog. The card service lasted nearly a century, with the last cards produced and distributed in 1997. Although the Library of Congress is frequently—and erroneously—credited with the invention of the card catalog, it was ironically one of the last major libraries to embrace it.


pages: 318 words: 87,570

Broken Markets: How High Frequency Trading and Predatory Practices on Wall Street Are Destroying Investor Confidence and Your Portfolio by Sal Arnuk, Joseph Saluzzi

algorithmic trading, automated trading system, Bernie Madoff, buttonwood tree, buy and hold, commoditize, computerized trading, corporate governance, cuban missile crisis, financial engineering, financial innovation, Flash crash, Gordon Gekko, High speed trading, latency arbitrage, locking in a profit, machine readable, Mark Zuckerberg, market fragmentation, National best bid and offer, payment for order flow, Ponzi scheme, price discovery process, price mechanism, price stability, proprietary trading, Sergey Aleynikov, Sharpe ratio, short selling, Small Order Execution System, statistical arbitrage, stocks for the long run, stocks for the long term, transaction costs, two-sided market, uptick rule, zero-sum game

This could easily create valuable latency arbitrage opportunities in the trading of ETFs and other tradable products linked to indexes (see Chapter 2, “The Curtain Pulled Back on High Frequency Trading”). Machine-Readable News Knowing how valuable the combination of colocation and data fees are to HFT firms, the exchanges also have begun entering the business of delivering news in a high-speed, “machine-readable” format, which can be easily used by computer-driven trading programs. In December 2011, NASDAQ acquired RapiData, a leading provider of machine-readable economic news to trading firms and financial institutions.6 Two years earlier, Deutsche Borse acquired Need To Know News, another machine-readable news firm. Many of the major financial news services, including Thomson Reuters, Dow Jones, and Bloomberg, also have entered the business.

Many of the major financial news services, including Thomson Reuters, Dow Jones, and Bloomberg, also have entered the business. Machine-readable news data feeds enable HFT computers to react within microseconds to news events, beating out traditional institutional and retail investors. The instant a corporate news release runs on services such as PRNewswire or BusinessWire, it is parsed by machine-readable programs and sent to HFT firms’ subscribers, who incorporate it into their algorithms to make instantaneous trading decisions. Not only are corporate news releases disseminated this way, but major economic news releases from Government and industry organizations, such as jobs numbers from the U.S.

Bureau of Labor Statistics or the Chicago Purchasing Managers Index, are distributed in machine-readable format. Firms such as RapiData market themselves by highlighting their low latency and sophisticated design, which enables news feeds to be integrated easily into trading programs. They also tout that some data is sent directly from government lockups, which allows it to be parsed the instant an embargo is lifted. They station their “reporters” in government press rooms to enter the data into their computers. When the embargo is lifted, the machine-readable news firm releases the news to subscribers. The danger is that the machines can “interpret” the news incorrectly.


pages: 408 words: 63,990

Build Awesome Command-Line Applications in Ruby: Control Your Computer, Simplify Your Life by David B. Copeland

business logic, Chris Wanstrath, Compatible Time-Sharing System, database schema, en.wikipedia.org, full stack developer, machine readable, Multics, Ruby on Rails, systems thinking, web application

Our app is definitely playing well with others. The only problem is that machine-readable formats tend not to be very human readable. This wasn’t a problem with ls, whose records (files) have only one field (the name of the file). For complex apps like todo, where there are several fields per record, the output is a bit difficult to read. A seasoned UNIX user would simply pipe our output into awk and format the list to their tastes. We can certainly leave it at that, but there’s a usability concern here. Our app is designed to be used by a user sitting at a terminal. We want to maintain the machine-readable format designed for interoperability with other apps but also want our app to interoperate with its users.

Provide a Pretty-Printing Option The easiest way to provide both a machine-readable output format and a human-readable option is to create a command-line flag or switch to specify the format. We’ve seen how to do this before, but here’s the code we’d use in todo to provide this: play_well/todo/bin/todo ​desc 'List tasks'​ ​command :list do |c|​ ​​ ​ c.desc 'Format of the output'​ ​ c.arg_name 'csv|pretty'​ ​ c.default_value 'pretty'​ ​ c.flag :format​ ​​ ​ c.action do |global_options,options,args|​ ​ if options[:format] == 'pretty'​ ​ # Use the pretty-print format​ ​ elsif options[:format] == 'csv'​ ​ # Use the machine-readable CSV format​ ​ end​ ​ end​ ​end​ We’ve chosen to make the pretty-printed version the default since, as we’ve mentioned, our app is designed primarily for a human user.

If all you did was follow these rules and conventions, you’d be producing great command-line apps. But, we want to make awesome command-line apps, and these rules and conventions can take us only so far. There are still a lot of open questions about implementing your command-line app. Our discussion of “pretty-printed” vs. “machine readable” formats is just one example: how should you decide which default to use? What about files that our app creates or uses; where should they live? Should we always use a one-letter name for our command-line options? When should we use the long-form names? How do we choose the default values for flags?


pages: 245 words: 68,420

Content Everywhere: Strategy and Structure for Future-Ready Content by Sara Wachter-Boettcher

business logic, crowdsourcing, John Gruber, Kickstarter, linked data, machine readable, search engine result page, semantic web, Silicon Valley, systems thinking, TechCrunch disrupt

Just like an editor marks up a book before it goes to print—adding in-line notes that dictate where a block quote should start and stop, or when to use bullets—markup is a way to add directions to your content about what different pieces of text are, allowing you to make automated decisions about what those pieces of text should do when they’re displayed. In other words, it’s the code that wraps around your content chunks and lends them machine-readable meaning. In this chapter, we’ll take a look at why markup matters for content, explore the types of markup you may hear mentioned in conversations with technical teams (as well as which ones are likely to be used by whom), and see why knowing just a bit about this oft-mystified m-word can help you make better decisions about how you plan, structure, write, and share content.

When you use presentational markup, that’s precisely what you’re doing: locking content into just one shade, one way to look...even when it’s being displayed in places where it looks silly. If you can’t be sure exactly where and how your content is going to be displayed, both now and in the future, then purely presentational markup simply doesn’t have enough power to pass muster. Semantic Semantic markup, on the other hand, is designed to reveal, in a machine-readable way, the intrinsic meaning in your content, and to provide the machines that read it information they can use to apply a style sheet that determines how it should be displayed. It gives your content information about itself—telling it things like “this is a headline,” rather than “this should be in large type.”

Microformats Microformats are an open data standard that builds on HTML to add metadata to pieces of content, identifying information as something specific, like a “person” or a “location.” Because microformats are an open standard, many industries and organizations have added new microformats for specialty data. They work by adding specific classes to snippets of HTML, with those classes defining what the content within the snippet is. Microformats can be used to lend machine-readable meaning to chunks of incredibly small pieces of content, like a date or time, even if it’s in the middle of a paragraph of other text. HTML5 Microdata New in the HTML5 spec is the microdata extension, which is built off earlier microformats work. Microdata goes beyond traditional presentational HTML tags and allows you to mark up content with standards-compliant, semantically rich HTML—for example, marking up content as an “event” or “organization.”


pages: 25 words: 5,789

Data for the Public Good by Alex Howard

"World Economic Forum" Davos, 23andMe, Atul Gawande, Cass Sunstein, cloud computing, crowdsourcing, data science, Hernando de Soto, Internet of things, Kickstarter, lifelogging, machine readable, Network effects, openstreetmap, Silicon Valley, slashdot, social intelligence, social software, social web, web application

All are available to the public and media to download and embed as well. The combination of publishing maps and the open data that drives them simultaneously online is significantly evolved for any government agency, and it serves as a worthy bar for other efforts in the future to meet. USAID accomplished this by migrating its data to an open, machine-readable format. “In the past, we released our data in inaccessible formats — mostly PDFs — that are often unable to be used effectively,” said Van Dyck. “USAID is one of the premiere data collectors in the international development space. We want to start making that data open, making that data sharable, and using that data to tell stories about the crisis and the work we are doing on the ground in an interactive way.”

Park has focused on releasing data at Health.Data.Gov. In a speech to a Hacks and Hackers meetup in New York City in 2011, Park emphasized that HHS wasn’t just releasing new data: “[We’re] also making existing data truly accessible or usable,” he said, taking “stuff that’s in a book or on a website and turning it into machine-readable data or an API.” Park said it’s still quite early in the project and that the work isn’t just about data — it’s about how and where it’s used. “Data by itself isn’t useful. You don’t go and download data and slather data on yourself and get healed,” he said. “Data is useful when it’s integrated with other stuff that does useful jobs for doctors, patients and consumers.”

Smart Disclosure There are enormous economic and civic good opportunities in the “smart disclosure” of personal data, whereby a private company or government institution provides a person with access to his or her own data in open formats. Smart disclosure is defined by Cass Sunstein, Administrator of the White House Office for Information and Regulatory Affairs, as a process that “refers to the timely release of complex information and data in standardized, machine-readable formats in ways that enable consumers to make informed decisions.” For instance, the quarterly financial statements of the top public companies in the world are now available online through the Securities and Exchange Commission. Why does it matter? The interactions of citizens with companies or government entities generate a huge amount of economically valuable data.


Data Wrangling With Python: Tips and Tools to Make Your Life Easier by Jacqueline Kazil

Amazon Web Services, bash_history, business logic, cloud computing, correlation coefficient, crowdsourcing, data acquisition, data science, database schema, Debian, en.wikipedia.org, Fairphone, Firefox, Global Witness, Google Chrome, Hacker News, job automation, machine readable, Nate Silver, natural language processing, pull request, Ronald Reagan, Ruby on Rails, selection bias, social web, statistical model, web application, WikiLeaks

Microsoft Word documents are an example of the latter, while CSV, JSON, and XML are examples of the former. In this chapter, we will cover how to read files easily handled by machines, and in Chapters 4 and Chapter 5 we will cover files made for human consumption. File formats that store data in a way easily understood by machines are commonly referred to as machine readable. Common machinereadable formats include the following: • Comma-Separated Values (CSV) • JavaScript Object Notation (JSON) • Extensible Markup Language (XML) In spoken and written language, these data formats are typically referred to by their shorter names (e.g., CSV). We will be using these acronyms.

Go ahead and download the code examples from the book’s data repository and move them into your project’s folder. As you follow along in the chapter, we will assume the data from that repository is stored in the same folder where you are writing your Python code. This way, we don’t have to worry about locating the files and can focus instead on importing data with Python. CSV Data The first machine-readable file type we will learn about is CSV. CSV files, or CSVs for short, are files that separate data columns with commas. The files themselves have a .csv extension. Another type of data, called tab-separated values (TSV) data, sometimes gets classi‐ fied with CSVs. TSVs differ only in that they separate data columns with tabs and not commas.

This isn’t necessary for our code, but it helps us preview the data and make sure it’s in the proper form: for item in data: print item Once you are done writing your file you can save and run it. As you can see, opening and converting a JSON file to a list of dictionaries in Python is quite easy. In the next section, we will explore more customized file handling. XML Data XML is often formatted to be both human and machine readable. However, the CSV and JSON examples were a lot easier to preview and understand than the XML file for this dataset. Luckily for us, the data is the same, so we are familiar with it. Down‐ load and save the XML version of the life expectancy rates data in the folder where you are saving content associated with this chapter.


The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences by Rob Kitchin

Bayesian statistics, business intelligence, business process, cellular automata, Celtic Tiger, cloud computing, collateralized debt obligation, conceptual framework, congestion charging, corporate governance, correlation does not imply causation, crowdsourcing, data science, discrete time, disruptive innovation, George Gilder, Google Earth, hype cycle, Infrastructure as a Service, Internet Archive, Internet of things, invisible hand, knowledge economy, Large Hadron Collider, late capitalism, lifelogging, linked data, longitudinal study, machine readable, Masdar, means of production, Nate Silver, natural language processing, openstreetmap, pattern recognition, platform as a service, recommendation engine, RFID, semantic web, sentiment analysis, SimCity, slashdot, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart grid, smart meter, software as a service, statistical model, supply-chain management, technological solutionism, the scientific method, The Signal and the Noise by Nate Silver, transaction costs

Feedback is also welcome via email (Rob.Kitchin@nuim.ie) or Twitter (@robkitchin). Some of the material in this book has been previously published as papers and blog posts, though it has been updated, reworked and extended: Dodge, M. and Kitchin, R. (2005) ‘Codes of life: identification codes and the machine-readable world’, Environment and Planning D: Society and Space, 23(6): 851–81. Kitchin, R. (2013) ‘Big data and human geography: opportunities, challenges and risks’, Dialogues in Human Geography, 3(3): 262–7. Kitchin, R. (2014) ‘The real-time city? Big data and smart urbanism’, GeoJournal 79(1): 1–14.

Given that by their nature open data generate no or little income to fund such service arrangements, nor indeed the costs of opening data, while it is easy to agree that open data should be delivered as a service, in practice it might be an aspiration unless effective funding models are developed (as discussed more fully below). Linked Data The idea of linked data is to transform the Internet from a ‘web of documents’ to a ‘web of data’ through the creation of a semantic web (Berners-Lee 2009; P. Miller, 2010), or what Goddard and Byrne (2010) term a ‘machine-readable web’. Such a vision recognises that all of the information shared on the Web contains a rich diversity of data – names, addresses, product details, facts, figures, and so on. However, these data are not necessarily formally identified as such, nor are they formally structured in such a way as to be easily harvested and used.

These include the production of mainframe computers in the 1950s and 60s; the nascent Internet in the 1970s and 80s that linked such computers together; the wide-scale roll-out of personal computers in the 1980s and 90s; the massive growth of the Internet in the 1990s and the development of Web-based industries, alongside a huge growth in mobile phones and digital devices such as games consoles and digital cameras; the development of mobile, distributed and cloud computing and Web 2.0 in the 2000s; the roll-out of ubiquitous and pervasive computing in the 2010s. Throughout this period a number of transformative effects took place: computational power grew exponentially; devices were networked together; more and more aspects and processes of everyday life became mediated by digital systems; data became ever more indexical and machine-readable; and data storage expanded and became distributed. Computation While the initial mainframe digital computers of the 1950s and 60s provided computation that was more efficient than that provided by people or the analogue devices they used (such as abacus, mechanical calculators, punch-card calculators, analogue computers, etc.), their processing power was limited, and thus the kinds of operations they performed constrained, and they were large and expensive.


pages: 435 words: 62,013

HTML5 Cookbook by Christopher Schmitt, Kyle Simpson

Firefox, Internet Archive, machine readable, security theater, web application, WebSocket

Solution Wrap the human-friendly date-time information in the time element, and specify the machine-readable information via the datetime attribute: <p>Published: <time datetime="2011-01-15">January 15, 2011</time></p> Depending on the date and time you are trying to specify, the following approaches are also valid: Time only <p>The class starts at <time datetime="08:00">8:00 am</time>.</p> Date and time (requires time zone specification) <p>Registration opens on <time datetime="2011-01-15T08:00-07:00">January 15, 2011 at 8:00 am, Mountain Time</time>.</p> Visible machine-readable format (no date-time required) <p>Published: <time>2011-01-15</time></p> Discussion Before we discuss this new element, let’s first address machine readability.

</p> Visible machine-readable format (no date-time required) <p>Published: <time>2011-01-15</time></p> Discussion Before we discuss this new element, let’s first address machine readability. This is simply the notion of enriching your web content with additional, semantic information that machines (search engines, user agents, etc.) can parse to glean more meaning from your content. Note We’re not aware of any machines that are currently parsing the datetime information from time, but we can imagine this soon to be on the horizon, particularly for search engines that want to accurately display time-sensitive results for news queries. Next, let’s talk date-time information on the Web. For machine readability, date-time information has to be specified in the international standard format, ISO 8601.

Note One limitation of time that is worth mentioning is that it can’t be used for imprecise dates, such as “August 2011.” It does require, minimally, the day, month, and year for dates. What about microformats? By this point, you may be wondering about microformats (http://microformats.org), which are HTML-based design patterns for expressing machine-readable semantics. The hCalendar (http://microformats.org/hCalendar) microformat, for example, is used for indicating date-time information. Note Want to learn more about microformats? Check out Emily Lewis’s Microformats Made Simple (New Riders, http://microformatsmadesimple.com) for lots of practical examples and easy-to-understand explanations.


pages: 229 words: 68,426

Everyware: The Dawning Age of Ubiquitous Computing by Adam Greenfield

"Hurricane Katrina" Superdome, augmented reality, business process, Charles Babbage, defense in depth, demand response, demographic transition, facts on the ground, game design, Howard Rheingold, Internet of things, James Dyson, knowledge worker, late capitalism, machine readable, Marshall McLuhan, new economy, Norbert Wiener, packet switching, pattern recognition, profit motive, QR code, recommendation engine, RFID, seminal paper, Steve Jobs, technoutopianism, the built environment, the scientific method, value engineering

As a manifestation of the emerging culture of mass amateurization, such open codes would allow small-scale producers—from West Berkeley sculptors to Bangladeshi weaving collectives—to compete on something approaching the same ground as professional manufacturers and distributors. At the same time, though, and despite its designers' clear intentions, a free product identifier could be regarded as a harbinger of the insidious transformation of just about everything into machine-readable information. Such an identifier is not a technical system in the usual sense. It is intangible, nonmaterial. It's nothing more than a convention: a format and perhaps some protocols for handling information expressed in that format. But its shape and conception are strongly conditioned by the existence of parallel conventions—conventions that are embodied in specific technologies.

The whole notion of a Uniform Resource Identifier, for example, which was called into being by the Internet, or a Universal Product Code, which cannot be separated from the technics of bar-coding and its descendent, RFID. And though such conventions may be intangible, they nevertheless have power, in our minds and in the world. The existence of a machine-readable format for object identification, particularly, is a container waiting to be filled, and our awareness that such a thing exists will transform the way we understand the situations around us. Because once we've internalized the notion, any object that might once have had an independent existence—unobserved by anyone outside its immediate physical vicinity, unrecorded and certainly uncorrelated—can be captured and recast as a node.

And then suppose that—largely as a consequence of the automobile manufacturer's successful and public large-scale roll-out of the system—this identification system is adopted by a wide variety of other institutions, private and public. In fact, with minor modifications, it's embraced as the standard driver's license schema by a number of states. And because the various state DMvs collect such data, and the ID-generation system affords them the technical ability to do so, the new licenses wind up inscribed with machine-readable data about the bearer's sex, height, weight and other physical characteristics, ethnicity.... If you're having a hard time swallowing this set-up, consider that history is chock-full of situations where some convention originally developed for one application was adopted as a de facto standard elsewhere.


pages: 255 words: 75,172

Sleeping Giant: How the New Working Class Will Transform America by Tamara Draut

affirmative action, Affordable Care Act / Obamacare, always be closing, American ideology, antiwork, battle of ideas, big-box store, Black Lives Matter, blue-collar work, collective bargaining, creative destruction, David Brooks, declining real wages, deindustrialization, desegregation, Detroit bankruptcy, Donald Trump, Edward Glaeser, ending welfare as we know it, Ferguson, Missouri, financial deregulation, full employment, gentrification, immigration reform, income inequality, independent contractor, invisible hand, job satisfaction, knowledge economy, knowledge worker, low skilled workers, machine readable, mass incarceration, minimum wage unemployment, mortgage tax deduction, new economy, obamacare, occupational segregation, payday loans, pink-collar, plutocrats, Powell Memorandum, profit motive, public intellectual, race to the bottom, Ralph Nader, rent-seeking, rising living standards, Ronald Reagan, shared worldview, stock buybacks, TED Talk, The Bell Curve by Richard Herrnstein and Charles Murray, The Wealth of Nations by Adam Smith, trickle-down economics, union organizing, upwardly mobile, War on Poverty, white flight, women in the workforce, young professional

Department of Labor, Bureau of Labor Statistics, “Characteristics of Minimum Wage Workers, 2013,” BLS Reports, March 2014, at http://www.​bls.​gov/​cps/​minwage2013.​pdf. 4. Author’s analysis of Current Population Survey Annual Social and Economic Supplement, U.S. Department of Labor, Bureau of Labor Statistics. Data retrieved from IPUMS-CPS: Steven Ruggles et al., Integrated Public Use Microdata Series: Version 5.0 [machine-readable database] (Minneapolis: University of Minnesota, 2010). 5. Author’s analysis of 1970–2000 Decennial Census, 2011–2012 U.S. Census American Community Survey, U.S. Census Bureau Public Use Microdata retrieved from Ruggles et al., Integrated Public Use Microdata Series: Version 5.0. 6. Author’s analysis of Current Population Survey Annual Social and Economic Supplement. 7.

Blair Bowie and Adam Lioz, “Billion-Dollar Democracy: The Unprecedented Role of Money in the 2012 Elections,” Demos, June 2013, at http://www.​demos.​org/​sites/​default/​files/​publications/​billion.​pdf. 15. Jack Metzger, “Politics and the American Class Vernacular,” in John Russo and Sherry Lee Linkon, eds., New Working-Class Studies (Ithaca, NY: ILR Press, 2005), p. 198. 16. Author’s analysis of General Social Surveys, 1972–2010 [machine-readable data file]/Principal Investigator, Tom W. Smith; Co-Principal Investigator, Peter V. Marsden; Co-Principal Investigator, Michael Hout; Sponsored by National Science Foundation—NORC ed.—Chicago: NORC at the University of Chicago [producer]; Storrs, Connecticut: The Roper Center for Public Opinion Research, University of Connecticut. 17.

Department of Labor, Bureau of Labor Statistics, “Data Tables for Overview of May 2012 Occupational Employment and Wages,” March 29, 2013, at http://www.​bls.​gov/​oes/​2012/​may/​featured_​data.​htm#largest. 14. Independent analysis of U.S. Census 2012 and 2011 American Community Survey. Data retrieved from IPUMS-USA: Steven Ruggles et al., Integrated Public Use Microdata Series: Version 5.0 [machine-readable database] (Minneapolis: University of Minnesota, 2010). 15. Bureau of Labor Statistics, “Data Tables for Overview of May 2012 Occupational Employment and Wages.” 16. Coca-Cola’s brand was worth $83.8 billion in 2015 according to Statista, making it fourth on Forbes’s annual list of the most valuable brands. 17.


pages: 315 words: 70,044

Learning SPARQL by Bob Ducharme

database schema, Donald Knuth, en.wikipedia.org, G4S, linked data, machine readable, semantic web, SPARQL, web application

Berners-Lee came up with the idea of Linked Data as a set of best practices for sharing data across the web infrastructure so that applications can more easily retrieve data from public sites with no need for screen scraping—for example, to let your calendar program get flight information from multiple airline websites in a common, machine-readable format. These best practices recommend the use of URIs to name things and the use of standards such as RDF and SPARQL. They provide excellent guidelines for the creation of an infrastructure for the semantic web. and the semantics of that data The idea of “semantics” is often defined as “the meaning of words.”

RDFa’s supplemental role in XML and HTML documents makes it excellent for metadata about content in those documents, and utilities are available to pull the triples out of RDFa attributes in a format that lets you query them with SPARQL. Note RDFa’s ability to embed triples in HTML makes it great for sharing machine-readable data in web pages so that automated processes gathering that data don’t need to do screen scraping of those pages. Storing RDF in Databases If you need to store a very large number of triples, keeping them as Turtle or RDF/XML in one big text file may not be your best option, because a system that indexes data and decides which data to load into memory when—that is, a database management system—can be more efficient.

Of all the W3C semantic web standards, OWL is the key one for putting the “semantic” in “semantic web.” The term “semantics” is sometimes defined as the meaning behind words, and those who doubt the value of semantic web technology like to question the viability of storing all the meaning of a word in a machine-readable way. As we saw above, though, we don’t need to store all the meaning of a word to add value to a given set of data. For example, simply knowing that “spouse” is a symmetric term made it possible to find out the identity of Cindy’s spouse, even though this fact was not part of the dataset. Linked Data The idea of Linked Data is newer than that of the semantic web, but sometimes it’s easier to think of the semantic web as building on the ideas behind Linked Data.


Designing Web APIs: Building APIs That Developers Love by Brenda Jin, Saurabh Sahni, Amir Shevat

active measures, Amazon Web Services, augmented reality, Big Tech, blockchain, business logic, business process, cognitive load, continuous integration, create, read, update, delete, exponential backoff, Google Hangouts, if you build it, they will come, Lyft, machine readable, MITM: man-in-the-middle, premature optimization, pull request, Salesforce, Silicon Valley, Snapchat, software as a service, the market place, uber lyft, web application, WebSocket

Incorrect or unclear errors are frustrating and can negatively affect adoption of your APIs. Developers can get stuck and just give up. Meaningful errors are easy to understand, unambiguous, and actionable. They help developers to understand the problem and to address it. Providing these errors with details leads to a better devel‐ oper experience. Error codes that are machine-readable strings allow developers to programmatically handle errors in their code bases. In addition to these strings, it is useful to add longer-form errors, either in the documentation or somewhere else in the payload. These are sometimes referred to as human-readable errors. Even better, personalize these errors per developer.

Group errors into high-level categories Error category System-level error Examples Database connection issue Backend service connection issue Fatal error Business logic error Rate-limited Request fulfilled, but no results were found Business-related reason to deny access to information API request formatting error Required request parameters are missing Combined request parameters are invalid together Authorization error OAuth credentials are invalid for request Token has expired After grouping your error categories throughout your code path, think about what level of communication is meaningful for these errors. Some options include HTTP status codes and headers, as well as machine-readable “codes” or more verbose human-readable error messages returned in the response payload. Keep in mind that you’ll want to return an error response in a format consistent with your non-error responses. For example, if you return a JSON response on a successful request, you should ensure that the error is returned in the same format.

For example, you probably don’t want to bubble up your database errors to the outside world and reveal too much information about your database connections. Table 4-3 offers examples of how you might begin to organize your errors as you design your API. Table 4-3. Organize your errors into status codes, headers, machinereadable codes, and human-readable strings Error category HTTP status HTTP headers Error code (machine-readable) System-level 500 error Business logic 429 error -- -- RetryAfter rate_limit_exceeded API request formatting error Auth error 400 -- 401 -- Error message (humanreadable) -- “You have been rate-limited. See Retry-After and try again.” missing_required_parameter “Your request was missing a {user} parameter.”


Getting Started With Ledger by Rolf Schröder

asset allocation, bitcoin, don't repeat yourself, machine readable

. • Check for “unknown” (= not yet recognized) transactions; modify meta.txt to match these bank transactions with your Ledger accounts. • Repeat until done. Let’s go through theses steps in greater detail. Getting the CSV data depends obviously on the financial institution. It’s handy to always save it to the same location in a “machine readable name” (ex: CSV/bankname_<month><year>.csv or CSV/bankname_latest.csv) because this allows for easier scripting. The utility script (ecosystem/convert.py) manipulates the CSV data to make Ledger’s convert understand it. This is mainly replacing the header lines and providing some more info for Ledger like the bank account’s currency.

Imagine you would now go to your NorthBank online banking site and download the CSV data for the last month (the sample repo already contains this file): 19 $ mux start GSWL-private # if not done yet # not really using wget obviously! $ wget https://banking.northbank.com/myaccount/latest.csv CSV/apr2042_northbank.csv Note how I renamed the CSV file to a machine readable name (i.e. added the date in a consistent manner). This now enables us to parse the ledger file with a simple alias: $ mux start GSWL-private # if not done yet # jump to the window 'make' $ lmnorthbank # lm =~ last month, see private/alias.local You should see the data from CSV/apr2042_northbank.csv converted into Ledger’s format.


pages: 387 words: 120,155

Inside the Nudge Unit: How Small Changes Can Make a Big Difference by David Halpern

Affordable Care Act / Obamacare, availability heuristic, behavioural economics, carbon footprint, Cass Sunstein, centre right, choice architecture, cognitive dissonance, cognitive load, collaborative consumption, correlation does not imply causation, Daniel Kahneman / Amos Tversky, data science, different worldview, endowment effect, gamification, happiness index / gross national happiness, hedonic treadmill, hindsight bias, IKEA effect, illegal immigration, job satisfaction, Kickstarter, language acquisition, libertarian paternalism, light touch regulation, longitudinal study, machine readable, market design, meta-analysis, Milgram experiment, nudge unit, peer-to-peer lending, pension reform, precautionary principle, presumed consent, QR code, quantitative easing, randomized controlled trial, Richard Thaler, Right to Buy, Ronald Reagan, Rory Sutherland, Simon Kuznets, skunkworks, supply chain finance, the built environment, theory of mind, traffic fines, twin studies, World Values Survey

It gave the Secretary of State for Business the power to require firms to allow their customers access to their own consumption data in ‘machine-readable form’. This last phrase was critical. In many countries, the UK included, there is legislation in place to enable consumers to get, in written or ‘legible’ form, the data that firms (or public services) hold on them. For example, in the UK you could write to the supermarket giant Tesco and ask for the data they hold on you through your loyalty card. For £10, and after a reasonable delay, Tesco would send you a printout of this data. For most people this pile of paper will be of little use. Imagine instead that you could get access to this same data in machine-readable form, and much more quickly.

As a result of a new consumer power pushed by BIT, energy companies were required to make it easier for customers to access information. In particular, they were required to print on bills a QR code that summarised the customers’ details, patterns of use and their current tariff (see Figure 26). In technical terms, this makes the customers’ data machine-readable. In everyday terms, it means that all customers need to do to save some money is to scan the QR code with their mobile phone, and a switching site app can search the market for the best tariff for them. Instead of switching being a task that would take a few hours, it can be done in a few seconds.

This means helping people find better deals and prices; avoid foods that they are allergic to; improve their diets; and take more direct control over their own behaviour. In their book Nudge, Richard Thaler and Cass Sunstein expressed a closely related idea in the acronym ‘RECAP’: Record, Evaluate, and Compare Alternative Prices. The basic idea was that companies should be required to give the prices and attributes of products in comparable, machine-readable form, so that consumers could make easier and more effective comparisons (see Chapter 3). In the USA, this approach was picked up under the more memorable phrase ‘smart disclosure’, with a push from Richard and Cass, and championed by the appointment of a director of Smart Disclosure in the US Treasury, Sophie Raseman.1 In the UK, we first had a go at pushing the approach to giving consumers access to data on a voluntary basis, since much of our work for the PM was about removing regulatory burdens on business, not adding new ones.


pages: 511 words: 111,423

Learning SPARQL by Bob Ducharme

business logic, Donald Knuth, en.wikipedia.org, G4S, hypertext link, linked data, machine readable, place-making, semantic web, SPARQL, web application

Berners-Lee came up with the idea of Linked Data as a set of best practices for sharing data across the web infrastructure so that applications can more easily retrieve data from public sites with no need for screen scraping—for example, to let your calendar program get flight information from multiple airline websites in a common, machine-readable format. These best practices recommend the use of URIs to name things and the use of standards such as RDF and SPARQL. They provide excellent guidelines for the creation of an infrastructure for the semantic web. and the semantics of that data The idea of “semantics” is often defined as “the meaning of words.”

RDFa’s supplemental role in XML and HTML documents makes it excellent for metadata about content in those documents, and utilities are available to pull the triples out of RDFa attributes in a format that lets you query them with SPARQL. Note RDFa’s ability to embed triples in HTML makes it great for sharing machine-readable data in web pages so that automated processes gathering that data don’t need to do screen scraping of those pages. Storing RDF in Databases If you need to store a very large number of triples, keeping them as Turtle or RDF/XML in one big text file may not be your best option, because a system that indexes data and decides which data to load into memory when—that is, a database management system—can be more efficient.

Of all the W3C semantic web standards, OWL is the key one for putting the “semantic” in “semantic web.” The term “semantics” is sometimes defined as the meaning behind words, and those who doubt the value of semantic web technology like to question the viability of storing all the meaning of a word in a machine-readable way. As we saw above, though, we don’t need to store all the meaning of a word to add value to a given set of data. For example, simply knowing that “spouse” is a symmetric term made it possible to find out the identity of Cindy’s spouse, even though this fact was not part of the dataset. We’ll learn more about RDFS and OWL in Chapter 9.


Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services by Robert Daigneau

Amazon Web Services, business intelligence, business logic, business process, continuous integration, create, read, update, delete, en.wikipedia.org, fault tolerance, loose coupling, machine readable, MITM: man-in-the-middle, MVC pattern, OSI model, pull request, RFC: Request For Comment, Ruby on Rails, software as a service, web application

Traditional documentation and unit tests typically can’t be used as input to code generation tools that produce Service Connectors (168) or by workflow development tools, nor can this information be read by automated agents at runtime. Service owners could supplement these approaches by providing machine-readable service metadata. Service Descriptor 176 C HAPTER 6 W EB S ERVICE I NFRASTRUCTURES Produce a standardized and machine-readable description of related services that identifies URIs, logical operations, messages, server methods, and usage policies. Server Methods * .. 1 Service Descriptor 1 .. * URI 1 .. * Logical Operations 1 .. * Messages Service Descriptor 1 .. * Usage Policies Service Descriptors provide a consolidated, machine-readable listing that identifies a set of logical operations or resources that are managed by a single organization.

Quality of Service or QoS requirements) for matters such as client authentication, data privacy, service response time, hours of operation, and up-time (i.e., availability) should also be clarified. This information provides the context necessary to produce an API that meets the needs of its clients. Given this information, the developer can proceed to create the logic behind the external API. It is important to note that machine-readable contracts like WSDL can only capture the most basic information required to use a service. Indeed, information such as a detailed explanation of what the service really does, when to use it, how to prepare requests, and how to handle failures is often described through prose and in unit tests. • Autonomy: Consistent and reliable outcomes are more likely when the service controls its own execution and has few dependencies on outside forces.

Changes like those that are listed above can make the processing rules used by clients obsolete and cause them to break. The effect of some of these changes can, however, be mitigated by using the Tolerant Reader pattern (243). The service’s expectations regarding what information is required and what is optional can be explicitly defined through “machine-readable” meta-languages like XSD and JSON Schema. These expectations might also be described in text-based documents (e.g., Word, HTML, etc.) aimed at developers. Regardless of how these expectations are expressed, once the parties have agreed to What Causes Breaking Changes? 230 What Causes Breaking Changes?


Beautiful Data: The Stories Behind Elegant Data Solutions by Toby Segaran, Jeff Hammerbacher

23andMe, airport security, Amazon Mechanical Turk, bioinformatics, Black Swan, business intelligence, card file, cloud computing, computer vision, correlation coefficient, correlation does not imply causation, crowdsourcing, Daniel Kahneman / Amos Tversky, DARPA: Urban Challenge, data acquisition, data science, database schema, double helix, en.wikipedia.org, epigenetics, fault tolerance, Firefox, Gregor Mendel, Hans Rosling, housing crisis, information retrieval, lake wobegon effect, Large Hadron Collider, longitudinal study, machine readable, machine translation, Mars Rover, natural language processing, openstreetmap, Paradox of Choice, power law, prediction markets, profit motive, semantic web, sentiment analysis, Simon Singh, social bookmarking, social graph, SPARQL, sparse data, speech recognition, statistical model, supply-chain management, systematic bias, TED Talk, text mining, the long tail, Vernor Vinge, web application

As with the choice of GoogleDocs as the primary representation of the data, the use of both human-readable and machine-readable representations is crucial to gaining the most benefit from the data set. The only piece of information that does not require two representations is the numerical representation of the solubility itself. As has been noted earlier, we made the decision to not remove the most questionable values from the primary data record. This poses a problem for machine readability, as there is no accepted standard approach for saying “this number is a bit dodgy.” For this work we have elected to mark records that are believed to be inaccurate after human curation and to give a reason for the marking.

Providing the raw data in as comprehensive a fashion as possible and a full description of all the processing and filtering that has taken place means that any user can dig down to the level of detail he or she requires. The raw data will often be difficult or impossible to present in a form that is naturally machine-readable and processable, so the filtering and refinement process also involves making choices about categorization and simplification to provide clear and clean datafiles that can be repurposed. Here we describe the approach we have taken in “beautifying” a set of crowdsourced data by filtering and representing the data in an open form that allows anyone to use it for his own purposes.

., by supporting automated ingest into ChemSpider and other services), and to provide the data in the most general possible way to other researchers, it is necessary to provide a representation that adheres to a recognized standard in syntax as well as in descriptors. The Resource Description Framework, or RDF, provides a route toward exposing the data set in a recognized, machine-readable format. With this format, any information is transformed into statements made up of a “subject,” a “predicate,” and a “value.” For example, the fragment shown in the following code states that the object found in the spreadsheet called solute#59 is defined as the resource at the given URL. RDF uses “namespaces,” or sets of recognized concepts, to define relationships between “resources,” where a resource is any object that can be pointed at by a unique identifier.


pages: 73 words: 17,793

HTML5 for Web Designers by Jeremy Keith

cognitive load, Firefox, machine readable, web application

The only tricky bit in hCalendar is describing dates and times in a machine-readable way. Humans like to describe dates as “May 25th” or “next Wednesday” but parsers expect a nicely-formated ISO date: YYYY-MM-DDThh:mm:ss. The microformats community came up with some clever solutions to this problem, such as using the abbr element: <abbr class="dtstart" title="1992-01-12"> January 12th, 1992 </abbr> If using the abbr element in this way makes you feel a little queasy, there are plenty of other ways of marking up machine-readable dates and times in microformats using the class-value pattern.


pages: 628 words: 107,927

Node.js in Action by Mike Cantelon, Marc Harter, Tj Holowaychuk, Nathan Rajlich

Amazon Web Services, business logic, Chris Wanstrath, create, read, update, delete, Debian, en.wikipedia.org, Firefox, Google Chrome, machine readable, MITM: man-in-the-middle, MVC pattern, node package manager, p-value, pull request, Ruby on Rails, SQL injection, web application, WebSocket

This is because the string was written to the Buffer using the default human-readable text-based encoding (UTF-8), where the string is represented with 1 byte per character. Node also includes helper functions for reading and writing binary (machine-readable) integer data. These are needed for implementing machine protocols that send raw data types (like ints, floats, doubles, and so on) over the wire. Because you want to store a number value in this example, it’s possible to be more efficient by utilizing the helper function writeInt32LE() to write the number 121234869 as a machine-readable binary integer (assuming a little-endian processor) into a 4-byte Buffer. There are other variations of the Buffer helper functions, as well: writeInt16LE() for smaller integer values writeUInt32LE() for unsigned values writeInt32BE() for big-endian values There are lots more, so be sure to check the Buffer API documentation page (http://nodejs.org/docs/latest/api/buffer.html) if you’re interested in them all.

Creating a public REST API In this section, you’ll implement a RESTful public API for the shoutbox application, so that third-party applications can access and add to publication data. The idea of REST is that application data can be queried and changed using verbs and nouns, represented by HTTP methods and URLs, respectively. A REST request will typically return data in a machine-readable form, such as JSON or XML. To implement an API, you’ll do the following: Design an API that allows users to show, list, remove, and post entries Add Basic authentication Implement routing Provide JSON and XML responses Various techniques can be used to authenticate and sign API requests, but implementing the more complex solutions are beyond the scope of this book.

In the following code snippet, the number is written using the writeInt32LE binary helper function: var b = new Buffer(4); b.writeInt32LE(121234869, 0); console.log(b.length); 4 console.log(b); <Buffer b5 e5 39 07> By storing the value as a binary integer instead of a text string in memory, the data size is decreased by half, from 9 bytes down to 4. Figure 13.2 shows the breakdown of these two buffers and essentially illustrates the difference between human-readable (text) protocols and machine-readable (binary) protocols. Figure 13.2. The difference between representing 121234869 as a text string vs. a little-endian binary integer at the byte level Regardless of what kind of protocol you’re working with, Node’s Buffer class will be able to handle the proper representation. Byte endianness The term endianness refers to the order of the bytes within a multibyte sequence.


pages: 356 words: 105,533

Dark Pools: The Rise of the Machine Traders and the Rigging of the U.S. Stock Market by Scott Patterson

Alan Greenspan, algorithmic trading, automated trading system, banking crisis, bash_history, Bear Stearns, Bernie Madoff, Black Monday: stock market crash in 1987, butterfly effect, buttonwood tree, buy and hold, Chuck Templeton: OpenTable:, cloud computing, collapse of Lehman Brothers, computerized trading, creative destruction, Donald Trump, financial engineering, fixed income, Flash crash, Ford Model T, Francisco Pizarro, Gordon Gekko, Hibernia Atlantic: Project Express, High speed trading, information security, Jim Simons, Joseph Schumpeter, junk bonds, latency arbitrage, Long Term Capital Management, machine readable, Mark Zuckerberg, market design, market microstructure, Michael Milken, military-industrial complex, pattern recognition, payment for order flow, pets.com, Ponzi scheme, popular electronics, prediction markets, quantitative hedge fund, Ray Kurzweil, Renaissance Technologies, seminal paper, Sergey Aleynikov, Small Order Execution System, South China Sea, Spread Networks laid a new fibre optics cable between New York and Chicago, stealth mode startup, stochastic process, three-martini lunch, Tragedy of the Commons, transaction costs, uptick rule, Watson beat the top human players on Jeopardy!, zero-sum game

There was little question the computer revolution that made the AI dream a reality was irrevocably altering financial markets. Information about companies, currencies, bonds, and every other tradable instrument was digitized, fast as light. So-called machine-readable news was a hot new commodity. Breaking news about corporate events such as earnings reports was coded so that superfast algorithms could pick through it and react. Media outlets such as Reuters and Dow Jones published machine-readable news that pattern-recognition computers scanned and reacted to in the blink of an eye. High-tech trading firms gobbled up the information and gunned orders into the market at a rate faster than the beating wings of a hummingbird.

Not only were the best buy and sell orders on the Island system visible, all orders behind those orders were visible. If one trader was bidding $50 for two hundred shares of Intel, while another was bidding $50¼ for five hundred shares, and another was at $50½ for one hundred shares, all the orders were there on the screen to see. And the entire book was available in machine-readable form—meaning computers with the right code could instantly track the book and react at lightning speeds. This was all unheard-of. At the time, it was incredibly expensive for investors to get live stock market data, which was tightly controlled by Nasdaq, the NYSE, and the big trading firms.

The split-second precision demanded by dynamic AI algos that could instantly shift gears as the market changed wasn’t possible with people in the mix. Those quirky market makers were simply too human, prone to mistakes, delays, or pure, old-fashioned greed. Another factor that would fuel AI: flowing streams of digitized data. Through its ITCH feed, Island spit out far more machine-readable data—information coded in a way that computer programs could make sense of it—about stock transactions than Nasdaq and the NYSE combined. The latest trades, bids and offers, volumes, depth of book—it was all available in digital form. For a computer with the bandwidth to crunch it all, it was like seeing the market in 3-D Technicolor compared with an ancient black-and-white cathode-ray tube with bad reception.


pages: 502 words: 107,510

Natural Language Annotation for Machine Learning by James Pustejovsky, Amber Stubbs

Amazon Mechanical Turk, bioinformatics, cloud computing, computer vision, crowdsourcing, easy for humans, difficult for computers, finite state, Free Software Foundation, game design, information retrieval, iterative process, language acquisition, machine readable, machine translation, natural language processing, pattern recognition, performance metric, power law, sentiment analysis, social web, sparse data, speech recognition, statistical model, text mining

Timeline of Standardization LAF didn’t emerge as an ISO standard from out of nowhere. Here’s a quick rundown of where the standards composing the LAF model originated: 1987: The Text Encoding Initiative (TEI) is founded “to develop guidelines for encoding machine-readable texts in the humanities and social sciences.” The TEI is still an active organization today. See http://www.tei-c.org. 1990: The TEI releases its first set of Guidelines for the Encoding and Interchange of Machine Readable Texts. It recommends that encoding be done using SGML (Standard Generalized Markup Language), the precursor to XML and HTML. 1993: The Expert Advisory Group on Language Engineering Standards (EAGLES) is formed to provide standards for large-scale language resources (ex, corpora), as well as standards for manipulating and evaluating those resources.

A sampling of important corpora Name of corpusYear publishedSizeCollection contents British National Corpus (BNC) 1991–1994 100 million words Cross section of British English, spoken and written American National Corpus (ANC) 2003 22 million words Spoken and written texts Corpus of Contemporary American English (COCA) 2008 425 million words Spoken, fiction, popular magazine, and academic texts What Is a Corpus? A corpus is a collection of machine-readable texts that have been produced in a natural communicative setting. They have been sampled to be representative and balanced with respect to particular factors; for example, by genre—newspaper articles, literary fiction, spoken speech, blogs and diaries, and legal documents. A corpus is said to be “representative of a language variety” if the content of the corpus can be generalized to that variety (Leech 1991).

In order for annotation to provide statistically useful results, it must be done on a sufficiently large dataset, called a corpus. The study of language using corpora is corpus linguistics. Corpus linguistics began in the 1940s, but did not become a feasible way to study language until decades later, when the technology caught up to the demands of the theory. A corpus is a collection of machine-readable texts that are representative of natural human language. Good corpora are representative and balanced with respect to the genre or language that they seek to represent. The uses of computers with corpora have developed over the years from simple key-word-in-context (KWIC) indexes and concordances that allowed full-text documents to be searched easily, to modern, statistically based ML techniques.


Mastering Blockchain, Second Edition by Imran Bashir

3D printing, altcoin, augmented reality, autonomous vehicles, bitcoin, blockchain, business logic, business process, carbon footprint, centralized clearinghouse, cloud computing, connected car, cryptocurrency, data acquisition, Debian, disintermediation, disruptive innovation, distributed ledger, Dogecoin, domain-specific language, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, full stack developer, general-purpose programming language, gravity well, information security, initial coin offering, interest rate swap, Internet of things, litecoin, loose coupling, machine readable, MITM: man-in-the-middle, MVC pattern, Network effects, new economy, node package manager, Oculus Rift, peer-to-peer, platform as a service, prediction markets, QR code, RAND corporation, Real Time Gross Settlement, reversible computing, RFC: Request For Comment, RFID, ride hailing / ride sharing, Satoshi Nakamoto, seminal paper, single page application, smart cities, smart contracts, smart grid, smart meter, supply-chain management, transaction costs, Turing complete, Turing machine, Vitalik Buterin, web application, x509 certificate

Transparency, auditability, and integrity are attributes of blockchain that can go a long way in effectively managing various government functions. Border control Automated border control systems have been in use for decades now to thwart illegal entry into countries and prevent terrorism and human trafficking. Machine-readable travel documents and specifically biometric passports have paved the way for automated border control; however current systems are limited to a certain extent and blockchain technology can provide solutions. A Machine Readable Travel Document (MRTD) standard is defined in document ICAO 9303 (https://www.icao.int/publications/pages/publication.aspx?docnum=9303) by the International Civil Aviation Organization (ICAO) and has been implemented by many countries around the world.

A Ricardian contract is a document that has several of the following properties: A contract offered by an issuer to holders A valuable right held by holders and managed by the issuer Easily readable by people (like a contract on paper) Readable by programs (parsable, like a database) Digitally signed Carries the keys and server information Allied with a unique and secure identifier The preceding information is based on the original definition by Ian Grigg at http://iang.org/papers/ricardian_contract.html. In practice, the contracts are implemented by producing a single document that contains the terms of the contract in legal prose and the required machine-readable tags. This document is digitally signed by the issuer using their private key. This document is then hashed using a message digest function to produce a hash by which the document can be identified. This hash is then further used and signed by parties during the performance of the contract to link each transaction, with the identifier hash thus serving as an evidence of intent.

This hash is then further used and signed by parties during the performance of the contract to link each transaction, with the identifier hash thus serving as an evidence of intent. This is depicted in the next diagram, usually called a bowtie model. The diagram shows number of elements: The World of Law on the left-hand side from where the document originates. This document is a written contract in legal prose with some machine-readable tags. This document is then hashed. The resultant message digest is used as an identifier throughout the World of Accountancy, shown on the right-hand side of the diagram. The World of Accountancy element represents any accounting, trading, and information systems that are being used in the business to perform various business operations.


pages: 527 words: 147,690

Terms of Service: Social Media and the Price of Constant Connection by Jacob Silverman

"World Economic Forum" Davos, 23andMe, 4chan, A Declaration of the Independence of Cyberspace, Aaron Swartz, Airbnb, airport security, Amazon Mechanical Turk, augmented reality, basic income, Big Tech, Brian Krebs, California gold rush, Californian Ideology, call centre, cloud computing, cognitive dissonance, commoditize, company town, context collapse, correlation does not imply causation, Credit Default Swap, crowdsourcing, data science, deep learning, digital capitalism, disinformation, don't be evil, driverless car, drone strike, Edward Snowden, Evgeny Morozov, fake it until you make it, feminist movement, Filter Bubble, Firefox, Flash crash, game design, global village, Google Chrome, Google Glasses, Higgs boson, hive mind, Ian Bogost, income inequality, independent contractor, informal economy, information retrieval, Internet of things, Jacob Silverman, Jaron Lanier, jimmy wales, John Perry Barlow, Kevin Kelly, Kevin Roose, Kickstarter, knowledge economy, knowledge worker, Larry Ellison, late capitalism, Laura Poitras, license plate recognition, life extension, lifelogging, lock screen, Lyft, machine readable, Mark Zuckerberg, Mars Rover, Marshall McLuhan, mass incarceration, meta-analysis, Minecraft, move fast and break things, national security letter, Network effects, new economy, Nicholas Carr, Occupy movement, off-the-grid, optical character recognition, payday loans, Peter Thiel, planned obsolescence, postindustrial economy, prediction markets, pre–internet, price discrimination, price stability, profit motive, quantitative hedge fund, race to the bottom, Ray Kurzweil, real-name policy, recommendation engine, rent control, rent stabilization, RFID, ride hailing / ride sharing, Salesforce, self-driving car, sentiment analysis, shareholder value, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Snapchat, social bookmarking, social graph, social intelligence, social web, sorting algorithm, Steve Ballmer, Steve Jobs, Steven Levy, systems thinking, TaskRabbit, technological determinism, technological solutionism, technoutopianism, TED Talk, telemarketer, transportation-network company, Travis Kalanick, Turing test, Uber and Lyft, Uber for X, uber lyft, universal basic income, unpaid internship, women in the workforce, Y Combinator, yottabyte, you are the product, Zipcar

Thomson Reuters, the parent company of the Reuters newswire, has gotten into the sentiment analysis business, examining more than four million blogs and social-media feeds. They claim to be able to offer forecasts of how individual stocks will do, in addition to rating sources and offering big-picture analysis about the state (and sentiment) of the market. Their rival Dow Jones, parent company of the Wall Street Journal, also offers a “machine-readable news” feed that can be plugged into automated trading platforms. This kind of information is chum in the water for hedge funds, which will pay to get practically any information that their competitors don’t have—or pay to get it just a few milliseconds earlier than their peers. Derwent Capital Markets examined 250 million tweets daily and reportedly beat the market in its first month, earning 1.85 percent against a 2.2 percent drop in the S&P 500.

Google Glass could become a kind of roving emotion-meter, providing you with voice analysis of everyone you meet. On a more conceptual level, voice analysis and sentiment analysis are about finding out what you think and feel: your “mood graph.” Social-media companies really would like to know what you are thinking at all times, but they need the data to be machine-readable, which is why we’re prompted to structure our data by tagging emotions, companies, people, and places and why forms of computational analysis promise to automate this process. The data can then be mined and sold on to advertisers, market researchers, and other partners. At its most expansive, this process is an EKG for not only individual opinions but also those of whole demographics, cultures, and communities.

“It can easily be applied to large numbers of people without obtaining their individual consent and without them noticing.” This process will likely develop into a two-way system. As networks begin to understand how we think and feel, they will prompt us for more information or suggest emotional responses, all of which will be machine-readable. They may also allow companies such as Facebook to help us stop self-censoring by pushing us to reconsider deleted updates or to post something when they detect a change in our mood. The writer Nicholas Carr envisions a system that “automates the feels”: “Whenever you write a message or update, the camera in your smartphone or tablet will ‘read’ your eyes and your facial expression, precisely calculate your mood, and append the appropriate emoji.


pages: 570 words: 115,722

The Tangled Web: A Guide to Securing Modern Web Applications by Michal Zalewski

barriers to entry, business process, defense in depth, easy for humans, difficult for computers, fault tolerance, finite state, Firefox, Google Chrome, information retrieval, information security, machine readable, Multics, RFC: Request For Comment, semantic web, Steve Jobs, telemarketer, Tragedy of the Commons, Turing test, Vannevar Bush, web application, WebRTC, WebSocket

A typical, delightfully baroque example of the resulting taxonomy may be this: Improper Enforcement of Message or Data Structure Failure to Sanitize Data into a Different Plane Improper Control of Resource Identifiers Insufficient Filtering of File and Other Resource Names for Executable Content Today, there are about 800 names in the CWE dictionary, most of which are as discourse-enabling as the one quoted here. A slightly different school of naturalist thought is manifested in projects such as the Common Vulnerability Scoring System (CVSS), a business-backed collaboration that aims to strictly quantify known security problems in terms of a set of basic, machine-readable parameters. A real-world example of the resulting vulnerability descriptor may be this: AV:LN / AC:L / Au:M / C:C / I:N / A:P / E:F / RL:T / RC:UR / CDP:MH / TD:H / CR:M / IR:L / AR:M Organizations and researchers are expected to transform this 14-dimensional vector in a carefully chosen, use-specific way in order to arrive at some sort of objective, verifiable, numerical conclusion about the significance of the underlying bug (say, “42”), precluding the need to judge the nature of security flaws in any more subjective fashion.

Alas, any useful implementation of the design was out of reach at that time, so, beyond futuristic visions, nothing much happened until transistor-based computers took center stage. The next tangible milestone, in the 1960s, was the arrival of IBM’s Generalized Markup Language (GML), which allowed for the annotation of documents with machine-readable directives indicating the function of each block of text, effectively saying “this is a header,” “this is a numbered list of items,” and so on. Over the next 20 years or so, GML (originally used by only a handful of IBM text editors on bulky mainframe computers) became the foundation for Standard Generalized Markup Language (SGML), a more universal and flexible language that traded an awkward colon- and period-based syntax for a familiar angle-bracketed one.

The Battle over Semantics The low-level syntax of the language aside, HTML is also the subject of a fascinating conceptual struggle: a clash between the ideology and the reality of the online world. Tim Berners-Lee always championed the vision of a semantic web, an interconnected system of documents in which every functional block, such as a citation, a snippet of code, a mailing address, or a heading, has its meaning explained by an appropriate machine-readable tag (say, <cite>, <code>, <address>, or <h1> to <h6>). This approach, he and other proponents argued, would make it easier for machines to crawl, analyze, and index the content in a meaningful way, and in the near future, it would enable computers to reason using the sum of human knowledge.


pages: 233 words: 62,563

Zero: The Biography of a Dangerous Idea by Charles Seife

Albert Einstein, Albert Michelson, Arthur Eddington, Cepheid variable, cosmological constant, dark matter, Eddington experiment, Edmond Halley, Georg Cantor, heat death of the universe, Isaac Newton, Johannes Kepler, John Conway, machine readable, Pierre-Simon Laplace, place-making, probability theory / Blaise Pascal / Pierre de Fermat, retrograde motion, Richard Feynman, Stephen Hawking

New York: Simon and Schuster, 1988. Herodotus. The Histories. Trans. Aubrey de Selincourt. London: Penguin Books, 1954. Hesiod. Theogony. In The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White. Cambridge, Mass.: Harvard University Press; London: William Heinemann, Ltd., 1914. (Machine readable text.) Hoffman, Paul. The Man Who Loved Only Numbers. New York: Hyperion, 1998. ———. “The Man Who Loves Only Numbers.” The Atlantic Monthly, November 1987: 60. Hooper, Alfred. Makers of Mathematics. New York: Random House, 1948. Horgan, John. The End of Science. Reading, Mass.: Addison-Wesley, 1996.

From Plato in Twelve Volumes, Vol. 1 translated by Harold North Fowler; introduction by W. R. M. Lamb (1966); Vol. 3 translated by W. R. M. Lamb (1967); Vol. 4 translated by Harold North Fowler (1977); Vol. 9 translated by Harold N. Fowler (1925). Cambridge, Mass.: Harvard University Press; London: William Heinemann, Ltd., 1966, 1967, 1977. (Machine readable text.) Plaut, Gunther. The Torah: A Modern Commentary. New York: The Union of American Hebrew Congregations, 1981. Plutarch. Makers of Rome. Trans. Ian Scott-Kilvert. London: Penguin Books, 1965. Plutarch on Sparta. Trans. Richard J. A. Talbert. London: Penguin Books, 1988. The Poetic Edda.

Cambridge, Mass.: The MIT Press, 1987. White, Michael. The Last Sorcerer. Reading, Mass.: Addison-Wesley, 1997. Xenophon. Hellenica. Trans. Carleton L. Brownson. Vols. 1–2, Xenophon in Seven Volumes. Cambridge, Mass.: Harvard University Press; London: William Heinemann, Ltd.; Vol. 1, 1985; Vol. 2, 1986. (Machine readable text.) Web Sites Papyrus of Ani; Egyptian Book of the Dead. Trans. E. A. Wallis Budge. http://www.sas.upenn.edu/African_Studies/Books/Papyrus_Ani.html Clement of Alexandria. The Stromata. http://www.webcom.com/~gnosis/library/strom4.htm “The Life of Hypatia.” http://www.cosmopolis.com/alexandria/ “Frequently Asked Questions in Mathematics.” http://www.cs.unb.ca/~alopez-o/math-faq/ Odenwald, Sten.


pages: 259 words: 67,456

The Mythical Man-Month by Brooks, Jr. Frederick P.

Boeing 747, Conway's law, finite state, HyperCard, Ken Thompson, machine readable, Menlo Park, Multics, no silver bullet, seminal paper, sorting algorithm, speech recognition, Steve Jobs, Strategic Defense Initiative, Tacoma Narrows Bridge, Turing machine, work culture

The administrator and the editor will each need a secretary; the administrator's secretary will handle project correspondence and non-product files. The program clerk. He is responsible for maintaining all the technical records of the team in a programming-product library. The clerk is trained as a secretary and has responsibility for both machine-readable and human-readable files. All computer input goes to the clerk, who logs and keys it if required. The output listings go back to him to be filed and indexed. The most recent runs of any model are kept in a status notebook; all previous ones are filed in a chronological archive. Absolutely vital to Mills's concept is the transformation of programming "from private art to public practice" by making all the computer runs visible to all team members and identifying all programs and data as team property, not private property.

Self-Documenting Programs A basic principle of data processing teaches the folly of trying to maintain independent files in synchronism. It is far better to combine them into one file with each record containing all the information both files held concerning a given key. Yet our practice in programming documentation violates our own teaching. We typically attempt to maintain a machine-readable form of a program and an independent set of human-readable documentation, consisting of prose and flow charts. The results in fact confirm our teachings about the folly of separate files. Program documentation is notoriously poor, and its maintenance is worse. Changes made in the program do not promptly, accurately, and invariably appear in the paper.

Label statements in groups to show correspondences to the statements in the algorithm description in the literature. Use indenting to show structure and grouping. Add logical flow arrows to the listing by hand. They are very helpful in debugging and changing. They may be incorporated in the right margin of the comments space, and made part of the machine-readable text. Use line comments or remark anything that is not obvious. If the techniques above have been used, these will be short and fewer in number than is customary. Put multiple statements on one line, or one statement on several lines to match thought-grouping and to show correspondence to other algorithm description.


Pocket New York City Travel Guide by Lonely Planet

Airbnb, Chuck Templeton: OpenTable:, Cornelius Vanderbilt, East Village, Frank Gehry, G4S, gentrification, ghettoisation, machine readable, messenger bag, retail therapy, Saturday Night Live, starchitect, the High Line, urban renewal, walking around money

You must obtain a visa from a US embassy or consulate in your home country if you: › do not currently hold a passport from a VWP country › are from a VWP country, but don’t have a machine-readable passport › are from a VWP country, but currently hold a passport issued between October 26, 2005, and October 25, 2006, that does not have a digital photo on the information page or an integrated chip from the data page. (After October 25, 2006, the integrated chip is required on all machine-readable passports.) › are planning to stay longer than 90 days › are planning to work or study in the US. Behind the Scenes Send us your feedback We love to hear from travellers – your comments keep us on our toes and help make our books better.

For detailed information on subway and bus wheelchair accessibility, call the Accessible Line ( 718-596-8585) or visit www.mta.info/mta/ada for a list of subway stations with elevators or escalators. Also visit www.nycgo.com and search for ‘accessibility.’ Visas The USA Visa Waiver Program (VWP) allows nationals from 36 countries to enter the US without a visa, provided they are carrying a machine-readable passport. For the updated list of countries included in the program and current requirements, see the US Department of State (http://travel.state.gov/visa) website. Citizens of VWP countries need to register with the US Department of Homeland Security (http://esta.cbp.dhs.gov) three days before their visit.


Free as in Freedom by Sam Williams

Asperger Syndrome, cognitive dissonance, commoditize, Compatible Time-Sharing System, Debian, Douglas Engelbart, East Village, Eben Moglen, Free Software Foundation, Guido van Rossum, Hacker Ethic, informal economy, Isaac Newton, John Conway, John Gilmore, John Markoff, Ken Thompson, Larry Wall, machine readable, Marc Andreessen, Maui Hawaii, Multics, Murray Gell-Mann, PalmPilot, profit motive, Project Xanadu, Richard Stallman, Silicon Valley, slashdot, software patent, Steven Levy, Ted Nelson, the Cathedral and the Bazaar, urban renewal, VA Linux, Y2K

Show us your code. Show us it can be done.'" In true hacker fashion, Stallman began looking for existing programs and tools that could be converted into GNU programs and tools. One of the first was a compiler named VUCK, which converted programs written in the popular C programming language into machine-readable code. Translated from the Dutch, the program's acronym stood for the Free University Compiler Kit. Optimistic, Stallman asked the program's 90 author if the program was free. When the author informed him that the words "Free University" were a reference to the Vrije Universiteit in Amsterdam, Stallman was chagrined.

The "Invariant Sections" are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the Document is released under this License. The "Cover Texts" are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, whose contents can be viewed and edited directly and straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters.

If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages. If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a publicly-accessible computer-network location containing a complete Transparent copy of the Document, free of added material, which the general network-using public has access to download anonymously at no charge using public-standard network protocols.


pages: 402 words: 110,972

Nerds on Wall Street: Math, Machines and Wired Markets by David J. Leinweber

"World Economic Forum" Davos, AI winter, Alan Greenspan, algorithmic trading, AOL-Time Warner, Apollo 11, asset allocation, banking crisis, barriers to entry, Bear Stearns, Big bang: deregulation of the City of London, Bob Litterman, book value, business cycle, butter production in bangladesh, butterfly effect, buttonwood tree, buy and hold, buy low sell high, capital asset pricing model, Charles Babbage, citizen journalism, collateralized debt obligation, Cornelius Vanderbilt, corporate governance, Craig Reynolds: boids flock, creative destruction, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, Danny Hillis, demand response, disintermediation, distributed generation, diversification, diversified portfolio, electricity market, Emanuel Derman, en.wikipedia.org, experimental economics, fake news, financial engineering, financial innovation, fixed income, Ford Model T, Gordon Gekko, Hans Moravec, Herman Kahn, implied volatility, index arbitrage, index fund, information retrieval, intangible asset, Internet Archive, Ivan Sutherland, Jim Simons, John Bogle, John Nash: game theory, Kenneth Arrow, load shedding, Long Term Capital Management, machine readable, machine translation, Machine translation of "The spirit is willing, but the flesh is weak." to Russian and back, market fragmentation, market microstructure, Mars Rover, Metcalfe’s law, military-industrial complex, moral hazard, mutually assured destruction, Myron Scholes, natural language processing, negative equity, Network effects, optical character recognition, paper trading, passive investing, pez dispenser, phenotype, prediction markets, proprietary trading, quantitative hedge fund, quantitative trading / quantitative finance, QWERTY keyboard, RAND corporation, random walk, Ray Kurzweil, Reminiscences of a Stock Operator, Renaissance Technologies, risk free rate, risk tolerance, risk-adjusted returns, risk/return, Robert Metcalfe, Ronald Reagan, Rubik’s Cube, Savings and loan crisis, semantic web, Sharpe ratio, short selling, short squeeze, Silicon Valley, Small Order Execution System, smart grid, smart meter, social web, South Sea Bubble, statistical arbitrage, statistical model, Steve Jobs, Steven Levy, stock buybacks, Tacoma Narrows Bridge, the scientific method, The Wisdom of Crowds, time value of money, tontine, too big to fail, transaction costs, Turing machine, two and twenty, Upton Sinclair, value at risk, value engineering, Vernor Vinge, Wayback Machine, yield curve, Yogi Berra, your tax dollars at work

They provided a picture of the data, the last trade, and the quote. It was the same information one would find by grabbing the end of a paper ticker tape and running it back to find the newest information for the stock of interest. This was literally what people did for a long time to get current quotes. With the advent of true machine-readable market data—the text frontier—it was not long before these basic, simple text “pictures of Gr eatest Hits of Computation in Finance 35 Figure 2.2 Market data systems: then and now. Courtesy of New York Stock Exchange and Thomson Reuters. data” were replaced by screens with an increasing variety of market charts showing both common and customized analytics.

Summary (and Sermonette) These dairy product and calendar examples are obviously contrived. They are not far removed from many ill-conceived quantitative investment and trading ideas. It is just as easy to fool yourself with ideas that are plausible-sounding and no more valid. Just because something appears plausible, that doesn’t mean that it is. The wide availability of machine-readable data, and the tools to analyze it, easily means that there are a lot more regressions going on than Legendre could ever have imagined back in 1805. If you look at 100 regressions that are significant at a level of 95 percent, five of them are there just by chance. Look at 100,000 models at 95 percent significance, and 5,000 are false positives.

In designing MarketMind (and later QuantEx), the goal was not to use AI for its own sake, but rather to apply AI techniques where they could be used appropriately and within their limits to provide an advantage over conventional technologies. A clue to the question of how to apply AI in trading is found by looking at the many thousands of electronic trading support systems that were already in use. A new product must provide a readily perceptible advantage over those systems. Real Charting Soon after reliable machine-readable market data became available in the mid-1980s, there were many services available to traders that would let them put a chart on the screen. As desktop computers became more powerful, people would put more graphs on the screen, and go through them more rapidly. They would look for patterns or relationships and often take some action when they found them.


pages: 761 words: 80,914

Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way by Lorin Hochstein

Amazon Web Services, cloud computing, continuous integration, Debian, DevOps, domain-specific language, don't repeat yourself, general-purpose programming language, Infrastructure as a Service, job automation, machine readable, MITM: man-in-the-middle, pull request, side project, smart transportation, web application

Let’s work through an example of creating a dynamic inventory script that retrieves the details about hosts from Vagrant.2 Our dynamic inventory script is going to need to invoke the vagrant status command. The output shown in Example 3-11 is designed for humans to read, rather than for machines to parse. We can get a list of running hosts in a format that is easier to parse with the --machine-readable flag, like so: $ vagrant status --machine-readable The output looks like this: 1410577818,vagrant1,provider-name,virtualbox 1410577818,vagrant1,state,running 1410577818,vagrant1,state-human-short,running 1410577818,vagrant1,state-human-long,The VM is running. To stop this VM%!(VAGRANT _COMMA) you can run `vagrant halt` to\nshut it down forcefully%!

/usr/bin/env python # Adapted from Mark Mandel's implementation # https://github.com/ansible/ansible/blob/devel/plugins/inventory/vagrant.py # License: GNU General Public License, Version 3 <http://www.gnu.org/licenses/> import argparse import json import paramiko import subprocess import sys def parse_args(): parser = argparse.ArgumentParser(description="Vagrant inventory script") group = parser.add_mutually_exclusive_group(required=True) group.add_argument('--list', action='store_true') group.add_argument('--host') return parser.parse_args() def list_running_hosts(): cmd = "vagrant status --machine-readable" status = subprocess.check_output(cmd.split()).rstrip() hosts = [] for line in status.split('\n'): (_, host, key, value) = line.split(',') if key == 'state' and value == 'running': hosts.append(host) return hosts def get_host_details(host): cmd = "vagrant ssh-config {}".format(host) p = subprocess.Popen(cmd.split(), stdout=subprocess.PIPE) config = paramiko.SSHConfig() config.parse(p.stdout) c = config.lookup(host) return {'ansible_ssh_host': c['hostname'], 'ansible_ssh_port': c['port'], 'ansible_ssh_user': c['user'], 'ansible_ssh_private_key_file': c['identityfile'][0]} def main(): args = parse_args() if args.list: hosts = list_running_hosts() json.dump({'vagrant': hosts}, sys.stdout) else: details = get_host_details(args.host) json.dump(details, sys.stdout) if __name__ == '__main__': main() Pre-Existing Inventory Scripts Ansible ships with several dynamic inventory scripts that you can use.


pages: 394 words: 118,929

Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software by Scott Rosenberg

A Pattern Language, AOL-Time Warner, Benevolent Dictator For Life (BDFL), Berlin Wall, Bill Atkinson, c2.com, call centre, collaborative editing, Computer Lib, conceptual framework, continuous integration, Do you want to sell sugared water for the rest of your life?, Donald Knuth, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, Dynabook, en.wikipedia.org, Firefox, Ford Model T, Ford paid five dollars a day, Francis Fukuyama: the end of history, Free Software Foundation, functional programming, General Magic , George Santayana, Grace Hopper, Guido van Rossum, Gödel, Escher, Bach, Howard Rheingold, HyperCard, index card, intentional community, Internet Archive, inventory management, Ivan Sutherland, Jaron Lanier, John Markoff, John Perry Barlow, John von Neumann, knowledge worker, L Peter Deutsch, Larry Wall, life extension, Loma Prieta earthquake, machine readable, Menlo Park, Merlin Mann, Mitch Kapor, Neal Stephenson, new economy, Nicholas Carr, no silver bullet, Norbert Wiener, pattern recognition, Paul Graham, Potemkin village, RAND corporation, Ray Kurzweil, Richard Stallman, Ronald Reagan, Ruby on Rails, scientific management, semantic web, side project, Silicon Valley, Singularitarianism, slashdot, software studies, source of truth, South of Market, San Francisco, speech recognition, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Stewart Brand, Strategic Defense Initiative, Ted Nelson, the Cathedral and the Bazaar, Therac-25, thinkpad, Turing test, VA Linux, Vannevar Bush, Vernor Vinge, Wayback Machine, web application, Whole Earth Catalog, Y2K

Which is all fine, except for the distressing fact that most of the human beings who use those machines habitually count from one. And so, down in the guts of the system, where data is stored and manipulated—representations of our money and our work lives and our imaginative creations all translated into machine-readable symbols—computer programs and programming languages often include little offsets, translations of “+1” or “-1,” to make sure that the list of stuff the computer is counting from zero stays in sync with the list of stuff a human user is counting from one. In the binary digital world of computers, all information is reduced to sequences of zeros and ones.

(Monty Python’s form-smashing absurdism has always found some of its truest fans in computer labs; we call the flood of unsolicited and unwanted email “spam” thanks to the Internet pioneers who, looking to name the phenomenon, recalled a Python routine featuring a luncheonette menu offering nothing but variations on “eggs, sausage, spam, spam, spam, and spam.”) Python is an interpreted language. Where compiled languages run programmers’ source code through a compiler ahead of time to translate it into machine-readable binary code, interpreted languages perform that translation when you run the program. The source code gets translated line by line by the interpreter and fed to the processor for execution. This makes interpreted languages less efficient, since you’re always running two programs at once, the program you want to use and the interpreter.

Simonyi wants to give these subject matter experts a set of tools they can use to explain their intentions and needs in a structured way that the computer can understand. Intentional Software’s system will let the nonprogrammer experts define a set of problems—for a hospital administration program, say, they might catalog all the “actors,” their “roles,” tasks that need to be performed, and all other details—in a machine-readable format. That set of definitions, that model, is then fed into a generator program that spits out the end-product software. There is still work for programmers in building the tools for the subject matter experts and in writing the generator. But once that work is done, the nonprogrammers can tinker with their model and make changes in the software without ever needing to “make a humble request to the programmer.”


Data and the City by Rob Kitchin,Tracey P. Lauriault,Gavin McArdle

A Declaration of the Independence of Cyberspace, algorithmic management, bike sharing, bitcoin, blockchain, Bretton Woods, Chelsea Manning, citizen journalism, Claude Shannon: information theory, clean water, cloud computing, complexity theory, conceptual framework, corporate governance, correlation does not imply causation, create, read, update, delete, crowdsourcing, cryptocurrency, data science, dematerialisation, digital divide, digital map, digital rights, distributed ledger, Evgeny Morozov, fault tolerance, fiat currency, Filter Bubble, floating exchange rates, folksonomy, functional programming, global value chain, Google Earth, Hacker News, hive mind, information security, Internet of things, Kickstarter, knowledge economy, Lewis Mumford, lifelogging, linked data, loose coupling, machine readable, new economy, New Urbanism, Nicholas Carr, nowcasting, open economy, openstreetmap, OSI model, packet switching, pattern recognition, performance metric, place-making, power law, quantum entanglement, RAND corporation, RFID, Richard Florida, ride hailing / ride sharing, semantic web, sentiment analysis, sharing economy, Silicon Valley, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart contracts, smart grid, smart meter, social graph, software studies, statistical model, tacit knowledge, TaskRabbit, technological determinism, technological solutionism, text mining, The Chicago School, The Death and Life of Great American Cities, the long tail, the market place, the medium is the message, the scientific method, Toyota Production System, urban planning, urban sprawl, web application

According to this mapping: POST is used to create a resource on the server, GET is used to retrieve a resource, PUT is used to update or change the state of a resource, and DELETE used for removing a resource. RESTful services are easier to implement, maintain and utilize, but they do not have powerful and standard support for features like standard contract (or machine-readable service description) distributed transactions, composition and security, which are needed in most enterprise applications, and that is why Sharing and analysing data in smart cities 131 most enterprise applications implement Web Services (Daigneau 2011). In addition, there is no standard discovery mechanism for RESTful services other than HTTP OPTION, which only provides the list of available methods that are supported by a service.

A client (usually a service or software) can request an XML-encoded capabilities document (containing the names of feature types that can be accessed via WFS service, the spatial reference system(s), the spatial extent of the data and information about the operations that are supported) by sending the GetCapabilities request to the WFS service. The GetCapabilities operation is required for any OGC Web service. The purpose of the GetCapabilities operation is to obtain service metadata, which is a machine-readable (and also human-readable) description of the server’s information content and acceptable request parameter values. The purpose of the DescribeFeatureType operation in the WFS standard is to retrieve an XML schema document with a description of the data structure (or schema) of the feature types served by that WFS service.

For users inside the organization the WS-T provides the fastest possible communication speed. Also WS-T can be consumed by other organizations in a city if they have an appropriate service level agreement. Developing applications using WS-W and WS-T bindings is easier for professional developers (or enterprise developers) because the services have a machine-readable contract and creating consumer applications (proxy classes) is almost automatic using integrated development environments. REST endpoints can be used for accessing data and analysis which should be publicly available. The REST services are usually consumed for developing Web 2.0 applications and connected mobile applications (mobile apps that need to be always connected to the internet).


pages: 519 words: 142,646

Track Changes by Matthew G. Kirschenbaum

active measures, Alvin Toffler, Apollo 11, Apple II, Apple's 1984 Super Bowl advert, Bill Gates: Altair 8800, Buckminster Fuller, Charles Babbage, commoditize, computer age, Computer Lib, corporate governance, David Brooks, dematerialisation, Donald Knuth, Douglas Hofstadter, Dynabook, East Village, en.wikipedia.org, feminist movement, forensic accounting, future of work, Future Shock, Google Earth, Gödel, Escher, Bach, Haight Ashbury, HyperCard, Jason Scott: textfiles.com, Joan Didion, John Markoff, John von Neumann, Kickstarter, low earth orbit, machine readable, machine translation, mail merge, Marshall McLuhan, Mother of all demos, Neal Stephenson, New Journalism, Norman Mailer, off-the-grid, pattern recognition, pink-collar, planned obsolescence, popular electronics, Project Xanadu, RAND corporation, rolodex, Ronald Reagan, scientific management, self-driving car, Shoshana Zuboff, Silicon Valley, social web, Stephen Fry, Stephen Hawking, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, tacit knowledge, technoutopianism, Ted Nelson, TED Talk, text mining, thinkpad, Turing complete, Vannevar Bush, Whole Earth Catalog, Y2K, Year of Magical Thinking

Unsurprisingly, Continental philosophy and theory tried its best to account for these newfound qualities of writing. Friedrich Kittler used the example of word processing and specifically WordPerfect to launch the argument in his most famous refutation of the myth of digital transcendence, drawing attention to the difference between human- and machine-readable writing by noting that the actual word “WordPerfect” is too long to be faithfully rendered under the software’s own native DOS regimen of eight-character file names.76 For Kittler, word processing marked a definitive break with prior writing technologies because words stopped being mere signifiers and become executables instead: “Surely tapping the letter sequence of W, P, and Enter on [a] keyboard does not make the Word perfect, but this simple writing act starts the execution of WordPerfect.”77 And it does so without ambiguity, perfectly predictable each and every time.

The first indicates the actual system components that are to be involved—display, keyboard, printer, speakers, and so forth. The second presents the logical operations of the processor in schematic form. The third column, called the REROUTE, imposes conditionals or branching logic. The fourth and final column was for descriptive notes, human- rather than machine-readable text. Herbert and Barnard believed that a universal visual vocabulary for representing programming concepts would allow a larger number of people to not only use but in fact program computers. “If you can type a letter on a typewriter and tell a stranger how to get to your house, you can write your own programs,” they promised.63 Nonetheless, they understood at the time that the user would still have to manually transliterate the PROGRAMAP to an actual executable language like BASIC.

Users can choose the Hanx Writer in lieu of the IOS’s default text editor, and have the option of outputting their creations (overstrikes and all) to a variety of social media platforms. At the same time, the stylus, together with so-called smart pens, are presenting what is surely the most serious challenge to the keyboard in some time.32 Smart pens, which sync to a nearby digital storage device where the handwriting is interpreted and reproduced as machine-readable text, effectively replicate the input logic of the MT/ST and Redactron, allowing what happens on a sheet of paper to leave a symbolically stored record subject to ongoing manipulation and revision. One researcher at Microsoft is outfitting pens and tablet styluses with sensors to differentiate between different kinds of grips; the basic insight is that people hold the pen differently depending on what they intend to do with it—write, draw, poke at an icon on a screen.


Digital Transformation at Scale: Why the Strategy Is Delivery by Andrew Greenway,Ben Terrett,Mike Bracken,Tom Loosemore

Airbnb, behavioural economics, bitcoin, blockchain, butterfly effect, call centre, chief data officer, choice architecture, cognitive dissonance, cryptocurrency, data science, Diane Coyle, en.wikipedia.org, fail fast, G4S, hype cycle, Internet of things, Kevin Kelly, Kickstarter, loose coupling, M-Pesa, machine readable, megaproject, minimum viable product, nudge unit, performance metric, ransomware, robotic process automation, Silicon Valley, social web, The future is already here, the long tail, the market place, The Wisdom of Crowds, work culture

The chances of it delivering artful ­machine-learning-led services without fundamentally changing the institution itself are slim to none too. One indicator of an organisation’s maturity and readiness for this next wave of technologies – assuming that it already has a digital working culture in place – is how it looks after its data. If an institution knows what data it owns, makes it machine readable, and has considered the data protection and privacy issues that come with the responsibility of looking after it, it might have a fighting chance. Without those things, forget it. Whatever the hype may be, new technologies like machine learning are forcing the right questions into the open.

The good news is that you can start small. Until very recently, the UK government didn’t have a single agreed list of countries. Instead, there were scores of lists, some out of date, some incomplete, some with alternative names. The lack of consistency is maddening enough for people, but more crucially, makes the reliable use of machine-readable data near impossible. A register of single countries is now available for every department to use. It’s a start. Central power The role of the centre in a platform government is up for debate. Most of the argument centres on what role a central department or institution should be responsible for designing and running platforms, versus playing a convener, standard-setting role, versus butting out and gently encouraging departments to play nicely.


pages: 484 words: 104,873

Rise of the Robots: Technology and the Threat of a Jobless Future by Martin Ford

3D printing, additive manufacturing, Affordable Care Act / Obamacare, AI winter, algorithmic management, algorithmic trading, Amazon Mechanical Turk, artificial general intelligence, assortative mating, autonomous vehicles, banking crisis, basic income, Baxter: Rethink Robotics, Bernie Madoff, Bill Joy: nanobots, bond market vigilante , business cycle, call centre, Capital in the Twenty-First Century by Thomas Piketty, carbon tax, Charles Babbage, Chris Urmson, Clayton Christensen, clean water, cloud computing, collateralized debt obligation, commoditize, computer age, creative destruction, data science, debt deflation, deep learning, deskilling, digital divide, disruptive innovation, diversified portfolio, driverless car, Erik Brynjolfsson, factory automation, financial innovation, Flash crash, Ford Model T, Fractional reserve banking, Freestyle chess, full employment, general purpose technology, Geoffrey Hinton, Goldman Sachs: Vampire Squid, Gunnar Myrdal, High speed trading, income inequality, indoor plumbing, industrial robot, informal economy, iterative process, Jaron Lanier, job automation, John Markoff, John Maynard Keynes: technological unemployment, John von Neumann, Kenneth Arrow, Khan Academy, Kiva Systems, knowledge worker, labor-force participation, large language model, liquidity trap, low interest rates, low skilled workers, low-wage service sector, Lyft, machine readable, machine translation, manufacturing employment, Marc Andreessen, McJob, moral hazard, Narrative Science, Network effects, new economy, Nicholas Carr, Norbert Wiener, obamacare, optical character recognition, passive income, Paul Samuelson, performance metric, Peter Thiel, plutocrats, post scarcity, precision agriculture, price mechanism, public intellectual, Ray Kurzweil, rent control, rent-seeking, reshoring, RFID, Richard Feynman, Robert Solow, Rodney Brooks, Salesforce, Sam Peltzman, secular stagnation, self-driving car, Silicon Valley, Silicon Valley billionaire, Silicon Valley startup, single-payer health, software is eating the world, sovereign wealth fund, speech recognition, Spread Networks laid a new fibre optics cable between New York and Chicago, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Steven Levy, Steven Pinker, strong AI, Stuxnet, technological singularity, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Coming Technological Singularity, The Future of Employment, the long tail, Thomas L Friedman, too big to fail, Tragedy of the Commons, Tyler Cowen, Tyler Cowen: Great Stagnation, uber lyft, union organizing, Vernor Vinge, very high income, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, women in the workforce

As quoted in Kadim Shubber, “Artificial Artists: When Computers Become Creative,” Wired Magazine–UK, August 13, 2007, http://www.wired.co.uk/news/archive/2013–08/07/can-computers-be-creative/viewgallery/306906. 41. Shubber, “Artificial Artists: When Computers Become Creative.” 42. “Bloomberg Bolsters Machine-Readable News Offering,” The Trade, February 19, 2010, http://www.thetradenews.com/News/Operations_Technology/Market_data/Bloomberg_bolsters_machine-readable_news_offering.aspx. 43. Neil Johnson, Guannan Zhao, Eric Hunsader, Hong Qi, Nicholas Johnson, Jing Meng, and Brian Tivnan, “Abrupt Rise of New Machine Ecology Beyond Human Response Time,” Nature, September 11, 2013, http://www.nature.com/srep/2013/130911/srep02627/full/srep02627.html. 44.

They attempt to profit by detecting and then snapping up shares in front of huge transactions initiated by mutual funds and pension managers. They seek to deceive other algorithms by inundating the system with decoy bids that are then withdrawn within tiny fractions of a second. Both Bloomberg and Dow News Service offer special machine-readable products designed to feed the algorithms’ voracious appetites for financial news that they can—perhaps within milliseconds—turn into profitable trades. The news services also provide real-time metrics that let the machines see which items are attracting the most attention.42 Twitter, Facebook, and the blogosphere are likewise all fodder for these competing algorithms.


pages: 408 words: 105,715

Kingdom of Characters: The Language Revolution That Made China Modern by Jing Tsu

affirmative action, British Empire, computer age, Deng Xiaoping, Frederick Winslow Taylor, Great Leap Forward, information retrieval, invention of movable type, machine readable, machine translation, Menlo Park, natural language processing, Norbert Wiener, QWERTY keyboard, scientific management, Silicon Valley, smart cities, South China Sea, transcontinental railway

* * * • • • In the early 1960s, the Library of Congress decided to embark on a massive automation project. It would build a universal catalog system, the kind that the Chinese librarian Bismarck Doo had dreamt of decades earlier but powered by computers. The Library of Congress began converting its paper catalog to a searchable digital index. With this machine-readable system, a user would be able to look up a title in a library thousands of miles away and at any time of the day, as long as he or she had access to a computer. Millions of catalog cards were made obsolete. The project turned the bookish craft of library cataloging into the sleek discipline of information science.

Driven by an urgent mission to contain the global spread of communism, academics, librarians, and the government worked together to build up a knowledge base about China. In the 1960s alone, East Asian libraries acquired as many new holdings as they had during the course of the entire previous century. Digitizing these collections would be a challenge, because machine-readable databases could not accommodate non-Roman script languages like Hebrew, Arabic, Persian, or any of the East Asian languages. A number of American foundations finally took action. In November 1979, the American Council of Learned Societies (ACLS) sponsored a conference titled East Asian Character Processing in Automated Bibliographic Systems at Stanford University.

If two characters look alike, but are semantically different, however, they get separate coding. Whether a character should be unified with another can be a hard call to make, but someone has to make it. The Chinese script so far has defied most attempts to systematize it in a complete way. Should there be a future technology for writing even more exacting than machine-readable codes, any judgment call made by a human user today might very well be seen as an inconsistency later, which would entail more corrections. But no matter, as Lu urges whenever the IRG delegates are locked in stalemates and heated arguments, “we must go on.” And they do. One could see the IRG’s workload as essentially a denial-of-service attack by an unwieldy language: the Chinese script having its revenge on Western technology.


pages: 39 words: 4,665

Data Source Handbook by Pete Warden

en.wikipedia.org, machine readable, Menlo Park, openstreetmap, phenotype, social graph

><toplevel> <CompleteSuggestion><suggestion data="san francisco <num_queries int="77100000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="20700000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="122000000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="6830000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="103000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="3330000"/></CompleteSuggestion> <CompleteSuggestion> is in what county"/> is full of characters"/> is known for"/> is weird"/> is for carnivores"/> is boring"/> Search Terms | 15 <suggestion data="san francisco is the best city in <num_queries int="63800000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="24100000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="11200000"/></CompleteSuggestion> <CompleteSuggestion><suggestion data="san francisco <num_queries int="409000"/></CompleteSuggestion> </toplevel> the world"/> is gay"/> is burning"/> is overrated"/> Wolfram Alpha The Wolfram Alpha platform pulls together a very broad range of facts and figures on everything from chemistry to finance. The REST API takes in some search terms as input, and returns an XML document containing the results. The output is a series of sections called pods, each containing text and images ready to display to users. Unfortunately there’s no easy way to get a machine-readable version of this information, so you can’t do further processing on the data within your application. It’s still a rich source of supplemental data to add into your own search results, though, which is how Bing is using the service. If you’re a noncommercial user, you can make up to 2,000 queries a month for free, and you can experiment with the interactive API console if you want to explore the service.


pages: 292 words: 62,575

97 Things Every Programmer Should Know by Kevlin Henney

A Pattern Language, active measures, Apollo 11, business intelligence, business logic, commoditize, continuous integration, crowdsourcing, database schema, deliberate practice, domain-specific language, don't repeat yourself, Donald Knuth, fixed income, functional programming, general-purpose programming language, Grace Hopper, index card, inventory management, job satisfaction, level 1 cache, loose coupling, machine readable, Silicon Valley, sorting algorithm, The Wisdom of Crowds

Learn Foreign Languages Klaus Marquardt PROGRAMMERS NEED TO COMMUNICATE. A lot. There are periods in a programmer's life when most communication seems to be with the computer—more precisely, with the programs running on that computer. This communication is about expressing ideas in a machine-readable way. This remains an exhilarating prospect: programs are ideas turned into reality, with virtually no physical substance involved. Programmers need to be fluent in the language of the machine, whether real or virtual, and in the abstractions that can be related to that language via development tools.

Good programmers need to be able to stand outside their daily routine, to be aware of other languages that are expressive for other purposes. The time always comes when this pays off. Beyond communication with machines, programmers need to communicate with their peers. Today's large projects are more social endeavors than simply the applied art of programming. It is important to understand and express more than the machine-readable abstractions can. Most of the best programmers I know are also very fluent in their mother tongue, and typically in other languages as well. This is not just about communication with others: speaking a language well also leads to a clarity of thought that is indispensable when abstracting a problem.


pages: 58 words: 12,386

Big Data Glossary by Pete Warden

business intelligence, business logic, crowdsourcing, fault tolerance, functional programming, information retrieval, linked data, machine readable, natural language processing, recommendation engine, web application

Natural Language Toolkit The NLTK is a collection of Python modules and datasets that implement common natural language processing techniques. It offers the building blocks that you need to build more complex algorithms for specific problems. For example, you can use it to break up texts into sentences, break sentences into words, stem words by removing common suffixes (like -ing from English verbs), or use machine-readable dictionaries to spot synonyms. The framework is used by most researchers in the field, so you’ll often find cutting-edge approaches included as modules or as algorithms built from its modules. There are also a large number of compatible datasets available, as well as ample documentation. NLTK isn’t aimed at developers looking for an off-the-shelf solution to domain-specific problems.


pages: 252 words: 72,473

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy by Cathy O'Neil

Affordable Care Act / Obamacare, Alan Greenspan, algorithmic bias, Bernie Madoff, big data - Walmart - Pop Tarts, call centre, Cambridge Analytica, carried interest, cloud computing, collateralized debt obligation, correlation does not imply causation, Credit Default Swap, credit default swaps / collateralized debt obligations, crowdsourcing, data science, disinformation, electronic logging device, Emanuel Derman, financial engineering, Financial Modelers Manifesto, Glass-Steagall Act, housing crisis, I will remember that I didn’t make the world, and it doesn’t satisfy my equations, Ida Tarbell, illegal immigration, Internet of things, late fees, low interest rates, machine readable, mass incarceration, medical bankruptcy, Moneyball by Michael Lewis explains big data, new economy, obamacare, Occupy movement, offshore financial centre, payday loans, peer-to-peer lending, Peter Thiel, Ponzi scheme, prediction markets, price discrimination, quantitative hedge fund, Ralph Nader, RAND corporation, real-name policy, recommendation engine, Rubik’s Cube, Salesforce, Sharpe ratio, statistical model, tech worker, Tim Cook: Apple, too big to fail, Unsafe at Any Speed, Upton Sinclair, Watson beat the top human players on Jeopardy!, working poor

Replacing a worker earning $50,000 a year: Heather Boushey and Sarah Jane Glynn, “There Are Significant Business Costs to Replacing Employees,” American Progress, November 16, 2012, www.​americanprogress.​org/​issues/​labor/​report/​2012/​11/​16/​44464/​there-​are-​significant-​business-​costs-​to-​replacing-​employees/. Evolv: Jessica Leber, “The Machine-Readable Workforce: Companies Are Analyzing More Data to Guide How They Hire, Recruit, and Promote Their Employees,” MIT Technology Review, May 27, 2013, www.​technologyreview.​com/​news/​514901/​the-​machine-​readable-​workforce/. A pioneer in this field is Gild: Jeanne Meister, “2015: Social HR Becomes A Reality,” Forbes, January 5, 2015, www.​forbes.​com/​sites/​jeannemeister/​2015/​01/​05/​2015-​social-​hr-​becomes-​a-​reality/.


pages: 434 words: 77,974

Mastering Blockchain: Unlocking the Power of Cryptocurrencies and Smart Contracts by Lorne Lantz, Daniel Cawrey

air gap, altcoin, Amazon Web Services, barriers to entry, bitcoin, blockchain, business logic, business process, call centre, capital controls, cloud computing, corporate governance, creative destruction, cross-border payments, cryptocurrency, currency peg, disinformation, disintermediation, distributed ledger, Dogecoin, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, global reserve currency, information security, initial coin offering, Internet of things, Kubernetes, litecoin, low interest rates, Lyft, machine readable, margin call, MITM: man-in-the-middle, multilevel marketing, Network effects, offshore financial centre, OSI model, packet switching, peer-to-peer, Ponzi scheme, prediction markets, QR code, ransomware, regulatory arbitrage, rent-seeking, reserve currency, Robinhood: mobile stock trading app, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Skype, smart contracts, software as a service, Steve Wozniak, tulip mania, uber lyft, unbanked and underbanked, underbanked, Vitalik Buterin, web application, WebSocket, WikiLeaks

Use Cases: ICOs There are a number of applications for a computerized transaction protocol using smart contracts. The concept of Ricardian contracts as proposed by Ian Grigg in 1996 provides insight into the realm of use cases for this technology. Innovations include using a cryptographic hash function for identification and defining legal elements as machine-readable by a computer. By being able to execute a set of instructions (via a smart contract) and associate it with an accounting system (via a blockchain), the Ethereum platform can be used to run a number of different dapps. During the early years after Ethereum’s release, it took time for a developer ecosystem to grow.

To read data from the contract you just ping the network directly, like making a call to a public API. However, to write data to the contract, you must send a transaction to the contract address. All read/write interactions with a smart contract require a reference to the contract’s application binary interface (ABI). The ABI is like an API for a smart contract. ABIs are machine-readable, meaning they are easy to parse by client software to understand how to interact with the contract code. An ABI documents all the functions and their attributes. Here is the ABI for the Guestbook smart contract: [{"constant":true,"inputs":[{"name":"_bookentrynumber","type":"uint256"}], "name":"getmessagefromreader","outputs":[{"name":"_messagefromreader", "type":"string"}],"payable":false,"stateMutability":"view","type":"function"}, {"constant":true,"inputs":[],"name":"getnumberofmessagesfromreaders", "outputs":[{"name":"_numberofmessages","type":"uint256"}],"payable":false, "stateMutability":"view","type":"function"}, {"constant":true,"inputs":[],"name":"getmessagefromauthors", "outputs":[{"name":"_name","type":"string"}],"payable":false, "stateMutability":"view","type":"function"}, {"constant":false,"inputs":[{"name":"_messagefromreader","type":"string"}], "name":"setmessagefromreader","outputs":[],"payable":false, "stateMutability":"nonpayable","type":"function"}, {"constant":false,"inputs":[{"name":"_messagefromauthors","type":"string"}], "name":"setmessagefromauthors","outputs":[],"payable":false, "stateMutability":"nonpayable","type":"function"}, {"inputs":[],"payable":false,"stateMutability":"nonpayable","type":"constructor"}] Reading a smart contract Let’s read the data in the Guestbook smart contract.


No Slack: The Financial Lives of Low-Income Americans by Michael S. Barr

active measures, asset allocation, Bayesian statistics, behavioural economics, business cycle, Cass Sunstein, cognitive load, conceptual framework, Daniel Kahneman / Amos Tversky, financial exclusion, financial innovation, Home mortgage interest deduction, income inequality, information asymmetry, it's over 9,000, labor-force participation, late fees, London Interbank Offered Rate, loss aversion, low interest rates, machine readable, market friction, mental accounting, Milgram experiment, mobile money, money market fund, mortgage debt, mortgage tax deduction, New Urbanism, p-value, payday loans, race to the bottom, regulatory arbitrage, Richard Thaler, risk tolerance, Robert Shiller, search costs, subprime mortgage crisis, the payments system, transaction costs, unbanked and underbanked, underbanked

Credit Card Accountability Responsibility and Disclosure (CARD) Act of 2009, Pub. L. No. 111-24, 123 Stat. 1734. 12864-06_CH06_3rdPgs.indd 143 3/23/12 11:56 AM 144 michael s. barr, jane k. dokko, and benjamin j. keys shopping by requiring the public posting to the Federal Reserve of credit-card contracts in machine-readable formats; private firms or nonprofits can develop tools for experts and consumers to use to evaluate these various contracts. The new Consumer Financial Protection Bureau will undoubtedly have occasion to review these and other requirements for credit cards in the future. Overdraft Traditionally, customer payment orders in excess of the funds available in the customer’s bank account, whether by check or by debit card, were declined.

In doing so, it will rely on consumer testing, can issue model disclosures that provide a safe harbor for compliance, and may permit financial institutions to use trial disclosure programs to test out the effectiveness of alternative disclosures to those provided for in the CFPB model form. The bureau is mandated to merge conflicting Real Estate Settlement Procedures Act and TILA mortgage disclosures into a simple form. Consumers are provided with rights to access information about their own product usage in standard, machine-readable formats. Over time, the CFPB may generate research and experimentation that will improve our understanding of consumer financial decisionmaking and in turn will support the bureau’s supervision, rule writing, and enforcement. Behaviorally Informed Credit-Card Regulation Credit-card companies have fine-tuned product offerings and disclosures in a manner that appears to be systematically designed to prey on common psychological biases—biases that limit consumer ability to make rational choices regarding credit-card borrowing (Bar-Gill 2004).

Based on the same understanding that consumers do not shop for penalty fees and that they often misforecast their own behavior, it requires that late fees or other penalty fees must be “reasonable and proportionate,” as determined by implementing rules; that in any event the fees not be larger than the amount charged that is over the limit or late; and that a late fee or other penalty fee cannot be assessed more than once for the same transaction or event. Furthermore, the act takes steps to make it easier for the market to develop mechanisms for consumer comparison shopping by requiring the public posting to the Federal Reserve of credit-card contracts in machine-readable formats; private firms or nonprofits can develop tools for experts and consumers to use to evaluate these various contracts. The Consumer Financial Protection Bureau will undoubtedly have occasion to review these and other requirements for credit cards in the future. Increasing Saving by Low- and Moderate-Income Households We have focused thus far in this chapter on improving outcomes in the credit markets using insights from behavioral economics and industrial organization.


pages: 238 words: 93,680

The C Programming Language by Brian W. Kernighan, Dennis M. Ritchie

Dennis Ritchie, general-purpose programming language, Ken Thompson, machine readable, sorting algorithm

We have refined the original examples, and have added new examples in several chapters. For instance, the treatment of complicated declarations is augmented by programs that convert declarations into words and vice versa. As before, all examples have been tested directly from the text, which is in machine-readable form. Appendix A, the reference manual, is not the standard, but our attempt to convey the essentials of the standard in a smaller space. It is meant for easy comprehension by programmers, but not as a definition for compiler writers -- that role properly belongs to the standard itself. Appendix B is a summary of the facilities of the standard library.

It contains a tutorial introduction to get new users started as soon as possible, separate chapters on each major feature, and a reference manual. Most of the treatment is based on reading, writing and revising examples, rather than on mere statements of rules. For the most part, the examples are complete, real programs rather than isolated fragments. All examples have been tested directly from the text, which is in machine-readable form. Besides showing how to make effective use of the language, we have also tried where possible to illustrate useful algorithms and principles of good style and sound design. The book is not an introductory programming manual; it assumes some familiarity with basic programming concepts like variables, assignment statements, loops, and functions.


pages: 270 words: 79,992

The End of Big: How the Internet Makes David the New Goliath by Nicco Mele

4chan, A Declaration of the Independence of Cyberspace, Airbnb, Amazon Web Services, Andy Carvin, Any sufficiently advanced technology is indistinguishable from magic, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, big-box store, bitcoin, bread and circuses, business climate, call centre, Cass Sunstein, centralized clearinghouse, Chelsea Manning, citizen journalism, cloud computing, collaborative consumption, collaborative editing, commoditize, Computer Lib, creative destruction, crony capitalism, cross-subsidies, crowdsourcing, David Brooks, death of newspapers, disruptive innovation, Donald Trump, Douglas Engelbart, Douglas Engelbart, en.wikipedia.org, Evgeny Morozov, Exxon Valdez, Fall of the Berlin Wall, Filter Bubble, Firefox, global supply chain, Google Chrome, Gordon Gekko, Hacker Ethic, Ian Bogost, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Lean Startup, lolcat, machine readable, Mark Zuckerberg, military-industrial complex, minimum viable product, Mitch Kapor, Mohammed Bouazizi, Mother of all demos, Narrative Science, new economy, Occupy movement, off-the-grid, old-boy network, One Laptop per Child (OLPC), peer-to-peer, period drama, Peter Thiel, pirate software, public intellectual, publication bias, Robert Metcalfe, Ronald Reagan, Ronald Reagan: Tear down this wall, satellite internet, Seymour Hersh, sharing economy, Silicon Valley, Skype, social web, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, Ted Nelson, Ted Sorensen, Telecommunications Act of 1996, telemarketer, the Cathedral and the Bazaar, the long tail, The Wisdom of Crowds, transaction costs, uranium enrichment, Whole Earth Catalog, WikiLeaks, Zipcar

Sometimes people utter the catchall term “digital,” but it’s not clear what that means, either; remember the digital watches of the 1980s? “Open” sounds good: open government, open-source politics, open-source policy. But WikiLeaks brings severe diplomatic and political consequences that “open” doesn’t capture. Just because something is machine readable and online doesn’t necessarily mean it is open. Also, “openness” describes the end result of technology, but it ignores the closed cabal of nerds (of which I’m one) that came up with this technology and defined its political implications. Not to mention that the control a handful of companies exert over our technology is far from open—companies like Apple, Google, and Facebook.

Rather than spend twenty-two hours a week watching television, some Americans might put some of that time into building useful applications for their fellow citizens using the raw material provided by Data.gov. Kundra had good reasons to believe Americans would take advantage of any data the government put online—as long as it went online in a useful, machine-readable format. Before being CIO of the U.S. government, he had been the CIO of the District of Columbia. There, he started a contest encouraging citizens to develop apps for the city. First, he made more than 400 data sets available, many of them in real time. Then he gave away $25,000 in prizes to people who created the best applications for citizens to use.


San Francisco by Lonely Planet

airport security, Albert Einstein, Apple II, back-to-the-land, banking crisis, Bay Area Rapid Transit, Burning Man, California gold rush, car-free, carbon footprint, centre right, Chuck Templeton: OpenTable:, David Brooks, David Sedaris, Day of the Dead, Electric Kool-Aid Acid Test, G4S, game design, glass ceiling, Golden Gate Park, Haight Ashbury, Joan Didion, Larry Ellison, Loma Prieta earthquake, machine readable, Mason jar, messenger bag, New Urbanism, off-the-grid, retail therapy, San Francisco homelessness, Silicon Valley, South of Market, San Francisco, stealth mode startup, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, transcontinental railway, urban sprawl, Whole Earth Catalog, Zipcar

Visas Required You must obtain a visa from a US embassy or consulate in your home country if you: ➡ Do not currently hold a passport from a VWP country. ➡ Are from a VWP country, but don’t have a machine-readable passport. ➡ Are from a VWP country, but currently hold a passport issued between October 26, 2005, and October 25, 2006, that does not have a digital photo on the information page or an integrated chip from the data page. (After October 25, 2006, the integrated chip is required on all machine-readable passports.) ➡ Are planning to stay longer than 90 days. ➡ Are planning to work or study in the US. Work Visas Foreign visitors are not legally allowed to work in the USA without the appropriate working visa.

Visas Canadians Canadian citizens currently only need proof of identity and citizenship to enter the US – but check the US Department of State for updates, as requirements may change. Visa Waiver Program USA Visa Waiver Program (VWP) allows nationals from 36 countries to enter the US without a visa, provided they are carrying a machine-readable passport. For the updated list of countries included in the program and current requirements, see the US Department of State (http://travel.state.gov/visa) website. Citizens of VWP countries need to register with the US Department of Homeland Security (http://esta.cbp.dhs.gov) three days before their visit.


San Francisco by Lonely Planet

airport security, Albert Einstein, Apple II, back-to-the-land, banking crisis, Bay Area Rapid Transit, Burning Man, California gold rush, car-free, carbon footprint, centre right, Chuck Templeton: OpenTable:, David Brooks, David Sedaris, Day of the Dead, Electric Kool-Aid Acid Test, G4S, game design, glass ceiling, Golden Gate Park, Haight Ashbury, Joan Didion, Larry Ellison, Loma Prieta earthquake, machine readable, Mason jar, messenger bag, New Urbanism, off-the-grid, retail therapy, San Francisco homelessness, Silicon Valley, South of Market, San Francisco, stealth mode startup, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, transcontinental railway, urban sprawl, Whole Earth Catalog, Zipcar

Visas Required You must obtain a visa from a US embassy or consulate in your home country if you: ➡ Do not currently hold a passport from a VWP country. ➡ Are from a VWP country, but don’t have a machine-readable passport. ➡ Are from a VWP country, but currently hold a passport issued between October 26, 2005, and October 25, 2006, that does not have a digital photo on the information page or an integrated chip from the data page. (After October 25, 2006, the integrated chip is required on all machine-readable passports.) ➡ Are planning to stay longer than 90 days. ➡ Are planning to work or study in the US. Work Visas Foreign visitors are not legally allowed to work in the USA without the appropriate working visa.

Visas Canadians Canadian citizens currently only need proof of identity and citizenship to enter the US – but check the US Department of State for updates, as requirements may change. Visa Waiver Program USA Visa Waiver Program (VWP) allows nationals from 36 countries to enter the US without a visa, provided they are carrying a machine-readable passport. For the updated list of countries included in the program and current requirements, see the US Department of State (http://travel.state.gov/visa) website. Citizens of VWP countries need to register with the US Department of Homeland Security (http://esta.cbp.dhs.gov) three days before their visit.


pages: 330 words: 91,805

Peers Inc: How People and Platforms Are Inventing the Collaborative Economy and Reinventing Capitalism by Robin Chase

Airbnb, Amazon Web Services, Andy Kessler, Anthropocene, Apollo 13, banking crisis, barriers to entry, basic income, Benevolent Dictator For Life (BDFL), bike sharing, bitcoin, blockchain, Burning Man, business climate, call centre, car-free, carbon tax, circular economy, cloud computing, collaborative consumption, collaborative economy, collective bargaining, commoditize, congestion charging, creative destruction, crowdsourcing, cryptocurrency, data science, deal flow, decarbonisation, different worldview, do-ocracy, don't be evil, Donald Shoup, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, Eyjafjallajökull, Ferguson, Missouri, Firefox, Free Software Foundation, frictionless, Gini coefficient, GPS: selective availability, high-speed rail, hive mind, income inequality, independent contractor, index fund, informal economy, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jane Jacobs, Jeff Bezos, jimmy wales, job satisfaction, Kickstarter, Kinder Surprise, language acquisition, Larry Ellison, Lean Startup, low interest rates, Lyft, machine readable, means of production, megacity, Minecraft, minimum viable product, Network effects, new economy, Oculus Rift, off-the-grid, openstreetmap, optical character recognition, pattern recognition, peer-to-peer, peer-to-peer lending, peer-to-peer model, Post-Keynesian economics, Richard Stallman, ride hailing / ride sharing, Ronald Coase, Ronald Reagan, Salesforce, Satoshi Nakamoto, Search for Extraterrestrial Intelligence, self-driving car, shareholder value, sharing economy, Silicon Valley, six sigma, Skype, smart cities, smart grid, Snapchat, sovereign wealth fund, Steve Crocker, Steve Jobs, Steven Levy, TaskRabbit, The Death and Life of Great American Cities, The Future of Employment, the long tail, The Nature of the Firm, Tragedy of the Commons, transaction costs, Turing test, turn-by-turn navigation, Uber and Lyft, uber lyft, vertical integration, Zipcar

So he wondered: “Is there any way in which we can use this effort for something that is good for humanity?”12 And so reCAPTCHA was born in 2007. reCAPTCHA takes the effort of typing the characters in a CAPTCHA and repurposes it to solve an entirely different problem. In order to make old newspapers or books useful online, they have to be scanned and the resulting images turned into machine-readable text to be usefully searchable. Sometimes the scanned or photographed image results in words that can’t be decoded using optical character recognition (OCR). This is a problem. When the CAPTCHAs are constructed using words tagged by OCR programs as unreadable, we smart humans do what computers can’t: We easily decode them!

But our experience has been that open data is fueling growth in a variety of economic sectors. To foster this economic growth, the U.S. government needs to do three things. First, we need to make it easy for entrepreneurs to find and use any public government dataset. To the extent possible, we need to put our vast trove of government data online, in machine-readable and ‘liquid’ form, while continuing to protect privacy. Second, supplying data isn’t enough—data doesn’t do anything by itself. Data is only useful if you apply it. We need to engage external and internal users of our data, in person and online, to prioritize releasing the most useful data sets first.”17 Nick’s third point, about problem prioritization, is one I will develop later in Chapter 8, on evolving legacy institutions.


pages: 81 words: 28,090

The Story of the Pony Express by Glenn D. Bradley

Cornelius Vanderbilt, machine readable, transcontinental railway

Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg-tm depends upon and cannot survive without wide spread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine readable form accessible by the widest array of equipment including outdated equipment. Many small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States.


pages: 561 words: 157,589

WTF?: What's the Future and Why It's Up to Us by Tim O'Reilly

"Friedman doctrine" OR "shareholder theory", 4chan, Affordable Care Act / Obamacare, Airbnb, AlphaGo, Alvin Roth, Amazon Mechanical Turk, Amazon Robotics, Amazon Web Services, AOL-Time Warner, artificial general intelligence, augmented reality, autonomous vehicles, barriers to entry, basic income, behavioural economics, benefit corporation, Bernie Madoff, Bernie Sanders, Bill Joy: nanobots, bitcoin, Blitzscaling, blockchain, book value, Bretton Woods, Brewster Kahle, British Empire, business process, call centre, Capital in the Twenty-First Century by Thomas Piketty, Captain Sullenberger Hudson, carbon tax, Carl Icahn, Chuck Templeton: OpenTable:, Clayton Christensen, clean water, cloud computing, cognitive dissonance, collateralized debt obligation, commoditize, computer vision, congestion pricing, corporate governance, corporate raider, creative destruction, CRISPR, crowdsourcing, Danny Hillis, data acquisition, data science, deep learning, DeepMind, Demis Hassabis, Dennis Ritchie, deskilling, DevOps, Didi Chuxing, digital capitalism, disinformation, do well by doing good, Donald Davies, Donald Trump, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, fake news, Filter Bubble, Firefox, Flash crash, Free Software Foundation, fulfillment center, full employment, future of work, George Akerlof, gig economy, glass ceiling, Glass-Steagall Act, Goodhart's law, Google Glasses, Gordon Gekko, gravity well, greed is good, Greyball, Guido van Rossum, High speed trading, hiring and firing, Home mortgage interest deduction, Hyperloop, income inequality, independent contractor, index fund, informal economy, information asymmetry, Internet Archive, Internet of things, invention of movable type, invisible hand, iterative process, Jaron Lanier, Jeff Bezos, jitney, job automation, job satisfaction, John Bogle, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Zimmer (Lyft cofounder), Kaizen: continuous improvement, Ken Thompson, Kevin Kelly, Khan Academy, Kickstarter, Kim Stanley Robinson, knowledge worker, Kodak vs Instagram, Lao Tzu, Larry Ellison, Larry Wall, Lean Startup, Leonard Kleinrock, Lyft, machine readable, machine translation, Marc Andreessen, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, McMansion, microbiome, microservices, minimum viable product, mortgage tax deduction, move fast and break things, Network effects, new economy, Nicholas Carr, Nick Bostrom, obamacare, Oculus Rift, OpenAI, OSI model, Overton Window, packet switching, PageRank, pattern recognition, Paul Buchheit, peer-to-peer, peer-to-peer model, Ponzi scheme, post-truth, race to the bottom, Ralph Nader, randomized controlled trial, RFC: Request For Comment, Richard Feynman, Richard Stallman, ride hailing / ride sharing, Robert Gordon, Robert Metcalfe, Ronald Coase, Rutger Bregman, Salesforce, Sam Altman, school choice, Second Machine Age, secular stagnation, self-driving car, SETI@home, shareholder value, Silicon Valley, Silicon Valley startup, skunkworks, Skype, smart contracts, Snapchat, Social Responsibility of Business Is to Increase Its Profits, social web, software as a service, software patent, spectrum auction, speech recognition, Stephen Hawking, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, stock buybacks, strong AI, synthetic biology, TaskRabbit, telepresence, the built environment, the Cathedral and the Bazaar, The future is already here, The Future of Employment, the map is not the territory, The Nature of the Firm, The Rise and Fall of American Growth, The Wealth of Nations by Adam Smith, Thomas Davenport, Tony Fadell, Tragedy of the Commons, transaction costs, transcontinental railway, transportation-network company, Travis Kalanick, trickle-down economics, two-pizza team, Uber and Lyft, Uber for X, uber lyft, ubercab, universal basic income, US Airways Flight 1549, VA Linux, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, We are the 99%, web application, Whole Earth Catalog, winner-take-all economy, women in the workforce, Y Combinator, yellow journalism, zero-sum game, Zipcar

This idea also echoes one of the “Eight Principles of Open Government Data” that Carl Malamud, Harvard law professor Larry Lessig, and I, together with a group of about thirty other open data activists, had published after a working group meeting in December 2007. One of those principles is that data should be published in formats that are not just machine readable but machine processable, so that the data could be reused for purposes not envisioned by its original producers. Open data had become a key talking point of the new administration, but most people only thought of it as a tool of government transparency and accountability. A handful saw that there was a real opportunity to make data much more useful to citizens and society.

Data aggregators, who collect data not in order to provide services directly to consumers, but to other businesses, should come in for particular scrutiny, since the data transaction between the consumer and the service provider has been erased, and it is far more likely that the data is being used not for the benefit of the consumer who originally provided it but for the benefit of the purchaser. Disclosure and consent as currently practiced are extraordinarily weak regulatory tools. They allow providers to cloak malicious intent in complex legal language that is rarely read, and if read, impossible to understand. Machine-readable disclosure similar to those designed by Creative Commons for expressing copyright intent would be a good step forward in building privacy-compliant services. A Creative Commons license allows those publishing content to express their intent clearly and simply, ranging from the “All Rights Reserved” of traditional copyright to a license like CC BY-NC-ND (which requires attribution, but allows the content to be shared freely for noncommercial purposes, and does not allow derivative works).

Through a mix of four or five carefully crafted assertions, which are designed to be both machine and human readable, Creative Commons allows users of a photo-sharing site like Flickr or a video-sharing site like YouTube to search only for content matching certain licenses. An equivalent framework for privacy would be very helpful. During the Obama administration, there was a concerted effort toward what is called “Smart Disclosure,” defined as “the timely release of complex information and data in standardized, machine readable formats in ways that enable consumers to make informed decisions.” New technology like the blockchain can also encode contracts and rules, creating new kinds of “smart contracts.” A smart contracts approach to data privacy could be very powerful. Rather than using brute force “Do Not Track” tools in their browser, users could provide nuanced limits to the use of their data.


pages: 134 words: 29,488

Python Requests Essentials by Rakesh Vidya Chandra, Bala Subrahmanyam Varanasi

business logic, create, read, update, delete, en.wikipedia.org, Kickstarter, machine readable, MITM: man-in-the-middle, MVC pattern, natural language processing, RFC: Request For Comment, RFID, supply-chain management, web application

Types of data In most cases, we deal with three types of data when working with web sources. They are as follows: • Structured data • Unstructured data • Semistructured Data Structured data Structured data is a type of data that exists in an organized form. Normally, structured data has a predefined format and it is machine readable. Each piece of data that lies in structured data has a relation with every other data as a specific format is imposed on it. This makes it easier and faster to access different parts of data. The structured data type helps in mitigating redundant data while dealing with huge amounts of data.


pages: 297 words: 103,910

Free culture: how big media uses technology and the law to lock down culture and control creativity by Lawrence Lessig

Brewster Kahle, Cass Sunstein, content marketing, creative destruction, digital divide, Free Software Foundation, future of journalism, George Akerlof, Innovator's Dilemma, Internet Archive, invention of the printing press, Joi Ito, Kenneth Arrow, Kevin Kelly, knowledge economy, Louis Daguerre, machine readable, new economy, prediction markets, prisoner's dilemma, profit motive, rent-seeking, Richard Florida, Richard Stallman, Ronald Coase, Ronald Reagan, Saturday Night Live, Silicon Valley, software patent, synthetic biology, transaction costs

By developing a free set of licenses that people can attach to their content, Creative Commons aims to mark a range of content that can easily, and reliably, be built upon. These tags are then linked to machine-readable versions of the license that enable computers automatically to identify content that can easily be shared. These three expressions together—a legal license, a human-readable description, and machine-readable tags—constitute a Creative Commons license. A Creative Commons license constitutes a grant of freedom to anyone who accesses the license, and more importantly, an expression of the ideal that the person associated with the license believes in something different than the "All" or "No" extremes.


pages: 471 words: 94,519

Managing Projects With GNU Make by Robert Mecklenburg, Andrew Oram

bioinformatics, business logic, Free Software Foundation, functional programming, general-purpose programming language, Larry Wall, machine readable, Richard Stallman

The "Cover Texts" are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25 words. A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters.

If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages. If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public.


pages: 135 words: 31,098

ClojureScript: Up and Running by Stuart Sierra, Luke Vanderhart

domain-specific language, Firefox, functional programming, higher-order functions, machine readable, MVC pattern, Paul Graham, web application

As the name suggests, it takes a string argument and returns a single data structure read from that string: (ns example (:require [cljs.reader :as reader])) (reader/read-string "{:a 1 :b 2}") ;;=> {:a 1, :b 2} The opposite of read-string is the built-in ClojureScript function pr-str, or “print to string,” which takes a data structure and returns its string representation: (pr-str {:language "ClojureScript"}) ;;=> "{:language \"ClojureScript\"}" Notice that pr-str automatically escapes special characters and places strings in double quotes, which the print and println functions do not: (println {:language "ClojureScript"}) ;; {:language ClojureScript} ;;=> nil In general, the print, println, and str functions are used for human-readable output, whereas the pr, prn, and pr-str functions are used for machine-readable output. Example Client-Server Application Building a complete client-server application in Clojure and ClojureScript requires some knowledge of Clojure web libraries, which are outside the scope of this book. But the following example should give you an idea of how easy it is to communicate between the two languages.


Understanding search engines: mathematical modeling and text retrieval by Michael W. Berry, Murray Browne

information retrieval, machine readable, PageRank

For over a decade, the UMLS has been working on enabling computer systems to understand medical meaning [64]. The Metathesaurus is one of the components of the UMLS and contains half a million biomedical concepts with over a million different concept names. Obviously, to do this, automated processing of the 20 Chapter 2, Document File Preparation machine-readable versions of its 40 source vocabularies is necessary, but it also requires review and editing by subject experts. The next step in item normalization is applying stop lists to the collection of processing tokens. Stop lists are lists of words that have little or no value as a search term. A good example of a stop list is the list of stop words from the SMART system at Cornell University (see ftp: / / f t p . cs.


pages: 396 words: 107,814

Is That a Fish in Your Ear?: Translation and the Meaning of Everything by David Bellos

Bletchley Park, Clapham omnibus, Claude Shannon: information theory, Douglas Hofstadter, Dr. Strangelove, Etonian, European colonialism, Great Leap Forward, haute cuisine, high-speed rail, invention of the telephone, invention of writing, language acquisition, machine readable, machine translation, natural language processing, Republic of Letters, Sapir-Whorf hypothesis, speech recognition

The “translator’s invisibility,” eloquently denounced by Lawrence Venuti as a symptom of the anti-intellectual, antiforeign bias of Britain and America,1 is also the unintended result of the unbounded nature of the English language itself. The suspicion that the language of translated works is not quite the same as the language the translations purport to be in has given rise to scholarly work based not on anecdotes and intuition but on the automated analysis of quite large bodies of translated texts in machine-readable form. These techniques allow insights into what is now called the “third code”—the language of translations seen as a dialect that can be distinguished from the regular features of the target language.2 In one such investigation, it’s been found that English novels in French translation have at least one language feature that seems quite at variance with novels originally written in French.

Computer-aided human translation and human-aided computer translation are both substantial achievements, and without them the global flows of trade and information of the past few decades would not have been nearly so smooth. Until recently, they remained the preserve of language professionals. What they also did, of course, was to put huge quantities of translation products (translated texts paired with their source texts) in machine-readable form. The invention and the explosive growth of the Internet since the 1990s has made this huge corpus available for free to everyone with a terminal. And then Google stepped in. Using software built on mathematical frameworks originally developed in the 1980s by researchers at IBM, Google has created an automatic-translation tool that is unlike all others.


pages: 391 words: 105,382

Utopia Is Creepy: And Other Provocations by Nicholas Carr

Abraham Maslow, Air France Flight 447, Airbnb, Airbus A320, AltaVista, Amazon Mechanical Turk, augmented reality, autonomous vehicles, Bernie Sanders, book scanning, Brewster Kahle, Buckminster Fuller, Burning Man, Captain Sullenberger Hudson, centralized clearinghouse, Charles Lindbergh, cloud computing, cognitive bias, collaborative consumption, computer age, corporate governance, CRISPR, crowdsourcing, Danny Hillis, data science, deskilling, digital capitalism, digital map, disruptive innovation, Donald Trump, driverless car, Electric Kool-Aid Acid Test, Elon Musk, Evgeny Morozov, factory automation, failed state, feminist movement, Frederick Winslow Taylor, friendly fire, game design, global village, Google bus, Google Glasses, Google X / Alphabet X, Googley, hive mind, impulse control, indoor plumbing, interchangeable parts, Internet Archive, invention of movable type, invention of the steam engine, invisible hand, Isaac Newton, Jeff Bezos, jimmy wales, Joan Didion, job automation, John Perry Barlow, Kevin Kelly, Larry Ellison, Lewis Mumford, lifelogging, lolcat, low skilled workers, machine readable, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Max Levchin, means of production, Menlo Park, mental accounting, natural language processing, Neal Stephenson, Network effects, new economy, Nicholas Carr, Nick Bostrom, Norman Mailer, off grid, oil shale / tar sands, Peter Thiel, plutocrats, profit motive, Ralph Waldo Emerson, Ray Kurzweil, recommendation engine, Republic of Letters, robot derives from the Czech word robota Czech, meaning slave, Ronald Reagan, scientific management, self-driving car, SETI@home, side project, Silicon Valley, Silicon Valley ideology, Singularitarianism, Snapchat, social graph, social web, speech recognition, Startup school, stem cell, Stephen Hawking, Steve Jobs, Steven Levy, technoutopianism, TED Talk, the long tail, the medium is the message, theory of mind, Turing test, Tyler Cowen, Whole Earth Catalog, Y Combinator, Yochai Benkler

A computerized search engine can swiftly parse explicit connections like citations, quotations, and hyperlinks—it feeds on them as a whale feeds on plankton—but it has little sensitivity to more delicate connections, to the implicit, the playful, the covert, the slant. Search engines are literal-minded, not literary-minded. Google’s overarching goal is to make culture machine-readable. We’ve all benefited from its pursuit of that goal, but Google’s vast field of vision has a very large blind spot. Much of what’s most subtle and valuable in culture—and the allusions of artists fall into this category—is too blurry to be read by machines. Kirsch says that T. S. Eliot had to append notes to “The Waste Land” in order to enable readers to track down its many allusions.

The goal is to create a system of “perfectly predictable interaction between individual and environment, in which nothing needs to be said along the way.” Beyond the efficiency gains, Silicon Valley would stand to profit from such a system. By developing a proprietary brain-computer network that renders human cogitation fully machine-readable, the tech industry would be able to transmit, store, parse, and hence to own, the entirety of our thoughts. “Industrial capitalism privatized the means of production,” Davies observed. “Digital capitalism seeks to privatize the means of communication.” That’s already happening. In digitizing human expression, the protocols of social networks are beginning to alter speech to make it more amenable to machine transmission and interpretation.


pages: 371 words: 108,317

The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future by Kevin Kelly

A Declaration of the Independence of Cyberspace, Aaron Swartz, AI winter, Airbnb, Albert Einstein, Alvin Toffler, Amazon Web Services, augmented reality, bank run, barriers to entry, Baxter: Rethink Robotics, bitcoin, blockchain, book scanning, Brewster Kahle, Burning Man, cloud computing, commoditize, computer age, Computer Lib, connected car, crowdsourcing, dark matter, data science, deep learning, DeepMind, dematerialisation, Downton Abbey, driverless car, Edward Snowden, Elon Musk, Filter Bubble, Freestyle chess, Gabriella Coleman, game design, Geoffrey Hinton, Google Glasses, hive mind, Howard Rheingold, index card, indoor plumbing, industrial robot, Internet Archive, Internet of things, invention of movable type, invisible hand, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Perry Barlow, Kevin Kelly, Kickstarter, lifelogging, linked data, Lyft, M-Pesa, machine readable, machine translation, Marc Andreessen, Marshall McLuhan, Mary Meeker, means of production, megacity, Minecraft, Mitch Kapor, multi-sided market, natural language processing, Netflix Prize, Network effects, new economy, Nicholas Carr, off-the-grid, old-boy network, peer-to-peer, peer-to-peer lending, personalized medicine, placebo effect, planetary scale, postindustrial economy, Project Xanadu, recommendation engine, RFID, ride hailing / ride sharing, robo advisor, Rodney Brooks, self-driving car, sharing economy, Silicon Valley, slashdot, Snapchat, social graph, social web, software is eating the world, speech recognition, Stephen Hawking, Steven Levy, Ted Nelson, TED Talk, The future is already here, the long tail, the scientific method, transport as a service, two-sided market, Uber for X, uber lyft, value engineering, Watson beat the top human players on Jeopardy!, WeWork, Whole Earth Review, Yochai Benkler, yottabyte, zero-sum game

Over the next 30 years, the great work will be parsing all the information we track and create—all the information of business, education, entertainment, science, sport, and social relations—into their most primeval elements. The scale of this undertaking requires massive cycles of cognition. Data scientists call this stage “machine readable” information, because it is AIs and not humans who will do this work in the zillions. When you hear a term like “big data,” this is what it is about. Out of this new chemistry of information will arise thousands of new compounds and informational building materials. Ceaseless tracking is inevitable, but it is only the start.

See also Flows and flowing literacy, 86, 89, 90, 200–202 Local Motors, 160–61 location tracking, 226, 238, 243 Lost (series), 206, 282 Lucas, George, 198 luxury entertainment, 190 Lyft, 62, 252 machine intelligence, 266, 291. See also artificial intelligence “machine readable” information, 267 Magic Leap, 216 malaria, 241 Malthus, Thomas, 243 Mann, Steve, 247 Manovich, Lev, 200 manufacturing, robots in, 52–53, 55 maps, 272 mathematics, 47, 239, 242–43 The Matrix (1999), 211 maximum likelihood estimation (MLE), 265 McDonalds, 25–26 McLuhan, Marshall, 63, 127 media fluency, 201 media genres, 194–95 medical technology and field AI applications in, 31, 55 and crowdfunding, 157 and diagnoses, 31 future flows of, 80 interpretation services in field of, 69 and lifelogging, 250 new jobs related to automation in, 58 paperwork in, 51 personalization of, 69 and personalized pharmaceuticals, 173 and pooling patient data, 145 and tracking technology, 173, 237, 238–40, 241–42, 243–44, 250 Meerkat, 76 memory, 245–46, 249 messaging, 239–40 metadata, 258–59, 267 microphones, 221 Microsoft, 122–23, 124, 216, 247 minds, variety of, 44–46 Minecraft, 218 miniaturization, 237 Minority Report (2002), 221–22, 255 MIT Media Lab, 219, 220, 222 money, 4, 65, 119–21 monopolies, 209 mood tracking, 238 Moore’s Law, 257 movies, 77–78, 81–82, 168, 204–7 Mozilla, 151 MP3 compression, 165–66 music and musicians AI applications in, 35 creation of, 73–76, 77 and crowdfunding, 157 and free/ubiquitous copies, 66–67 and intellectual property issues, 208–9 and interactivity, 221 liquidity of, 66–67, 73–78 and live performances, 71 low-cost reproduction of, 87 of nonprofessionals, 75–76 and patronage, 72 sales of, 75 soundtracks for content, 76 total volume of recorded music, 165–66 Musk, Elon, 44 mutual surveillance (“coveillance”), 259–64 MyLifeBits, 247 Nabokov, Vladimir, 204 Napster, 66 The Narrative, 248–49, 251 National Geographic, 278 National Science Foundation, 17–18 National Security Agency (NSA), 261 Nature, 32 Negroponte, Nicholas, 16, 219 Nelson, Ted, 18–19, 21, 247 Nest smart thermostat, 253, 283 Netflix and accessibility vs. ownership, 109 and crowdsourcing programming, 160 and on-demand access, 64 and recommendation engines, 39, 154, 169 and reviews, 73, 154 and sharing economy, 138 and tracking technology, 254 Netscape browser, 15 network effect, 40 neural networks, 38–40 newbies, 10–11, 15 new media forms, 194–95 newspapers, 177 Ng, Andrew, 38, 39 niche interests, 155–56 nicknames, 263 nondestructive editing, 206 nonprofits, 157 noosphere, 292 Northwestern University, 225 numeracy, 242–43 Nupedia, 270 OBD chips, 251, 252 obscure or niche interests, 155–56 office settings, 222.


pages: 363 words: 105,039

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

"World Economic Forum" Davos, air freight, air gap, Airbnb, Bellingcat, Bernie Sanders, bitcoin, blockchain, call centre, Citizen Lab, clean water, data acquisition, disinformation, Donald Trump, Edward Snowden, false flag, global supply chain, Hacker News, hive mind, information security, Julian Assange, Just-in-time delivery, Kickstarter, machine readable, Mikhail Gorbachev, no-fly zone, open borders, pirate software, pre–internet, profit motive, ransomware, RFID, speech recognition, Steven Levy, Stuxnet, supply-chain attack, tech worker, undersea cable, unit 8200, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

When Robinson finally cracked those layers of obfuscation after a week of trial and error, he was rewarded with a view of the BlackEnergy sample’s millions of ones and zeros—a collection of data that was, at a glance, still entirely meaningless. This was, after all, the program in its compiled form, translated into machine-readable binary rather than any human-readable programming language. To understand the binary, Robinson would have to watch it execute step-by-step on his computer, unraveling it in real time with a common reverse-engineering tool called IDA Pro that translated the function of its commands into code as they ran.

A pre-internet-era detective might start a rudimentary search for a person by consulting phone books. Matonis started digging into the online equivalent, the directory of the web’s global network known as the domain name system, or DNS. DNS servers translate human-readable domains like “facebook.com” into the machine-readable IP addresses that actually describe the location of a networked computer that runs that site or service, like 69.63.176.13. Matonis began painstakingly checking every IP address his hackers had used as a command-and-control server in the campaign of malicious Word documents he’d just uncovered, translating those domains into any IP addresses that had ever hosted them.


pages: 492 words: 118,882

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory by Kariappa Bheemaiah

"World Economic Forum" Davos, accounting loophole / creative accounting, Ada Lovelace, Adam Curtis, Airbnb, Alan Greenspan, algorithmic trading, asset allocation, autonomous vehicles, balance sheet recession, bank run, banks create money, Basel III, basic income, behavioural economics, Ben Bernanke: helicopter money, bitcoin, Bletchley Park, blockchain, Bretton Woods, Brexit referendum, business cycle, business process, call centre, capital controls, Capital in the Twenty-First Century by Thomas Piketty, cashless society, cellular automata, central bank independence, Charles Babbage, Claude Shannon: information theory, cloud computing, cognitive dissonance, collateralized debt obligation, commoditize, complexity theory, constrained optimization, corporate governance, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, cross-border payments, crowdsourcing, cryptocurrency, data science, David Graeber, deep learning, deskilling, Diane Coyle, discrete time, disruptive innovation, distributed ledger, diversification, double entry bookkeeping, Ethereum, ethereum blockchain, fiat currency, financial engineering, financial innovation, financial intermediation, Flash crash, floating exchange rates, Fractional reserve banking, full employment, George Akerlof, Glass-Steagall Act, Higgs boson, illegal immigration, income inequality, income per capita, inflation targeting, information asymmetry, interest rate derivative, inventory management, invisible hand, John Maynard Keynes: technological unemployment, John von Neumann, joint-stock company, Joseph Schumpeter, junk bonds, Kenneth Arrow, Kenneth Rogoff, Kevin Kelly, knowledge economy, large denomination, Large Hadron Collider, Lewis Mumford, liquidity trap, London Whale, low interest rates, low skilled workers, M-Pesa, machine readable, Marc Andreessen, market bubble, market fundamentalism, Mexican peso crisis / tequila crisis, Michael Milken, MITM: man-in-the-middle, Money creation, money market fund, money: store of value / unit of account / medium of exchange, mortgage debt, natural language processing, Network effects, new economy, Nikolai Kondratiev, offshore financial centre, packet switching, Pareto efficiency, pattern recognition, peer-to-peer lending, Ponzi scheme, power law, precariat, pre–internet, price mechanism, price stability, private sector deleveraging, profit maximization, QR code, quantitative easing, quantitative trading / quantitative finance, Ray Kurzweil, Real Time Gross Settlement, rent control, rent-seeking, robo advisor, Satoshi Nakamoto, Satyajit Das, Savings and loan crisis, savings glut, seigniorage, seminal paper, Silicon Valley, Skype, smart contracts, software as a service, software is eating the world, speech recognition, statistical model, Stephen Hawking, Stuart Kauffman, supply-chain management, technology bubble, The Chicago School, The Future of Employment, The Great Moderation, the market place, The Nature of the Firm, the payments system, the scientific method, The Wealth of Nations by Adam Smith, Thomas Kuhn: the structure of scientific revolutions, too big to fail, trade liberalization, transaction costs, Turing machine, Turing test, universal basic income, Vitalik Buterin, Von Neumann architecture, Washington Consensus

These results are then analysed by an AI and used to create hypotheses, develop trading strategies, and automatically model investment scenarios. As the operating processes of these companies are almost completely digital in nature, firms such as FundApps have arisen to provide regulatory information via a cloud-based managed service in machine readable language. This allows these firms to adapt faster to changing regulations in the sector. We will touch upon this topic again when discussing smart contracts. Previously, portfolio management and scenario generation required the employment of senior-level executives. However, the automation of these tasks has encouraged incumbents to switch to these services, raising questions on the future landscape of the sector.

Using the data from the Blockchain, the auditing of the institution can be done in real time with a smart contract supplying the information to the auditors’ reporting instruments at predetermined periods. This allows for faster assessment, precise tax determination, quicker detection of discrepancies, and easier enforcement of new regulations. As startups like FundApps provide regulatory information in machine-readable language, the next step in this direction would be to allow a smart contract to make changes in regulation as an input, and adjust the investment and reporting procedures based on these changes. This would reduce time delays in the execution of new regulations, provide greater transparency of financial records, and allow sovereign regulatory bodies with automated capital analysis.


pages: 541 words: 109,698

Mining the Social Web: Finding Needles in the Social Haystack by Matthew A. Russell

Andy Rubin, business logic, Climategate, cloud computing, crowdsourcing, data science, en.wikipedia.org, fault tolerance, Firefox, folksonomy, full text search, Georg Cantor, Google Earth, information retrieval, machine readable, Mark Zuckerberg, natural language processing, NP-complete, power law, Saturday Night Live, semantic web, Silicon Valley, slashdot, social graph, social web, sparse data, statistical model, Steve Jobs, supply-chain management, text mining, traveling salesman, Turing test, web application

Example 9-2 is the canonical example from the documentation that demonstrates how to turn the IMDB’s page on The Rock into an object in the Open Graph protocol as part of an XHTML document that uses namespaces. These bits of metadata have great potential once realized at a massive scale, because they enable a URI like http://www.imdb.com/title/tt0117500 to unambiguously represent any web page—whether it’s for a person, company, product, etc.—in a machine-readable way and furthers the vision for a semantic web. Example 9-2. Sample RDFa for the Open Graph protocol <html xmlns:og="http://ogp.me/ns#"> <head> <title>The Rock (1996)</title> <meta property="og:title" content="The Rock" /> <meta property="og:type" content="movie" /> <meta property="og:url" content="http://www.imdb.com/title/tt0117500/" /> <meta property="og:image" content="http://ia.media-imdb.com/images/rock.jpg" /> ...

., considering all unknown information emphatically false) will entail severe consequences sooner rather than later. Inferencing About an Open World with FuXi Foundational languages such as RDF Schema and OWL are designed so that precise vocabularies can be used to express facts such as the triple (Mr. Green, killed, Colonel Mustard) in a machine-readable way, and this is a necessary but not sufficient condition for the semantic web to be fully realized. Generally speaking, once you have a set of facts, the next step is to perform inference over the facts and draw conclusions that follow from the facts. The concept of formal inference dates back to at least ancient Greece with Aristotle’s syllogisms, and the obvious connection to how machines can take advantage of it has not gone unnoticed by researchers interested in artificial intelligence for the past 50 or so years.


pages: 482 words: 117,962

Exceptional People: How Migration Shaped Our World and Will Define Our Future by Ian Goldin, Geoffrey Cameron, Meera Balarajan

Admiral Zheng, agricultural Revolution, barriers to entry, Berlin Wall, Branko Milanovic, British Empire, conceptual framework, creative destruction, demographic transition, Deng Xiaoping, endogenous growth, failed state, Fall of the Berlin Wall, Gini coefficient, global pandemic, global supply chain, guest worker program, illegal immigration, income inequality, income per capita, Intergovernmental Panel on Climate Change (IPCC), job automation, Joseph Schumpeter, knowledge economy, labor-force participation, labour mobility, language acquisition, Lao Tzu, life extension, longitudinal study, low skilled workers, low-wage service sector, machine readable, Malacca Straits, mass immigration, microcredit, Nelson Mandela, Network effects, new economy, New Urbanism, old age dependency ratio, open borders, out of africa, price mechanism, purchasing power parity, Richard Florida, selection bias, Silicon Valley, Silicon Valley startup, Skype, social distancing, spice trade, trade route, transaction costs, transatlantic slave trade, women in the workforce, working-age population

Technology and Surveillance Technologies used for border control have sought to take advantage of breakthroughs in medicine and electronics. While there is a move to increase accuracy through the use of biometric and other data, there is also a greater reliance on imprecise methods, such as statistical risk analysis. Biometric data is carried on machine-readable passports or identity documents that can be scanned to compare the individual's identity with electronic databases of “watch lists” (often developed through international collaboration).115 The degree of scrutiny applied to potential migrants often relies on generalized “risk” factors based primarily on statistics and sociology.

One or more of these is increasingly required on passports and/or visas for potential migrants to European and North American countries. Following the events of 11 September 2001, the United States introduced the Visitor and Immigrant Status Indicator Technology (US-VISIT) program to use digital photos, machine-readable passports, and electronic monitoring systems at its borders. A digital photograph and inkless fingerprints are taken at the points of arrival and departure to track the entry and exit of visitors and migrants to the United States. Initially, the program was applied only to visitors who require a visa to enter the United States, but in 2004, it was extended to the 27 countries included in the U.S. visa-waiver program (most of Europe, Japan, New Zealand, Australia, and Singapore).


pages: 458 words: 116,832

The Costs of Connection: How Data Is Colonizing Human Life and Appropriating It for Capitalism by Nick Couldry, Ulises A. Mejias

"World Economic Forum" Davos, 23andMe, Airbnb, Amazon Mechanical Turk, Amazon Web Services, behavioural economics, Big Tech, British Empire, call centre, Cambridge Analytica, Cass Sunstein, choice architecture, cloud computing, colonial rule, computer vision, corporate governance, dark matter, data acquisition, data is the new oil, data science, deep learning, different worldview, digital capitalism, digital divide, discovery of the americas, disinformation, diversification, driverless car, Edward Snowden, emotional labour, en.wikipedia.org, European colonialism, Evgeny Morozov, extractivism, fake news, Gabriella Coleman, gamification, gig economy, global supply chain, Google Chrome, Google Earth, hiring and firing, income inequality, independent contractor, information asymmetry, Infrastructure as a Service, intangible asset, Internet of things, Jaron Lanier, job automation, Kevin Kelly, late capitalism, lifelogging, linked data, machine readable, Marc Andreessen, Mark Zuckerberg, means of production, military-industrial complex, move fast and break things, multi-sided market, Naomi Klein, Network effects, new economy, New Urbanism, PageRank, pattern recognition, payday loans, Philip Mirowski, profit maximization, Ray Kurzweil, RFID, Richard Stallman, Richard Thaler, Salesforce, scientific management, Scientific racism, Second Machine Age, sharing economy, Shoshana Zuboff, side hustle, Sidewalk Labs, Silicon Valley, Slavoj Žižek, smart cities, Snapchat, social graph, social intelligence, software studies, sovereign wealth fund, surveillance capitalism, techlash, The Future of Employment, the scientific method, Thomas Davenport, Tim Cook: Apple, trade liberalization, trade route, undersea cable, urban planning, W. E. B. Du Bois, wages for housework, work culture , workplace surveillance

Government and commercial actors intersect around what French legal scholar Annette Rouvroy has called “data behaviourism.”70 Social knowledge becomes whatever works to enable private or public actors to modulate others’ behavior in their own interests (not disinterested social knowledge but social capture). This, in turn, affects what counts as social knowledge. Potential inputs that are not machine readable become irrelevant, since the goal is always to increase N, the aggregate of what can be counted as data. Meanwhile, data subjects are generating material for machine reading all the time. We are constantly encouraged to act in ways that stimulate further counting, gain us more followers, and achieve better analytics.71 A certain vision of social truth emerges here, expressed by Jeff Malmad, a marketing executive, who says, “The Truth will be present in everything.

Some uses of social data, perhaps by civic or public institutions, may be responsible, modest, and oriented to organizational self-reflection.114 At the same time, the normalization of data extraction as the general means to monitor the world reinforces the “desire for numbers” (provided they are machine readable). New forms of professionalism and expertise around data capture are reshaping the world of work under data colonialism.115 Before the internet, however, as Bruce Schneier notes,116 data sources about social life were limited to company customer records, responses to direct marketing, credit bureau data, and government public records (and, we might add, insurance company data on their insured).


pages: 444 words: 118,393

The Nature of Software Development: Keep It Simple, Make It Valuable, Build It Piece by Piece by Ron Jeffries

Amazon Web Services, anti-pattern, bitcoin, business cycle, business intelligence, business logic, business process, c2.com, call centre, cloud computing, continuous integration, Conway's law, creative destruction, dark matter, data science, database schema, deep learning, DevOps, disinformation, duck typing, en.wikipedia.org, fail fast, fault tolerance, Firefox, Hacker News, industrial robot, information security, Infrastructure as a Service, Internet of things, Jeff Bezos, Kanban, Kubernetes, load shedding, loose coupling, machine readable, Mars Rover, microservices, Minecraft, minimum viable product, MITM: man-in-the-middle, Morris worm, move fast and break things, OSI model, peer-to-peer lending, platform as a service, power law, ransomware, revision control, Ruby on Rails, Schrödinger's Cat, Silicon Valley, six sigma, software is eating the world, source of truth, SQL injection, systems thinking, text mining, time value of money, transaction costs, Turing machine, two-pizza team, web application, zero day

Is it possible to create a platform that allows safe, autonomous delivery into a shared SQL database? Yes, but it requires accommodation from both developers and DBAs. In particular, the difficulty of parsing SQL to do automated sanity checking is too high. Developers and DBAs have to agree on a simpler, machine-readable format that can be scripted against. Many migration frameworks offer XML, JSON, or YAML formats that suffice. Keep in mind that the goal for the platform team is to enable their customers. The team should be trying to take themselves out of the loop on every day-to-day process and focus on building safety and performance into the platform itself.

The following changes are always safe: Require a subset of the previously required parameters Accept a superset of the previously accepted parameters Return a superset of the previously returned values Enforce a subset of the previously required constraints on the parameters If you have machine-readable specifications for your message formats, you should be able to verify these properties by analyzing the new specification relative to the old spec. A tough problem arises that we need to address when applying the Robustness Principle, though. There may be a gap between what we say our service accepts and what it really accepts.


pages: 210 words: 42,271

Programming HTML5 Applications by Zachary Kessin

barriers to entry, continuous integration, fault tolerance, Firefox, functional programming, Google Chrome, higher-order functions, machine readable, mandelbrot fractal, QWERTY keyboard, SQL injection, web application, WebSocket

DOCTYPE html> <html> <head> <title>Meter</title> </head> <body> <ul id="tree1" role="tree" tabindex="0" aria-labelledby="label_1"> <li role="treeitem" tabindex="-1" aria-expanded="true">Fruits</li> <li role="group"> <ul> <li role="treeitem" tabindex="-1">Oranges</li> <li role="treeitem" tabindex="-1">Pineapples</li> ... </ul> </li> </ul> </body> </html> Microdata Sometimes it is useful to add machine-readable data to a set of HTML tags. For example, you can use this procedure in a template to encode data into a page that can later be read by JavaScript. To enable such procedures in a standardized way, HTML5 created the concept of microdata, which can be added to HTML5 tags. Traditionally, HTML tags give data about how information should be formatted on-screen, but not about the data itself.


pages: 143 words: 43,096

Tel Aviv 2015: The Retro Travel Guide by Claudia Stein

illegal immigration, Louis Pasteur, low cost airline, machine readable, New Urbanism, Suez canal 1869, urban planning

2.4.1 Immigration Tourists need a passport that is still valid for at least six months from the date of their departure. For tourists from many countries, there is no need to apply for a prearranged visa, and visitors are allowed to stay in the country for up to three months. Please consult with the Israeli Embassy to determine if your country participates in the Visa Waiver Program. Holders of non-machine readable passports will always need a prearranged visa, however. If you want to stay longer in Israel, you can apply for an extension at the Israeli Ministry of Internal Affairs. Information is available on their website: http://mfa.gov.il/mfa/Pages/default.aspx 2.4.2 Departure Please make sure you are at the airport at least 3 hours before departure.


pages: 133 words: 42,254

Big Data Analytics: Turning Big Data Into Big Money by Frank J. Ohlhorst

algorithmic trading, bioinformatics, business intelligence, business logic, business process, call centre, cloud computing, create, read, update, delete, data acquisition, data science, DevOps, extractivism, fault tolerance, information security, Large Hadron Collider, linked data, machine readable, natural language processing, Network effects, pattern recognition, performance metric, personalized medicine, RFID, sentiment analysis, six sigma, smart meter, statistical model, supply-chain management, warehouse automation, Watson beat the top human players on Jeopardy!, web application

Data analysis is considerably more challenging than simply locating, identifying, understanding, and citing data. For effective large-scale analysis, all of this has to happen in a completely automated manner. This requires differences in data structure and semantics to be expressed in forms that are machine readable and then computer resolvable. It may take a significant amount of work to achieve automated error-free difference resolution. The data preparation challenge even extends to analysis that uses only a single data set. Here there is still the issue of suitable database design, further complicated by the many alternative ways in which to store the information.


pages: 481 words: 121,669

The Invisible Web: Uncovering Information Sources Search Engines Can't See by Gary Price, Chris Sherman, Danny Sullivan

AltaVista, American Society of Civil Engineers: Report Card, Bill Atkinson, bioinformatics, Brewster Kahle, business intelligence, dark matter, Donald Davies, Douglas Engelbart, Douglas Engelbart, full text search, HyperCard, hypertext link, information retrieval, Internet Archive, it's over 9,000, joint-stock company, knowledge worker, machine readable, machine translation, natural language processing, pre–internet, profit motive, Project Xanadu, publish or perish, search engine result page, side project, Silicon Valley, speech recognition, stealth mode startup, Ted Nelson, Vannevar Bush, web application

With so much attention being paid to both the visible and Invisible Web these days it is important to remember that a massive amount of material is not accessible on the Web, via the Web, or in any electronic format. It only exists in its original format or some other offline archive format like microfilm or microfiche. Will everything in print ultimately be digitized and made available online? Not likely. The expense of converting materials from printed text to machine-readable format is often prohibitive. Much of what we have on the Web we owe to the generosity of venture capitalists willing to back experimental ventures in delivering online content. Highquality offline content will continue to migrate to the Web, but likely at a much slower pace than we’ve seen in the past. 126 This Page Intentionally Left Blank CHAPTER 8 The Future: Revealing the Invisible Web The future Invisible Web will be both larger and smaller than today’s Invisible Web.

A primitive form of metadata (“keywords” and “description” meta tags) has been recognized since 1996, but it has been so widely abused by spammers that most search engines either ignore it or use it only peripherally in calculating relevance for a document. Proposals for metadata standards abound. The standard that seems most likely to achieve something close to universal adoption is RDF (Resource Description Framework), which uses the syntax of XML (Extensible Markup Language). The goal of all metadata standards proposals is to go beyond machine-readable data and create machineunderstandable data on the Web. Among other things, they provide the capability to introduce controlled vocabulary (often organized in thesaurus form) into the search equation. A controlled vocabulary can bring different terms, jargon, and concepts together. Though the standard will provide a structure for describing, classifying, and managing Web documents, it has its own set of vulnerabilities, and not everyone is sanguine about its prospects.


pages: 459 words: 123,220

Our Kids: The American Dream in Crisis by Robert D. Putnam

assortative mating, business cycle, classic study, confounding variable, correlation does not imply causation, deindustrialization, demographic transition, desegregation, digital divide, ending welfare as we know it, epigenetics, full employment, George Akerlof, helicopter parent, impulse control, income inequality, index card, jobless men, longitudinal study, low skilled workers, machine readable, manufacturing employment, mass incarceration, meta-analysis, mortgage tax deduction, new economy, Occupy movement, Ralph Waldo Emerson, randomized controlled trial, school choice, selection bias, Socratic dialogue, The Bell Curve by Richard Herrnstein and Charles Murray, the built environment, the strength of weak ties, upwardly mobile, Walter Mischel, white flight, working poor

From 1970 to 2010, the percentage of black families in Atlanta subsisting on less than $25,000 (in inflation-adjusted 2010 dollars) barely changed, slipping from 31 percent to 30 percent, whereas the percentage of black families with incomes over $100,000 more than doubled, rising from 6 percent to 13 percent. Data are from the author’s analysis of Steven Ruggles, J. Trent Alexander, Katie Genadek, Ronald Goeken, Matthew B. Schroeder, and Matthew Sobek, “Integrated Public Use Microdata Series: Version 5.0 [Machine-readable database],” (Minneapolis: University of Minnesota, 2010). 8. Raj Chetty, Nathaniel Hendren, Patrick Kline, and Emmanuel Saez, “Where Is the Land of Opportunity? The Geography of Intergenerational Mobility in the United States,” NBER Working Paper No. 19843 (Cambridge: National Bureau of Economic Research, January 2014). 9.

“Street Gangs in Santa Ana, CA,” Streetgangs.com, accessed June 16, 2014, http://www.streetgangs.com/cities/santaana#sthash.rnESeLn4.dpbs. 5. U.S. Census Bureau, from Steven Ruggles, J. Trent Alexander, Katie Genadek, Ronald Goeken, Matthew B. Schroeder, and Matthew Sobek. Integrated Public Use Microdata Series: Version 5.0 [Machine-readable database] (Minneapolis: University of Minnesota, 2010). 6. All members of these two families are American citizens and all the children are native-born. Undocumented immigrants and their children obviously face additional challenges. 7. Fermin Leal and Scott Martindale, “OC’s Best Public High Schools, 2012,” Orange County Register, May 25, 2014, database accessed February 24, 2014, http://www.ocregister.com/articles/high-331705-college-schools.html?


pages: 165 words: 45,397

Speculative Everything: Design, Fiction, and Social Dreaming by Anthony Dunne, Fiona Raby

3D printing, Adam Curtis, Anthropocene, augmented reality, autonomous vehicles, behavioural economics, Berlin Wall, Boeing 747, Buckminster Fuller, capitalist realism, Cass Sunstein, computer age, corporate governance, David Attenborough, en.wikipedia.org, Fall of the Berlin Wall, game design, General Motors Futurama, global village, Google X / Alphabet X, haute couture, Herman Kahn, intentional community, life extension, machine readable, Mark Zuckerberg, mouse model, New Urbanism, Peter Eisenman, RAND corporation, Richard Thaler, Ronald Reagan, self-driving car, Silicon Valley, social software, synthetic biology, systems thinking, technoutopianism, Wall-E

It is more about the positive use of negativity, not negativity for its own sake but to draw attention to a scary possibility in the form of a cautionary tale. A good example of this is Bernd Hopfengaertner's Belief Systems (2009). Hopfengaertner asks what would happen if one of the tech industry's many dreams comes true, if all the research being done by separate companies into making humans machine readable were to combine and move from laboratory to everyday life: combined algorithms and camera systems that can read emotions from faces, gait, and demeanor; neurotechnologies that cannot exactly read minds but can make a good guess at what people are thinking; profiling software that tracks and traces our every click and purchase; and so on.


pages: 170 words: 51,205

Information Doesn't Want to Be Free: Laws for the Internet Age by Cory Doctorow, Amanda Palmer, Neil Gaiman

Airbnb, barriers to entry, Big Tech, Brewster Kahle, cloud computing, Dean Kamen, Edward Snowden, game design, general purpose technology, Internet Archive, John von Neumann, Kickstarter, Large Hadron Collider, machine readable, MITM: man-in-the-middle, optical character recognition, plutocrats, pre–internet, profit maximization, recommendation engine, rent-seeking, Saturday Night Live, Skype, Steve Jobs, Steve Wozniak, Stewart Brand, Streisand effect, technological determinism, transfer pricing, Whole Earth Catalog, winner-take-all economy

Some rightsholders make the argument that even this isn’t nearly enough: in lobbying for SOPA, industry representatives argued that they also needed the right to censor DNS records, as well as a ban on tools that might defeat any of this censorship. DNS, remember, is the service that converts human-friendly Internet addresses (like thepiratebay.se) into machine-readable numeric addresses (like 194.71.107.50). You can think of this as being akin to the way your GPS works. You tell your GPS you want to go to 1600 Pennsylvania Avenue, and it converts that to a latitude and longitude like 38.89859, -77.035971, and promptly supplies driving directions to the White House.


pages: 190 words: 53,970

Eastern standard tribe by Cory Doctorow

airport security, call centre, forensic accounting, high net worth, machine readable, moral panic, offshore financial centre, old-boy network, pirate software, Silicon Valley, the payments system

He's a journalist, editorialist and blogger. Boing Boing (boingboing.net), the weblog he co-edits, is the most linked-to blog on the Net, according to Technorati. He won the John W. Campbell Award for Best New Writer at the 2000 Hugos. You can download this book for free from craphound.com/est. -- * * * Machine-readable metadata: * * * <rdf:RDF xmlns="http://web.resource.org/cc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <Work rdf:about="http://craphound.com/est"> <dc:title>Eastern Standard Tribe</dc:title> <dc:date>2004-2-9</dc:date> <dc:description>A novel by Cory Doctorow </dc:description> <dc:creator><Agent> <dc:title>Cory Doctorow</dc:title> </Agent></dc:creator> <dc:rights><Agent> <dc:title>Cory Doctorow</dc:title> </Agent></dc:rights> <dc:type rdf:resource="http://purl.org/dc/dcmitype/Text" /> <license rdf:resource="http://creativecommons.org/licenses/by-nd-nc/1.0" /> </Work> <License rdf:about="http://creativecommons.org/licenses/by-nd-nc/1.0"> <requires rdf:resource="http://web.resource.org/cc/Attribution" /> <permits rdf:resource="http://web.resource.org/cc/Reproduction" /> <permits rdf:resource="http://web.resource.org/cc/Distribution" /> <prohibits rdf:resource="http://web.resource.org/cc/CommercialUse" /> <requires rdf:resource="http://web.resource.org/cc/Notice" /> </License> </rdf:RDF> eof


pages: 157 words: 53,125

The Fifth Risk by Michael Lewis

Albert Einstein, behavioural economics, Bernie Sanders, Biosphere 2, chief data officer, cloud computing, data science, Donald Trump, fake news, Ferguson, Missouri, low interest rates, machine readable, opioid epidemic / opioid crisis, Silicon Valley, Solyndra, Steve Bannon, tail risk, the new new thing, uranium enrichment

“There’s so much gold in there. People just don’t know how to get to it.” DJ Patil had gone to Washington in 2014 to help people find that gold. He was the human expression of an executive order Obama had signed the year before, insisting that all unclassified government data be made publicly available and that it be machine-readable. DJ assumed he’d need to leave when the man who hired him left office, so that gave him just two years. “We did not have time to collect new data,” he said. “We were just trying to open up what we had.” He set out to make as many connections as possible between the information and the people who could make new sense of it—to encourage them to use the data in novel and interesting ways.


pages: 174 words: 56,405

Machine Translation by Thierry Poibeau

Alignment Problem, AlphaGo, AltaVista, augmented reality, call centre, Claude Shannon: information theory, cloud computing, combinatorial explosion, crowdsourcing, deep learning, DeepMind, easy for humans, difficult for computers, en.wikipedia.org, geopolitical risk, Google Glasses, information retrieval, Internet of things, language acquisition, machine readable, machine translation, Machine translation of "The spirit is willing, but the flesh is weak." to Russian and back, natural language processing, Necker cube, Norbert Wiener, RAND corporation, Robert Mercer, seminal paper, Skype, speech recognition, statistical model, technological singularity, Turing test, wikimedia commons

The problem is not to meet some nonexistent need through nonexistent machine translation.” [Alpac Report, 1966] The report then addressed the more general question of funding machine translation. The report began with a fairly standard definition: machine translation “presumably means going by algorithm from machine-readable source text to useful target text, without recourse to human translation or editing.” The report immediately concluded that no type of automated system existed at the time of drafting the report and that no such system was conceivable in the near future.4 Georgetown’s system was specifically mentioned: after eight years of funding, the system was still unable to produce a proper translation.


pages: 234 words: 57,267

Python Network Programming Cookbook by M. Omar Faruque Sarker

business intelligence, cloud computing, Debian, DevOps, Firefox, inflight wifi, machine readable, RFID, web application

Working with Web Services – XML-RPC, SOAP, and REST In this chapter, we will cover the following recipes: Querying a local XML-RPC server Writing a multithreaded, multicall XML-RPC server Running an XML-RPC server with a basic HTTP authentication Collecting some photo information from Flickr using REST Searching for SOAP methods from an Amazon S3 web service Searching Google for custom information Searching Amazon for books through product search API Introduction This chapter presents some interesting Python recipes on web services using three different approaches, namely, XML Remote Procedure Call (XML-RPC), Simple Object Access Protocol (SOAP), and Representational State Transfer (REST). The idea behind the web services is to enable an interaction between two software components over the Web through a carefully designed protocol. The interface is machine readable. Various protocols are used to facilitate the web services. Here, we bring examples from three commonly used protocols. XML-RPC uses HTTP as the transport medium, and communication is done using XML contents. A server that implements XML-RPC waits for a call from a suitable client. The client calls that server to execute remote procedures with different parameters.


Lonely Planet Pocket San Francisco by Lonely Planet, Alison Bing

Albert Einstein, back-to-the-land, Bay Area Rapid Transit, bike sharing, Blue Bottle Coffee, Burning Man, Chuck Templeton: OpenTable:, Day of the Dead, edge city, G4S, game design, Golden Gate Park, Haight Ashbury, Larry Ellison, machine readable, Mason jar, messenger bag, off-the-grid, San Francisco homelessness, Silicon Valley, stealth mode startup, Stewart Brand, transcontinental railway, Zipcar

Visas Top Tip Check the US Department of State (http://travel.state.gov/visa) for updates and details on the following requirements. Canadians Proof of identity and citizenship required. Visa Waiver Program (VWP) Allows nationals from 36 countries to enter the US without a visa. It requires a machine-readable passport issued after November 2006. Citizens of VWP countries need to register with the US Department of Homeland Security (http://esta.cbp.dhs.gov/) three days before their visit. There is a $14 fee for registration application; when approved, the registration is valid for two years. Visa required For anyone staying longer than 90 days, or with plans to work or study in the US.


pages: 443 words: 51,804

Handbook of Modeling High-Frequency Data in Finance by Frederi G. Viens, Maria C. Mariani, Ionut Florescu

algorithmic trading, asset allocation, automated trading system, backtesting, Bear Stearns, Black-Scholes formula, book value, Brownian motion, business process, buy and hold, continuous integration, corporate governance, discrete time, distributed generation, fear index, financial engineering, fixed income, Flash crash, housing crisis, implied volatility, incomplete markets, linear programming, machine readable, mandelbrot fractal, market friction, market microstructure, martingale, Menlo Park, p-value, pattern recognition, performance metric, power law, principal–agent problem, random walk, risk free rate, risk tolerance, risk/return, short selling, statistical model, stochastic process, stochastic volatility, transaction costs, value at risk, volatility smile, Wiener process

Prices are determined by the aggregation of traders’ positions. Bornholdt (2001) modified this model introducing an antiferromagnetic coupling between the global magnetization and each spin, as well as a ferromagnetic coupling between the local neighborhood and each spin. In recent years, financial data providers such as Reuters and Bloomberg are offering machine readable news that can be used by trading systems. In this line of research, Seo et al. (2004) and Decker et al. (1996) describe a multiagent portfolio management system that automatically classifies financial news. Thomas (2003) combines news classification with technical analysis indicators in order to generate new trading rules.

See also Generalized autoregressive conditionally heteroskedastic (GARCH) methodology LP spaces, 386 432 LRT failure, 196. See also Likelihood ratio test (LRT) LRT p-values, 192–195 Lunch-time trader activity, 42 Machine learning methods, 48, 64–65 calibration of, 68 Machine learning perspective, 62 Machine-readable news, 64 Major financial events observations centered on, 107 probability curves for, 108 Mancino, Maria Elvira, xiv, 243 Marginal utility function, 299 Mariani, Maria C., xiv, 347, 383 Market capitalization index, 128 Market completeness assumption, 302 Market complexity, modeling of, 99 Market crash, 346 2008, 136 Market index (indices) exponents calculated for, 345 squared returns of, 220 technique for producing, 110 Market index decrease, spread and, 105 Market inefficiencies, for small-space and mid-volume classes, 44 Market microstructure effects, 263 Market microstructure, effects on Fourier estimator, 245 Market microstructure contaminations, 273 Market microstructure model, of ultra high frequency trading, 235–242 Market model, 296–297 Market movement, indicators of, 110 Market reaction, to abnormal price movements, 45 Market-traded option prices, 219 Markov chain, stochastic volatility process with, 401 Markowitz-type optimization, 286 Martingale-difference process, 178.


pages: 717 words: 150,288

Cities Under Siege: The New Military Urbanism by Stephen Graham

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", addicted to oil, airport security, Alan Greenspan, Anthropocene, anti-communist, autonomous vehicles, Berlin Wall, call centre, carbon footprint, clean tech, clean water, congestion charging, creative destruction, credit crunch, DARPA: Urban Challenge, defense in depth, deindustrialization, digital map, disinformation, Dr. Strangelove, driverless car, edge city, energy security, European colonialism, export processing zone, failed state, Food sovereignty, gentrification, Gini coefficient, global supply chain, Global Witness, Google Earth, illegal immigration, income inequality, knowledge economy, late capitalism, Lewis Mumford, loose coupling, machine readable, market fundamentalism, mass incarceration, McMansion, megacity, military-industrial complex, moral panic, mutually assured destruction, Naomi Klein, New Urbanism, offshore financial centre, one-state solution, pattern recognition, peak oil, planetary scale, post-Fordism, private military company, Project for a New American Century, RAND corporation, RFID, Richard Florida, Scramble for Africa, Seymour Hersh, Silicon Valley, SimCity, smart transportation, surplus humans, The Bell Curve by Richard Herrnstein and Charles Murray, urban decay, urban planning, urban renewal, urban sprawl, Washington Consensus, white flight, white picket fence

Castles, walled cities, and extensive border battlements have been replaced by gated communities, expansive border zones, and management by “remote control”’.46 The point here is simple: if contemporary power in the cities of both ‘homeland’ and ‘war zone’ is about attempting to separate the spaces, zones, privileges and mobility of the risk-free (who need protection) from risky surrounding populations and infiltrations, then the only possible way to do this is pre-emptively, digitally and with a high degree of technological automation. As a result, militarized targeting becomes crucial, and the software algorithms that continually police the ‘data-sphere’ of machine-readable information, searching for potentially hazardous behaviours, circulations, people, or presences, assume political and sovereign power. This process ‘reinscribe[s] the imaginative geography of the deviant, atypical, abnormal “other” inside the spaces of daily life’, writes Amoore.47 Here, in an intensification of the logic of militarized control, imagined enmity enters the code which drives computerized simulations of normality, threat, and securocratic war.

Thus, ‘national security, at least in the ports, is conceptualized as almost interchangeable with the security of international trade flows’.171 GLOBAL BIOMETRIC REGIME The globe shrinks for those who own it; for the displaced or the dispossessed, the migrant or refugee, no distance is more awesome than the few feet across borders or frontiers.172 In the airline and airport sectors, US homeland security efforts are meant to ensure that the ‘border guard [is] the last line of defense, not the first, in identifying potential threats’.173 The dream system features interoperable ‘smart’ borders, globalized border control, and pre-emptive risk management.174 To this end, the US has developed the US-VISIT programme – US Visitor and Immigrant Status Indicator Technology – for air travel, another application of biometric attempts to ‘objectively’ fix bodies and identities while coercing key US partner nations to adjust their passport systems to biometric standards defined by the US.175 In the Enhanced Border Security and Visa Act of 2002, for example, the US Congress imposed a requirement that the twenty-seven countries within the US Visa Waiver Program (VWP) begin using machine-readable passports that incorporate both biometric and radio-frequency tag (RFID) technology. Nations or blocs that fail to undertake these radical shifts are threatened with losing their coveted status within the VWP. ‘Our leveraging of America’s visa aiver partners, in order to promote the use of the new ID technologies for purposes of national security’, Richard Pruett and Michael Longarzo of the US Army War College write, ‘may prove to be a paradigm for the coming age’.176 The passage-point architectures of overseas airports thus now display symbols of both US and domestic sovereignty (Figure 4.20). 4.20 The ‘global homeland’ orchestrated through the extension of US sovereignty as part of the US visit initiative: Frankfurt airport, Germany.


pages: 189 words: 57,632

Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future by Cory Doctorow

AltaVista, AOL-Time Warner, book scanning, Brewster Kahle, Burning Man, cognitive load, drop ship, en.wikipedia.org, general purpose technology, informal economy, information retrieval, Internet Archive, invention of movable type, Jeff Bezos, John Gilmore, John Perry Barlow, Law of Accelerating Returns, machine readable, Metcalfe's law, mirror neurons, Mitch Kapor, moral panic, mutually assured destruction, Neal Stephenson, new economy, optical character recognition, PalmPilot, patent troll, pattern recognition, peer-to-peer, Ponzi scheme, post scarcity, QWERTY keyboard, Ray Kurzweil, RFID, Sand Hill Road, Skype, slashdot, Snow Crash, social software, speech recognition, Steve Jobs, the long tail, Thomas Bayes, Turing test, Vernor Vinge, Wayback Machine

A typical scenario goes like this: a number of suppliers get together and agree on a metadata standard — a Document Type Definition or scheme — for a given subject area, say washing machines. They agree to a common vocabulary for describing washing machines: size, capacity, energy consumption, water consumption, price. They create machine-readable databases of their inventory, which are available in whole or part to search agents and other databases, so that a consumer can enter the parameters of the washing machine he's seeking and query multiple sites simultaneously for an exhaustive list of the available washing machines that meet his criteria.


pages: 196 words: 55,862

Riding for Deliveroo: Resistance in the New Economy by Callum Cant

Airbnb, algorithmic management, call centre, capitalist realism, collective bargaining, deskilling, Elon Musk, fixed-gear, future of work, gamification, gig economy, housing crisis, illegal immigration, independent contractor, information asymmetry, invention of the steam engine, machine readable, Mark Zuckerberg, means of production, new economy, Pearl River Delta, race to the bottom, ride hailing / ride sharing, scientific management, sharing economy, Silicon Valley, strikebreaker, tech worker, union organizing, Winter of Discontent, women in the workforce

A different worker, artificially separated from the shop floor, would convert the information collected from the action of the machinist into a blueprint program for the machine via a process of calculation. These ‘part programmers’ would have as their sole job the conversion of shop-floor information into generic blueprints, a task that required quite limited skill. Another worker, often a woman on half the pay of the part programmer and the machinist, then typed up these blueprints in machine-readable form on paper tape using a coding machine. This tape was then sent to the shop floor and fed into the machine tool by the machinist, who then supervised its operation. The cooperation of these three workers eliminated the need for a skilled machinist, reducing the power of workers in the process.


Western USA by Lonely Planet

airport security, Albert Einstein, Apollo 11, Apple II, Asilomar, back-to-the-land, Bay Area Rapid Transit, Biosphere 2, Burning Man, California gold rush, call centre, car-free, carbon footprint, Charles Lindbergh, Chuck Templeton: OpenTable:, cotton gin, Donner party, East Village, edge city, Electric Kool-Aid Acid Test, Frank Gehry, global village, Golden Gate Park, Haight Ashbury, haute couture, haute cuisine, illegal immigration, intermodal, Joan Didion, Kickstarter, Loma Prieta earthquake, machine readable, Mahatma Gandhi, Mars Rover, Maui Hawaii, off grid, off-the-grid, retail therapy, Silicon Valley, Silicon Valley startup, South of Market, San Francisco, starchitect, stealth mode startup, stem cell, Steve Jobs, Steve Wozniak, supervolcano, trade route, transcontinental railway, Upton Sinclair, urban planning, Virgin Galactic, women in the workforce, Works Progress Administration, young professional, Zipcar

For details, check www.getyouhome.gov. » All foreign passports must meet current US standards and be valid for at least six months longer than your intended stay. » MRP passports issued or renewed after October 26, 2006 must be e-passports (ie have a digital photo and integrated chip with biometric data). If your passport was issued before October 26, 2005, it must be ‘machine readable’ (with two lines of letters, numbers and <<< at the bottom); if it was issued between October 26, 2005, and October 25, 2006, it must be machine readable and include a digital photo. » For more information, consult www.cbp.gov/travel. CLIMATE CHANGE & TRAVEL Every form of transport that relies on carbon-based fuel generates CO2, the main cause of human-induced climate change.

For more information on visa requirements for visiting the USA, including the Electronic System for Travel Authorization (ESTA) now required before arrival for citizens of Visa Waiver Program (VWP) countries, Click here. Passports » Under the Western Hemisphere Travel Initiative (WHTI), all travelers must have a valid machine-readable (MRP) passport when entering the USA by air, land or sea. » The only exceptions are for most US citizens and some Canadian and Mexican citizens traveling by land who can present other WHTI-compliant documents (eg pre-approved ‘trusted traveler’ cards). For details, check www.getyouhome.gov. » All foreign passports must meet current US standards and be valid for at least six months longer than your intended stay. » MRP passports issued or renewed after October 26, 2006 must be e-passports (ie have a digital photo and integrated chip with biometric data).


pages: 162 words: 61,105

Eyewitness Top 10 Los Angeles by Catherine Gerber

Berlin Wall, centre right, City Beautiful movement, clean water, East Village, Frank Gehry, haute couture, machine readable, Mahatma Gandhi, Ronald Reagan, transcontinental railway

to Pack £ What Californians dress casually, but LA can be chilly in winter, and even in summer you’ll need a jacket or sweater in the evenings, especially near the coast. Sunglasses and hats are must-haves, and are easily available anywhere in LA. & Visas ^ Passports Citizens of the UK, Canada, Australia, New Zealand, Ireland, and several other countries need a valid machine-readable passport to visit the US for a period of up to 90 days. US citizens need a passport for re-entry. If you arrive by air or sea, you must present a round-trip ticket. Nationals of some countries must also complete an Electronic System for Travel Authorization (ESTA) application prior to travel.


pages: 144 words: 55,142

Interlibrary Loan Practices Handbook by Cherie L. Weible, Karen L. Janke

Firefox, information retrieval, Internet Archive, late fees, machine readable, Multics, optical character recognition, pull request, QR code, transaction costs, Wayback Machine, Works Progress Administration

See IFLA (International Federation of Library Associations and Institutions) international lending custom e-mail requests in ILLiad, 96 management of charges for, 14, 30, 45–46, 75 when domestic sources are exhausted, 23 International Lending and Document Delivery, 14 international library cooperation, 14 international locations, shipping to, 43–44 international publications, web-based finding aids for, 102 Internet document delivery by, 10 full-text documents on, 111–112 Internet Archives, 103 invoicing and billing charges, 29–30, 45–46 ISO ILL Protocol, 10, 13 L labels, shipping, 43 labels for borrowed materials, 26, 81 lenders, selection of, 24 lending libraries identification of, 19–23 selection of, 24 lending policies, 74–75 lending workflow, 37–48 policies, 37–39 procedures, 39–48 statistics, 48–49 See also workflow Liblicense Model License Agreement (LMLA), 58 LibQUAL+ surveys, 82 Libraries Very Interested in Sharing (LVIS), 34, 46 Library of Congress as de facto national library, 3 digital information in, 103–104 library website, use of, 74–75, 104 licensed electronic resources and copyright restrictions, 57–58 procedures for verification, 41–42 limits on requests, 18, 38 limits on services, policies on, 73 LMLA (Liblicense Model License Agreement), 58 load leveling, 4, 6 loan periods, 7, 18, 39, 75 Loansome Doc service, 99 Local Holdings Records (LHRs), use of, 87, 89 locally available materials and fill rate, 78 lost or damaged items policies on, 18, 48 removal from WorldCat records, 86 LVIS (Libraries Very Interested in Sharing), 34, 46 M mailroom practices, 25–26 management of ILL, 69–92 assessment, 77–82 environment, 70–71 policy development, 71–75 staffing and human resources, 82–85 working with other library units, 85–90 MARC (MAchine-Readable Cataloging), development of, 3, 8 materials lent, policies, 38–39 McNaughton Books service, 111, 113 microfilming for preservation, 6, 8, 10 Microsoft Office Document Image Writer, 98 missing items, rechecking for, 80, 88 mission of library and ILL policy, 72 Model Interlibrary Loan Code, 7, 9 modems, invention of, 10–11 monasteries as copy machines, 2 multitype library cooperatives, 8, 70 MyMorph file conversion, 98 N National Agricultural Library (NAL), 3 National Archives and Records Administration (NARA), 104 National Commission on Libraries and Information Science (NCLIS), 9 National Commission on New Technological Uses of Copyrighted Works (CONTU), 11, 53–56 index National Interlibrary Loan Code (1968), 7 National Interlibrary Loan Code (1980 revision), 9 National Interlibrary Loan Code (1993 revision), 9 national libraries, development of, 2–3 National Library of Medicine (NLM) DOCLINE service, 21, 99 file conversion options, 98 origin of, 3 National Union Catalog of Manuscript Collections, 21 National Union Catalog of Pre-1956 Imprints, 7 NCLIS (National Commission on Libraries and Information Science), 9 NDLTD (Networked Digital Library of Theses and Dissertations), 103 “need by” date, 19 Netflix, 111, 113 Networked Digital Library of Theses and Dissertations (NDLTD), 103 New England Depository Library (NEDL), 6 New England Library and Information Network (NELINET), 8 NISO ILL standard and request forms, 19 SERU (Shared E-Resource Understanding), 58 NLM.


Digital Accounting: The Effects of the Internet and Erp on Accounting by Ashutosh Deshmukh

accounting loophole / creative accounting, AltaVista, book value, business continuity plan, business intelligence, business logic, business process, call centre, computer age, conceptual framework, corporate governance, currency risk, data acquisition, disinformation, dumpster diving, fixed income, hypertext link, information security, interest rate swap, inventory management, iterative process, late fees, machine readable, money market fund, new economy, New Journalism, optical character recognition, packet switching, performance metric, profit maximization, semantic web, shareholder value, six sigma, statistical model, supply chain finance, supply-chain management, supply-chain management software, telemarketer, transaction costs, value at risk, vertical integration, warehouse automation, web application, Y2K

For example, descriptive markup <para> tells us that either the following item is a paragraph or it is the end of the previous paragraph. These markups can also be used for presentation of content in different data formats such as HTML, Portable Document Format (PDF), relational data tables and so forth. Additionally, descriptive markups are human and machine-readable and are in the public domain; some procedural markups also are human readable. However, human readability does not ensure complete understanding of the markups — descriptive or procedural; some markups may make sense only to machines. Descriptive markups form the basis of markup languages. As Charles Goldfarb, one of original inventors of markup languages, said: “Markups should describe a document’s structure and other attributes and should completely divorce structure from appearance while facilitating indexing and generation of selective views.”

. • Label integrity checking (e.g. maintenance of sensitivity labels when data is exported). • Auditing of labeled objects. • Mandatory access control for all operations. • Ability to specify security level printed on human-readable output (e.g. printers). • Ability to specify security level on any machine-readable output. • Enhanced auditing. • Enhanced protection of Operating System. • Improved documentation. Structured Protection • Notification of security level changes affecting interactive users. • Hierarchical device labels. • Mandatory access over all objects and devices. • Trusted path communications between user and system. • Tracking down of covert storage channels. • Tighter system operations mode into multilevel independent units. • Covert channel analysis. • Improved security testing. • Formal models of TCB. • Version, update and patch analysis and auditing.


pages: 725 words: 168,262

API Design Patterns by Jj Geewax

Amazon Web Services, anti-pattern, bitcoin, blockchain, business logic, cognitive load, continuous integration, COVID-19, database schema, en.wikipedia.org, exponential backoff, imposter syndrome, Internet of things, Kubernetes, lateral thinking, loose coupling, machine readable, microservices, natural language processing, Paradox of Choice, ride hailing / ride sharing, social graph, sorting algorithm

For instance, if the response to GetOperation yields the error of the underlying operation, how can we tell the difference between a 500 Internal Server Error that was the result of the operation and the same error that is actually just the fault of the code that handles the GetOperation method? Clearly this means we’ll need an alternative. As we saw previously, the way we’ll handle this involves allowing either a result (of the indicated ResultT type) or an OperationError type, which includes both a machine-readable code, a friendly description for human consumption, and an arbitrary structure for storing additional error details. This means that the GetOperation method should only throw an exception (by returning an HTTP error) if there was an actual error in retrieving the Operation resource. If the Operation resource is retrieved successfully, the error response is simply a part of the result of the LRO.

As we’ll learn in chapter 24, this should always be avoided at all costs, and the best way to do that is to have error codes that are far more useful in code than error messages themselves. In the cases where users need not only to know the error type, but also some additional information about the error, the details field is the perfect place to put this structured, machine-readable information. While this additional information is not strictly prohibited from being in the error message, it’s far more useful in the error details and is certainly required. In general, if the error message was missing, we should not lose any information that can’t be looked up in the API documentation.


pages: 430 words: 68,225

Blockchain Basics: A Non-Technical Introduction in 25 Steps by Daniel Drescher

bitcoin, blockchain, business process, central bank independence, collaborative editing, cryptocurrency, disintermediation, disruptive innovation, distributed ledger, Ethereum, ethereum blockchain, fiat currency, job automation, linked data, machine readable, peer-to-peer, place-making, Satoshi Nakamoto, smart contracts, transaction costs

It turns out that transactions are actually tiny self-contained contracts. They contain all of the necessary information to make a transfer of ownership happen. That insight led to the development of smart contracts that are executed by the blockchain. Similar to transaction data, smart contracts are machine-readable descriptions of the will of the involved parties. But unlike simple transaction data, smart contracts are much more flexible regarding the objects, subjects, actions, and conditions that can be used to describe the desired transfer of ownership. From a technical point of view, smart contracts are self-contained computer programs written in a blockchain-specific programming language.


pages: 243 words: 65,374

How We Got to Now: Six Innovations That Made the Modern World by Steven Johnson

A. Roger Ekirch, Ada Lovelace, adjacent possible, big-box store, British Empire, butterfly effect, Charles Babbage, clean water, crowdsourcing, cuban missile crisis, Danny Hillis, Ford Model T, germ theory of disease, Hans Lippershey, Ignaz Semmelweis: hand washing, indoor plumbing, interchangeable parts, invention of air conditioning, invention of the printing press, invention of the telescope, inventory management, Jacquard loom, John Snow's cholera map, Kevin Kelly, Lewis Mumford, Live Aid, lone genius, Louis Pasteur, low earth orbit, machine readable, Marshall McLuhan, mass immigration, megacity, Menlo Park, Murano, Venice glass, planetary scale, refrigerator car, Richard Feynman, Silicon Valley, Skype, Steve Jobs, Stewart Brand, Stuart Kauffman, techno-determinism, the scientific method, transcontinental railway, Upton Sinclair, walkable city, women in the workforce

Eventually, as we have already seen, laser technology would prove crucial to digital communications, thanks to its role in fiber optics. But the laser’s first critical application would appear at the checkout counter, with the emergence of bar-code scanners in the mid-1970s. The idea of creating some kind of machine-readable code to identify products and prices had been floating around for nearly half a century. Inspired by the dashes and dots of Morse code, an inventor named Norman Joseph Woodland designed a visual code that resembled a bull’s-eye in the 1950s, but it required a five-hundred-watt bulb—almost ten times brighter than your average lightbulb—to read the code, and even then it wasn’t very accurate.


pages: 265 words: 69,310

What's Yours Is Mine: Against the Sharing Economy by Tom Slee

4chan, Airbnb, Amazon Mechanical Turk, asset-backed security, barriers to entry, Benchmark Capital, benefit corporation, Berlin Wall, big-box store, bike sharing, bitcoin, blockchain, Californian Ideology, citizen journalism, collaborative consumption, commons-based peer production, congestion charging, Credit Default Swap, crowdsourcing, data acquisition, data science, David Brooks, democratizing finance, do well by doing good, don't be evil, Dr. Strangelove, emotional labour, Evgeny Morozov, gentrification, gig economy, Hacker Ethic, impact investing, income inequality, independent contractor, informal economy, invisible hand, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Zimmer (Lyft cofounder), Kevin Roose, Khan Academy, Kibera, Kickstarter, license plate recognition, Lyft, machine readable, Marc Andreessen, Mark Zuckerberg, Max Levchin, move fast and break things, natural language processing, Netflix Prize, Network effects, new economy, Occupy movement, openstreetmap, Paul Graham, peer-to-peer, peer-to-peer lending, Peter Thiel, pre–internet, principal–agent problem, profit motive, race to the bottom, Ray Kurzweil, recommendation engine, rent control, ride hailing / ride sharing, sharing economy, Silicon Valley, Snapchat, software is eating the world, South of Market, San Francisco, TaskRabbit, TED Talk, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, Thomas L Friedman, transportation-network company, Travis Kalanick, Tyler Cowen, Uber and Lyft, Uber for X, uber lyft, ultimatum game, urban planning, WeWork, WikiLeaks, winner-take-all economy, Y Combinator, Yochai Benkler, Zipcar

The additional information and an additional communications channel thus has the effect of reinforcing patterns of opportunity that are already there rather than widening the base of participation and influence.45 Kentaro Toyama, an expert in the use of information technology for development, argues that “in contexts where literacy and social capital are unevenly distributed, technology tends to amplify inequalities rather than reduce them.” 46 An email account cannot make you more connected unless you have some existing social network to build on. Development studies scholar Kevin Donovan sees similarities between open data efforts and James Scott’s book Seeing Like a State.47 Open standards and structured, machine-readable data are key parts of the open data program, and for Donovan this formalization and standardization is “far more value-laden than typically considered.” Open data programs, like the state, seek to “make society legible through simplification.” Standardized data, like the state, “operate[s] over a multitude of communities and attempt[s] to eliminate cultural norms through standardization.”


pages: 296 words: 66,815

The AI-First Company by Ash Fontana

23andMe, Amazon Mechanical Turk, Amazon Web Services, autonomous vehicles, barriers to entry, blockchain, business intelligence, business process, business process outsourcing, call centre, Charles Babbage, chief data officer, Clayton Christensen, cloud computing, combinatorial explosion, computer vision, crowdsourcing, data acquisition, data science, deep learning, DevOps, en.wikipedia.org, Geoffrey Hinton, independent contractor, industrial robot, inventory management, John Conway, knowledge economy, Kubernetes, Lean Startup, machine readable, minimum viable product, natural language processing, Network effects, optical character recognition, Pareto efficiency, performance metric, price discrimination, recommendation engine, Ronald Coase, Salesforce, single source of truth, software as a service, source of truth, speech recognition, the scientific method, transaction costs, vertical integration, yield management

., variants A and B) to different groups of users; also known as a split test ACYCLIC: jumping between points rather than going through points in the same pattern each time AGENT-BASED MODEL: model that generates the actions of agents and interactions with other agents given the agent’s properties, incentives, and environmental constraints AGGREGATION THEORY: the theory that new entrants in a market can aggregate existing quantities in that market; for example, data points, to create new and valuable products APPLICATION PROGRAMMING INTERFACE: a set of functions that allows applications to communicate with other applications, either to use a feature or fetch data; effectively, a structured way for software to communicate with other pieces of software AREA UNDERNEATH THE CURVE (AUC): the integral of the ROC curve BLOCKCHAIN: decentralized and distributed public ledger of transactions CLUSTERING TOOL: using unsupervised machine learning to group similar objects COMPLEMENTARY DATA: new data that increases the value of existing data CONCAVE PAYOFF: decreasing dividends from using a product CONCEPT DRIFT: when the idea behind the subject of a prediction changes based on observations CONSUMER APP: software application primarily used by individuals (rather than businesses) CONTRIBUTION MARGIN: average price per unit minus labor and quality control costs associated with that unit CONVEX PAYOFF: increasing dividends from using a product COST LEADERSHIP: a form of competitive advantage that comes from having the lowest cost of production with respect to competitors in a given industry CRYPTOGRAPHY: writing and solving codes CRYPTO TOKEN: representation of an asset that is kept on a blockchain CUSTOMER RELATIONSHIP MANAGEMENT SOFTWARE: software that stores and manipulates data about customers CUSTOMER SUPPORT AGENT: employee that is paid to respond to customer support tickets CUSTOMER SUPPORT TICKET: message from user of a product requesting help in using that product CYBERNETICS: the science of control and communication in machines and living things DATA: facts and statistics collected together for reference or analysis DATA ANALYST: person who sets up dashboards, visualizes data, and interprets model outputs DATA DRIFT: (1) when the distribution on which a prediction is based changes such that it no longer represents observed reality; or (2) when the data on which a prediction is based changes such that some of it is no longer available or properly formed DATA ENGINEER: person who cleans data, creates automated data management tools, maintains the data catalogue, consolidates data assets, incorporates new data sources, maintains data pipelines, sets up links to external data sources, and more DATA EXHAUST: data collected when users perform operations in an application, for example clicking buttons and changing values DATA INFRASTRUCTURE ENGINEER: person who chooses the right database, sets up databases, moves data between them, and manages infrastructure cost and more DATA LABELING: adding a piece of information to a piece of data DATA LEARNING EFFECT: the automatic compounding of information DATA LEARNING LOOP: the endogenous and continuous generation of proprietary data from an intelligent system that provides the basis of the next generation of that intelligent system DATA NETWORK: set of data that is built by a group of otherwise unrelated entities, rather than a single entity DATA NETWORK EFFECT: the increase in marginal benefit that comes from adding a new data point to an existing collection of data; the marginal benefit is defined in terms of informational value DATA PRODUCT MANAGER: person who incorporates the data needs of the model with the usability intentions of the product designers and preferences of users in order to prioritize product features that collect proprietary data DATA SCIENTIST: person who sets up and runs data science experiments DATA STEWARD: person responsible for ensuring compliance to data storage standards DEEP LEARNING: artificial neural network with multiple layers DEFENSIBILITY: the relative ability to protect a source of income; for example, an income-generating asset DIFFERENTIAL PRIVACY: system for sharing datasets without revealing the individual data points DIMENSIONALITY REDUCTION: transforming data (using a method such as principal component analysis) to reduce the measures associated with each data point DISRUPTION THEORY: the theory that new entrants in a market can appropriate customers from incumbent suppliers by selling a specialized product to a niche segment of customers at a fraction of the cost of the incumbent’s product DRIFT: when a model’s concept or data diverges from reality EDGE: connections between nodes; also called a link or a line ENTERPRISE RESOURCE PLANNING PRODUCT: software that collects and thus contains data about product inventory ENTRY-LEVEL DATA NETWORK EFFECT: the compounding marginal benefit that comes from adding new data to an existing collection of data; the marginal benefit is defined in terms of informational value to the model computed over that data EPOCH: completed pass of the entire training dataset by the machine learning model ETL (EXTRACT, TRANSFORM, AND LOAD): the three, main steps in moving data from one place to another EXAMPLE: a single input and output pair from which a machine learning model learns FEATURE: set of mathematical functions that are fed data to output a prediction FEDERATED LEARNING: method for training machine learning models across different computers without exchanging data between those computers FIRST-MOVER: company that collects scarce assets, builds technological leadership, and creates switching costs in a market by virtue of entering that market before other companies GAUSSIAN MIXTURE MODEL: probabilistic model representing a subset within a set, assuming a normal distribution, without requiring the observed data match the subset GLOBAL, MULTIUSER MODEL: model that makes predictions about something common to all customers of a given company; this is generally trained on data aggregated across all customers GRADIENT BOOSTED TREE: method for producing a decision tree in multiple stages according to a loss function GRAPH: mathematical structure made up of nodes and edges that is typically used to model interactions between objects HEURISTICS: knowledge acquired by doing HISTOGRAM: diagram consisting of rectangles whose area is proportional to the frequency of a variable and whose width is equal to the class interval HORIZONTAL INTEGRATION: the combination in one product of multiple industry-specific functions normally operated by separate products HUMAN-IN-THE-LOOP SYSTEM: machine learning system that requires human input to generate an output HYPERPARAMETER: parameter that is used to control the machine learning model HYPERTEXT MARKUP LANGUAGE: programming language specifically for writing documents to be displayed in a web browser INCUMBENT: existing market leader INDEPENDENT SOFTWARE VENDOR: a company that publishes software INFORMATION: data that resolves uncertainty for the receiver INSOURCING: finding the resources to complete a task within an existing organization such that it’s not necessary to contract new resources to complete that task INTEGRATOR: software company that builds tools to connect data sources, normalizes data across sources, and updates connections as these sources change INTELLIGENT APPLICATION: application that runs machine learning algorithms over data to make predictions or decisions INTERACTIVE MACHINE LEARNING: machine learning models that collect data from a user, put that data into a model, present the model output back to the user, and so on K-MEANS: unsupervised machine learning method to group objects in a number of clusters based on the cluster with the center point, or average, that’s closest to the object LABEL: the output of a machine learning system based on learning from examples LAYER: aggregation of neurons; layers can be connected to other layers LEAN AI: the process of building a small but complete and accurate AI to solve a specific problem LEARNING EFFECT: the process through which knowledge accumulation leads to an economic benefit LEGACY APPLICATION: application already in use LOSS: the quantum of how right or wrong a model was in making a given prediction LOSS FUNCTION: mathematical function that determines the degree to which the output of a model is incorrect MACHINE LEARNING: computable algorithms that automatically improve with the addition of novel data MACHINE LEARNING ENGINEER: person who implements, trains, monitors, and fixes machine learning models MACHINE LEARNING MANAGEMENT LOOP: automated system for continuous incorporation of real-world data into machine learning models MACHINE LEARNING RESEARCHER: person who sets up and runs machine learning experiments MARKETING SEGMENTATION: dividing customers into groups based on similarity MINIMUM VIABLE PRODUCT: the minimum set of product features that a customer needs for a product to be useful MOAT: accumulation of assets that form a barrier to other parties that may reduce the income-generating potential of those assets MONITORING: observing a product to ensure both quality and reliability NETWORK EFFECT: the increase in marginal benefit that comes from adding a new node to an existing collection of nodes; the marginal benefit is defined in terms of utility to the user of the collection NEURAL NETWORK: collection of nodes that are connected to each other such that they can transmit signals to each other across the edges of the network, with the strength of the signal depending on the weights on each node and edge NEXT-LEVEL DATA NETWORK EFFECT: the compounding marginal benefit that comes from adding new data to an existing collection of data; the marginal benefit is defined in terms of the rate of automatic data creation by the model computed over that data NODE: discrete part of a network that can receive, process, and send signals; also called a vertex or a point OPTICAL CHARACTER RECOGNITION SOFTWARE: software that turns images into machine-readable text PARETO OPTIMAL SOLUTION: achieving 80 percent of the optimal solution for 20 percent of the work PARTIAL PLOT: graph that shows the effect of adding an incremental variable to a function PERSONALLY IDENTIFIABLE INFORMATION: information that can be linked to a real person PERTURBATION: deliberately modifying an object, e.g., data POWER GENERATOR: user that contributes an inordinate amount of data with respect to other users POWER USER: user that uses a product an inordinate amount with respect to other users PRECISION: the number of relevant data points retrieved by the model over the total number of data points PREDICTION USABILITY THRESHOLD: the point at which a prediction becomes useful to a customer PRICING: product usage; for example, hours spent using a product PROOF OF CONCEPT: a project jointly conducted by potential customers and vendors of a software product to prove the value theoretically provided by that, in practice PROPRIETARY INFORMATION: information that is owned by a specific entity and not in the public domain QUERY LANGUAGE: programming language used to retrieve data from a database RANDOM FOREST: method for analyzing data that constructs multiple decision trees and outputs the class of objects that occurs most often among all the objects or the average prediction across all of the decision trees RECALL: the number of relevant data points retrieved by the model over the total number of relevant data points RECEIVER OPERATING CHARACTERISTIC (ROC) CURVE: plot that shows how well the model performed at different discrimination thresholds, e.g., true and false positive rates RECURSION: repeated application of a method REINFORCEMENT LEARNING: ML that learns from objectives RETURN ON INVESTMENT (ROI): calculated by dividing the return from using an asset by the investment in that asset ROI-BASED PRICING: pricing that is directly correlated with a rate of return on an investment SCALE EFFECT: the increase in marginal benefit or reduction in marginal cost that comes from having a higher quantity of the asset or capability that generates the benefit SCATTER PLOT: graph in which the values of two variables are plotted along two axes, the pattern of the resulting points revealing any correlation present SCHEME: the form common to all values in a particular table in a database SECURE MULTIPARTY COMPUTATION: method for jointly computing inputs while keeping the inputs private from the participating computers SENSOR NETWORK: a collection of devices that collect data from the real world SIMULATION: method that generates inputs to put through a program to see if that program fails to execute or generates inaccurate outputs SOFTWARE-AS-A-SERVICE (SAAS): method of delivering software online and licensing that software on a subscription basis SOFTWARE DEVELOPMENT KIT: tool made by software developers to allow other software developers to build on top of or alongside their software STATISTICAL PROCESS CONTROL: quality control process that is based on statistical methods SUPERVISED MACHINE LEARNING: ML that learns from inputs given outputs SUPPORT VECTOR MACHINE: supervised learning model that classifies new data points by category SYSTEM OF ENGAGEMENT: system that actively (e.g., through user input) aggregates information about a particular business function SYSTEM OF RECORD: system that passively aggregates information about a particular business function SYSTEMS INTEGRATOR: an entity that installs new software systems such that they function with customers’ existing systems TALENT LOOP: the compounding competitive advantage in attracting high-quality personnel that comes from having more high quality data than competitors TRANSACTIONAL PRICING: pricing that is directly correlated with the quantum of units transacted through a product, for example, number of processed data points or computation cycles UNSUPERVISED MACHINE LEARNING: ML that learns from inputs without outputs USAGE-BASED PRICING: pricing that is directly correlated with the quantum of product usage; for example, hours of time spent using a product USER INTERFACE: set of objects that exist in software that are manipulated to initiate a function in that software VALUE CHAIN: the process by which a company adds value to an asset; for example, adding value to a data point by processing that data into information, and that information into a prediction VARIABLE IMPORTANCE PLOT: list of the most important variables in a function in terms of their contribution to a given prediction, or predictive power VERSIONING: keeping a copy of every form of a model, program, or dataset VERTICAL INTEGRATION: the combination in one company of multiple stages of production (or points on a value chain) normally operated by separate firms VERTICAL PRODUCT: software product that is only relevant to users in a particular industry WATERFALL CHART: data visualization that shows the result of adding or subtracting sequential values in adjacent columns WEB CRAWLER: program that systematically queries webpages or other documents on the internet; strips out the unnecessary content on those pages, such as formatting; grabs salient data, puts it in a standard document format (e.g., JSON), and puts it in a private data repository WEIGHT: the relative measure of strength ascribed to nodes and edges in a network; this can be automatically or manually adjusted after learning of a more optimal weight WORKFLOW APPLICATION: software that takes a sequence of things that someone does in the real world and puts those steps into an interface that allows for data input at each step ZETTABYTE: 10^21 bytes or 1 trillion gigabytes A B C D E F G H I J K L M N O P Q R S T U V W X Y Z INDEX The page numbers in this index refer to the printed version of this book.


pages: 757 words: 193,541

The Practice of Cloud System Administration: DevOps and SRE Practices for Web Services, Volume 2 by Thomas A. Limoncelli, Strata R. Chalup, Christina J. Hogan

active measures, Amazon Web Services, anti-pattern, barriers to entry, business process, cloud computing, commoditize, continuous integration, correlation coefficient, database schema, Debian, defense in depth, delayed gratification, DevOps, domain-specific language, en.wikipedia.org, fault tolerance, finite state, Firefox, functional programming, Google Glasses, information asymmetry, Infrastructure as a Service, intermodal, Internet of things, job automation, job satisfaction, Ken Thompson, Kickstarter, level 1 cache, load shedding, longitudinal study, loose coupling, machine readable, Malcom McLean invented shipping containers, Marc Andreessen, place-making, platform as a service, premature optimization, recommendation engine, revision control, risk tolerance, Salesforce, scientific management, seminal paper, side project, Silicon Valley, software as a service, sorting algorithm, standardized shipping container, statistical model, Steven Levy, supply-chain management, systems thinking, The future is already here, Toyota Production System, vertical integration, web application, Yogi Berra

This step provides us with an opportunity to perform aggressive testing early in the process to avoid wasted effort later. 9.3.4 Package During the package step, the files left behind from the previous step are used to create the installation packages. A package is a single file that encodes all the files to be installed plus the machine-readable instructions for how to perform the installation. Because it is a single file, it is more convenient to transport. This step is gated based on whether package creation happened successfully. A simple package format would be a Zip or tar file that contains all the files that will be installed plus an installation script.

• The handoff between teams is written and agreed upon. • Each team has a playbook for tasks related to its involvement with NPR/NPI. • Equipment erasure and disposal is documented and verified. Level 3: Defined • Expectations for how long NPI/NPR will take are defined. • The handoff between teams is encoded in a machine-readable format. • Members of all teams understand their role as it fits into the larger, overall process. • The maximum number of products supported by each team is defined. • The list of each team’s currently supported products is available to all teams. Level 4: Managed • There are dashboards for observing NPI and NPR progress


pages: 255 words: 78,207

Web Scraping With Python: Collecting Data From the Modern Web by Ryan Mitchell

AltaVista, Amazon Web Services, Apollo 13, cloud computing, Computing Machinery and Intelligence, data science, en.wikipedia.org, Firefox, Guido van Rossum, information security, machine readable, meta-analysis, natural language processing, optical character recognition, random walk, self-driving car, Turing test, web application

Like its predecessor, Pillow allows you to easily import and manipulate images with a variety of filters, masks, and even pixel-specific transformations: from PIL import Image, ImageFilter kitten = Image.open("kitten.jpg") blurryKitten = kitten.filter(ImageFilter.GaussianBlur) blurryKitten.save("kitten_blurred.jpg") blurryKitten.show() In the preceding example, the image kitten.jpg will open in your default image viewer with a blur added to it and will also be saved in its blurrier state as kitten_blurred.jpg in the same directory. We will use Pillow to perform preprocessing on images to make them more machine readable but as mentioned before, there are many other things you can do with the library aside from these simple manipulations. For more information, check out the Pillow documentation. 162 | Chapter 11: Image Processing and Text Recognition Tesseract Tesseract is an OCR library. Sponsored by Google (a company obviously well known for its OCR and machine learning technologies), Tesseract is widely regarded to be the best, most accurate, open source OCR system available.


pages: 280 words: 73,420

Crapshoot Investing: How Tech-Savvy Traders and Clueless Regulators Turned the Stock Market Into a Casino by Jim McTague

Alan Greenspan, algorithmic trading, automated trading system, Bear Stearns, Bernie Madoff, Bernie Sanders, Black Monday: stock market crash in 1987, Bretton Woods, buttonwood tree, buy and hold, computerized trading, corporate raider, creative destruction, credit crunch, Credit Default Swap, financial innovation, fixed income, Flash crash, High speed trading, housing crisis, index arbitrage, junk bonds, locking in a profit, Long Term Capital Management, machine readable, margin call, market bubble, market fragmentation, market fundamentalism, Myron Scholes, naked short selling, Nixon triggered the end of the Bretton Woods system, pattern recognition, Ponzi scheme, proprietary trading, quantitative trading / quantitative finance, Renaissance Technologies, Ronald Reagan, Sergey Aleynikov, short selling, Small Order Execution System, statistical arbitrage, technology bubble, transaction costs, uptick rule, Vanguard fund, Y2K

But truth be told, the machines didn’t perform so well that day either. The NYSE had a rudimentary automated system called Designated Order Turnaround (DOT) for trading orders of up to 2,099 shares. Orders sent electronically over the system from brokerage firms to the floor of the NYSE were printed on machine-readable cards and then taken by a clerk to a specialist who in turn executed the order. When the trade was executed, the specialists marked the card and returned it to the clerk, who in turn put it into a reader that transmitted the order-confirmation back to the brokerage firm. There were 128 printers on the exchange floor.


pages: 220 words: 73,451

Democratizing innovation by Eric von Hippel

additive manufacturing, correlation coefficient, Debian, disruptive innovation, Free Software Foundation, hacker house, informal economy, information asymmetry, inventory management, iterative process, James Watt: steam engine, knowledge economy, longitudinal study, machine readable, meta-analysis, Network effects, placebo effect, principal–agent problem, Richard Stallman, software patent, systematic bias, the Cathedral and the Bazaar, tragedy of the anticommons, transaction costs, vertical integration, Vickrey auction

He simply expressed his private motivation in a message he posted on July 3, 1991, to the USENET newsgroup comp.os.minix (Wayner 2000): Hello netlanders, Due to a project I’m working on (in minix), I’m interested in the posix standard definition. [Posix is a standard for UNIX designers. A software using POSIX is compatible with other UNIX-based software.] Could somebody please point me to a (preferably) machine-readable format of the latest posix-rules? Ftp-sites would be nice. In response, Torvalds got several return messages with Posix rules and people expressing a general interest in the project. By the early 1992, several skilled programmers contributed to Linux and the number of users increased by the day.


pages: 268 words: 75,850

The Formula: How Algorithms Solve All Our Problems-And Create More by Luke Dormehl

3D printing, algorithmic bias, algorithmic trading, Alvin Toffler, Any sufficiently advanced technology is indistinguishable from magic, augmented reality, big data - Walmart - Pop Tarts, call centre, Cass Sunstein, classic study, Clayton Christensen, commoditize, computer age, death of newspapers, deferred acceptance, disruptive innovation, Edward Lorenz: Chaos theory, Erik Brynjolfsson, Evgeny Morozov, Filter Bubble, Flash crash, Florence Nightingale: pie chart, Ford Model T, Frank Levy and Richard Murnane: The New Division of Labor, fulfillment center, Google Earth, Google Glasses, High speed trading, Internet Archive, Isaac Newton, Jaron Lanier, Jeff Bezos, job automation, John Markoff, Kevin Kelly, Kodak vs Instagram, Lewis Mumford, lifelogging, machine readable, machine translation, Marshall McLuhan, means of production, Nate Silver, natural language processing, Netflix Prize, Panopticon Jeremy Bentham, Paradox of Choice, pattern recognition, price discrimination, recommendation engine, Richard Thaler, Rosa Parks, scientific management, self-driving car, sentiment analysis, Silicon Valley, Silicon Valley startup, Slavoj Žižek, social graph, speech recognition, stable marriage problem, Steve Jobs, Steven Levy, Steven Pinker, Stewart Brand, technological determinism, technological solutionism, TED Talk, the long tail, the scientific method, The Signal and the Noise by Nate Silver, upwardly mobile, Wall-E, Watson beat the top human players on Jeopardy!, Y Combinator

He points to the likes of hedge funds that make large bets whose outcomes are predicated on legal results. Using sophisticated legal modeling algorithms to predict verdicts in such a scenario could directly result in vast quantities of money being made. Other legal scholars have also suggested that data mining could be used to reveal a granularity of wrongfulness in criminal trials, using machine-readable criteria to calculate the exact extent of a person’s guilt. One imagines that it will not be too long before neuroscience (currently in the throes of an algorithmic turn) seeks to establish the exact degree to which a person is free to comply with the law, arguing over questions like determinism versus voluntarism.


pages: 491 words: 77,650

Humans as a Service: The Promise and Perils of Work in the Gig Economy by Jeremias Prassl

3D printing, Affordable Care Act / Obamacare, Airbnb, algorithmic management, Amazon Mechanical Turk, Andrei Shleifer, asset light, autonomous vehicles, barriers to entry, call centre, cashless society, Clayton Christensen, collaborative consumption, collaborative economy, collective bargaining, creative destruction, crowdsourcing, death from overwork, Didi Chuxing, disruptive innovation, Donald Trump, driverless car, Erik Brynjolfsson, full employment, future of work, George Akerlof, gig economy, global supply chain, Greyball, hiring and firing, income inequality, independent contractor, information asymmetry, invisible hand, Jeff Bezos, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Kevin Roose, Kickstarter, low skilled workers, Lyft, machine readable, Mahatma Gandhi, Mark Zuckerberg, market friction, means of production, moral hazard, Network effects, new economy, obamacare, pattern recognition, platform as a service, Productivity paradox, race to the bottom, regulatory arbitrage, remote working, ride hailing / ride sharing, Robert Gordon, Ronald Coase, Rosa Parks, scientific management, Second Machine Age, secular stagnation, self-driving car, shareholder value, sharing economy, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Simon Singh, software as a service, Steve Jobs, TaskRabbit, TechCrunch disrupt, The Future of Employment, The Market for Lemons, The Nature of the Firm, The Rise and Fall of American Growth, transaction costs, transportation-network company, Travis Kalanick, two tier labour market, two-sided market, Uber and Lyft, Uber for X, uber lyft, union organizing, warehouse automation, work culture , working-age population

Terms and conditions of employment were not to be changed as a result of a business transfer, and workers’ acquired rights transferred from one employer to the next.58 In terms of system design, a helpful starting point here could be the General Data Protection Regulation (GDPR), adopted in April 2016. One of the key consumer-protective elements of the legislation is so-called data portability: an individual’s ‘right to receive the personal data concerning him or her . . . in a structured, commonly used and machine-readable for- mat’, including ‘the right to transmit those data to another controller with- out hindrance from the controller to which the personal data have been provided’.59 Portable ratings could operate along similar lines, with stand- ardized metrics accounting for experience, customer friendliness, and work quality, and additional task-specific ratings taking account of task-specific skills, from driving to assembling flatpack furniture.


pages: 196 words: 71,157

A l'ombre des jeunes filles en fleurs - Première partie by Marcel Proust

machine readable

Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg-tm depends upon and cannot survive without wide spread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine readable form accessible by the widest array of equipment including outdated equipment. Many small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States.


pages: 305 words: 75,697

Cogs and Monsters: What Economics Is, and What It Should Be by Diane Coyle

3D printing, additive manufacturing, Airbnb, Al Roth, Alan Greenspan, algorithmic management, Amazon Web Services, autonomous vehicles, banking crisis, barriers to entry, behavioural economics, Big bang: deregulation of the City of London, biodiversity loss, bitcoin, Black Lives Matter, Boston Dynamics, Bretton Woods, Brexit referendum, business cycle, call centre, Carmen Reinhart, central bank independence, choice architecture, Chuck Templeton: OpenTable:, cloud computing, complexity theory, computer age, conceptual framework, congestion charging, constrained optimization, coronavirus, COVID-19, creative destruction, credit crunch, data science, DeepMind, deglobalization, deindustrialization, Diane Coyle, discounted cash flows, disintermediation, Donald Trump, Edward Glaeser, en.wikipedia.org, endogenous growth, endowment effect, Erik Brynjolfsson, eurozone crisis, everywhere but in the productivity statistics, Evgeny Morozov, experimental subject, financial deregulation, financial innovation, financial intermediation, Flash crash, framing effect, general purpose technology, George Akerlof, global supply chain, Goodhart's law, Google bus, haute cuisine, High speed trading, hockey-stick growth, Ida Tarbell, information asymmetry, intangible asset, Internet of things, invisible hand, Jaron Lanier, Jean Tirole, job automation, Joseph Schumpeter, Kenneth Arrow, Kenneth Rogoff, knowledge economy, knowledge worker, Les Trente Glorieuses, libertarian paternalism, linear programming, lockdown, Long Term Capital Management, loss aversion, low earth orbit, lump of labour, machine readable, market bubble, market design, Menlo Park, millennium bug, Modern Monetary Theory, Mont Pelerin Society, multi-sided market, Myron Scholes, Nash equilibrium, Nate Silver, Network effects, Occupy movement, Pareto efficiency, payday loans, payment for order flow, Phillips curve, post-industrial society, price mechanism, Productivity paradox, quantitative easing, randomized controlled trial, rent control, rent-seeking, ride hailing / ride sharing, road to serfdom, Robert Gordon, Robert Shiller, Robert Solow, Robinhood: mobile stock trading app, Ronald Coase, Ronald Reagan, San Francisco homelessness, savings glut, school vouchers, sharing economy, Silicon Valley, software is eating the world, spectrum auction, statistical model, Steven Pinker, tacit knowledge, The Chicago School, The Future of Employment, The Great Moderation, the map is not the territory, The Rise and Fall of American Growth, the scientific method, The Signal and the Noise by Nate Silver, the strength of weak ties, The Wealth of Nations by Adam Smith, total factor productivity, transaction costs, Uber for X, urban planning, winner-take-all economy, Winter of Discontent, women in the workforce, Y2K

There is some reason to believe that the monster is still running amok in the financial markets, thanks to ‘algos’ (short for algorithm) carrying out ultra-high-frequency trading (HFT). Ultra-high frequency means transactions at intervals of 650 milliseconds or less. This activity has a cluster of support services such as businesses selling ‘the fastest machine-readable economic data and corporate news’, and ‘global proximity hosting’. The latter term refers to traders’ need to locate their computer servers close to the computer servers of the exchanges on which they are trading. The reason is that at a nano-second (millionth of a millisecond) timescale, the speed of light becomes an important physical obstacle.


pages: 619 words: 210,746

Reversing: Secrets of Reverse Engineering by Eldad Eilam

Donald Knuth, functional programming, machine readable, software as a service, systems thinking

Depending on the high-level language, this machine code can either be a standard platform-specific object code that is decoded directly by the CPU or it can be encoded in a special platform-independent format called bytecode (see the following section on bytecodes). Compilers of traditional (non-bytecode-based) programming languages such as C and C++ directly generate machine-readable object code from the textual source code. What this means is that the resulting object code, when translated to assembly language by a disassembler, is essentially a machinegenerated assembly language program. Of course, it is not entirely machinegenerated, because the software developer described to the compiler what needed to be done in the high-level language.

The output representation is usually a lower-level translation of the same program. Such lower-level representation is usually read by hardware or software, and rarely by people. The bottom line is usually that compilers transform programs from their high-level, human-readable form into a lower-level, machine-readable form. During the translation process, compilers usually go through numerous improvement or optimization steps that take advantage of the compiler’s “understanding” of the program and employ various algorithms to improve the code’s efficiency. As I have already mentioned, these optimizations tend to have a strong “side effect”: they seriously degrade the emitted code’s readability.


pages: 792 words: 48,468

Tcl/Tk, Second Edition: A Developer's Guide by Clif Flynt

book value, Donald Knuth, hypertext link, machine readable, revision control, web application

If not caught, display the informationalString and stack trace and abort the script evaluation. informationalString Information about the error condition. Info A string to initialize the errorInfo string. Note that the Tcl interpreter may append more information about the error to this string. Code A machine-readable description of the error that occurred. This will be saved in the global errorCode variable. The next example shows some ways of using the catch and error commands. Example 6.3 Script Example proc errorProc {first second} { global errorInfo # $fail will be non-zero if $first is non-numeric. set fail [catch {expr 5 * $first} result] # if $fail is set, generate an error if {$fail} { error “Bad first argument” } # This will fail if $second is non-numeric or 0 set fail [catch {expr $first/$second} dummy] if {$fail} { error “Bad second argument” \ “second argument fails math test\n$errorInfo” } error “errorProc always fails” “evaluating error” \ [list USER {123} {Non-Standard User-Defined Error}] } # Example Script puts “call errorProc with a bad first argument” set fail [catch {errorProc X 0} returnString] 6.3 Exception Handling and Introspection if {$fail} { puts “Failed in errorProc” puts “Return string: $returnString” puts “Error Info: $errorInfo\n” } puts “call errorProc with a 0 second argument” if {[catch {errorProc 1 0} returnString]} { puts “Failed in errorProc” puts “Return string: $returnString” puts “Error Info: $errorInfo\n” } puts “call errorProc with valid arguments” set fail [catch {errorProc 1 1} returnString] if {$fail} { if {[string first USER $errorCode] == 0} { puts “errorProc failed as expected” puts “returnString is: $returnString” puts “errorInfo: $errorInfo” } else { puts “errorProc failed for an unknown reason” } } Script Output call errorProc with a bad first argument Failed in errorProc Return string: Bad first argument Error Info: Bad first argument while executing “error “Bad first argument”” (procedure “errorProc” line 10) invoked from within “errorProc X 0” call errorProc with a 0 second argument Failed in errorProc Return string: Bad second argument Error Info: second argument fails math test divide by zero while executing “expr $first/$second” (procedure “errorProc” line 15) 151 152 Chapter 6 Building Complex Data Structures with Lists and Arrays invoked from within “errorProc 1 0” call errorProc with valid arguments errorProc failed as expected returnString is: errorProc always fails errorInfo: evaluating error (procedure “errorProc” line 1) invoked from within “errorProc 1 1” Note the differences in the stack trace returned in errorInfo in the error returns.

If your application needs to include information that is already in the errorInfo variable, you can append that information by including $errorInfo in your message, as done with the second test. The errorInfo variable contains what should be human-readable text to help a developer debug a program. The errorCode variable contains a machine-readable description to enable a script to handle exceptions intelligently. The errorCode data is a list in which the first field identifies the class of error (ARITH, CHILDKILLED, POSIX, and so on), and the other fields contain data related to this error. The gory details are in the on-line manual/help pages under tclvars.


Cultural Backlash: Trump, Brexit, and Authoritarian Populism by Pippa Norris, Ronald Inglehart

affirmative action, Affordable Care Act / Obamacare, bank run, banking crisis, Berlin Wall, Bernie Sanders, Black Lives Matter, Boris Johnson, Brexit referendum, Cass Sunstein, centre right, classic study, cognitive dissonance, conceptual framework, declining real wages, desegregation, digital divide, Donald Trump, eurozone crisis, fake news, Fall of the Berlin Wall, feminist movement, first-past-the-post, illegal immigration, immigration reform, income inequality, It's morning again in America, Jeremy Corbyn, job automation, knowledge economy, labor-force participation, land reform, liberal world order, longitudinal study, low skilled workers, machine readable, mass immigration, meta-analysis, obamacare, open borders, open economy, opioid epidemic / opioid crisis, Paris climate accords, post-industrial society, post-materialism, precariat, purchasing power parity, rising living standards, Ronald Reagan, sexual politics, Silicon Valley, statistical model, stem cell, Steve Bannon, War on Poverty, white flight, winner-take-all economy, women in the workforce, working-age population, World Values Survey, zero-sum game

In these cases, other standard reference sources were used to classify populist parties, including Tim Immerzeel, Marcel Lubbers, and Hilde Coffé. 2011. Expert Judgment Survey of European Political Parties. Utrecht: Utrecht University; Marcel Part III From Values to Votes 253 Lubbers. 2000 [principal investigator]. Expert Judgment Survey of Western-­ European Political Parties 2000 [machine readable data set]. Nijmegen, the Netherlands: NWO, Department of Sociology, University of Nijmegen; Tim Immerzeel, Marcel Lubbers, and Hilde Coffé. 2016. ‘Competing with the radical right: Distances between the European radical right and other parties on typical radical right issues.’ Party Politics 22 (6): 823–834. 47.

The Politics of Unreason: Rightwing Extremism in America 1790–1977. 2nd edn. Chicago: University of Chicago Press. Lipset, Seymour Martin and Stein Rokkan. 1967. Party Systems and Voter Alignments. New York: Free Press. Lubbers, Marcel. 2000. [principal investigator] Expert Judgment Survey of Western-European Political Parties 2000 [machine readable data set]. Nijmegen, the Netherlands: NWO, Department of Sociology, University of Nijmegen. Lubbers, Marcel, Merove Gijsberts, and Peer Scheepers. 2002. ‘Extreme rightwing voting in Western Europe.’ European Journal of Political Research, 41(3): 345–378. Lubbers, Marcel and Peer Scheepers. 2000.


pages: 261 words: 78,884

$2.00 A Day: Living on Almost Nothing in America by Kathryn Edin, H. Luke Shaefer

Affordable Care Act / Obamacare, business cycle, clean water, ending welfare as we know it, future of work, Home mortgage interest deduction, housing crisis, impulse control, indoor plumbing, informal economy, low-wage service sector, machine readable, mass incarceration, race to the bottom, randomized controlled trial, Ronald Reagan, The Future of Employment, War on Poverty, working poor, Works Progress Administration

.” [>] was white: Our student research collaborator Vincent Fusaro, a doctoral student in social work and political science at the University of Michigan, analyzed data from the harmonized version of the March Current Population Survey (CPS) Supplement from 1968 to 1995 (Miriam King, Steven Ruggles, J. Trent Alexander, Sarah Flood, Katie Genadek, Matthew B. Schroeder, Brandon Trampe, and Rebecca Vick, Integrated Public Use Microdata Series, Current Population Survey: Version 3.0 [machine-readable database] [Minneapolis: University of Minnesota, 2010]). He produced annual estimates of the demographic characteristics of AFDC recipients. In only one year was the proportion of household heads receiving AFDC who were black slightly above 40 percent. In every year between 1968 and 1995, a majority of the recipients were white. [>] increased long-term poverty: Murray, Losing Ground. [>] “spider’s web of dependency”: Ronald Reagan, State of the Union address, February 4, 1986, http://www.presidency.ucsb.edu/ws/?


pages: 371 words: 78,103

Webbots, Spiders, and Screen Scrapers by Michael Schrenk

Amazon Web Services, corporate governance, digital rights, fault tolerance, Firefox, machine readable, Marc Andreessen, new economy, pre–internet, SpamAssassin, The Hackers Conference, Turing test, web application

For example, if you rearranged the data in Listing 26-11, the webbot would still interpret it correctly. The same could not be said for the XML data. And while the protocol is slightly less platform independent than XML, most computer programs are still capable of interpreting the data, as done in the example PHP script in Listing 26-12. SOAP No discussion of machine-readable interfaces is complete without mentioning the Simple Object Access Protocol (SOAP). SOAP is designed to pass instructions and data between specific types of web pages (known as web services) and scripts run by webbots, webservers, or desktop applications. SOAP is the successor of earlier protocols that make remote application calls, like Remote Procedure Call (RPC), Distributed Component Object Model (DCOM), and Common Object Request Broker Architecture (CORBA).


pages: 302 words: 85,877

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Joseph Menn

"World Economic Forum" Davos, 4chan, A Declaration of the Independence of Cyberspace, Andy Rubin, Apple II, autonomous vehicles, Berlin Wall, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Cambridge Analytica, Chelsea Manning, Citizen Lab, commoditize, corporate governance, digital rights, disinformation, Donald Trump, dumpster diving, Edward Snowden, end-to-end encryption, fake news, Firefox, Gabriella Coleman, Google Chrome, Haight Ashbury, independent contractor, information security, Internet of things, Jacob Appelbaum, Jason Scott: textfiles.com, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Laura Poitras, machine readable, Mark Zuckerberg, military-industrial complex, Mitch Kapor, Mondo 2000, Naomi Klein, NSO Group, Peter Thiel, pirate software, pre–internet, Ralph Nader, ransomware, Richard Stallman, Robert Mercer, Russian election interference, self-driving car, Sheryl Sandberg, side project, Silicon Valley, Skype, slashdot, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, tech worker, Whole Earth Catalog, WikiLeaks, zero day

The best known put a secure operating system on a memory card; the software would function properly even if the overall computer were compromised. Its features included an unchangeable logging system. The software would have been among the best possible defenses to the mass surveillance revealed by Snowden. Google did not release a finished version before Mudge left for a new venture: a nonprofit to examine code from binaries, the machine-readable instructions that programs give to computers, and score them based on standard safety features. Mudge and his wife Sarah’s Cyber Independent Testing Lab functioned like the labs at Consumer Reports, scanning for the digital equivalent of automatic brakes and seat belts, all without needing access to the source code.


pages: 304 words: 82,395

Big Data: A Revolution That Will Transform How We Live, Work, and Think by Viktor Mayer-Schonberger, Kenneth Cukier

23andMe, Affordable Care Act / Obamacare, airport security, Apollo 11, barriers to entry, Berlin Wall, big data - Walmart - Pop Tarts, Black Swan, book scanning, book value, business intelligence, business process, call centre, cloud computing, computer age, correlation does not imply causation, dark matter, data science, double entry bookkeeping, Eratosthenes, Erik Brynjolfsson, game design, hype cycle, IBM and the Holocaust, index card, informal economy, intangible asset, Internet of things, invention of the printing press, Jeff Bezos, Joi Ito, lifelogging, Louis Pasteur, machine readable, machine translation, Marc Benioff, Mark Zuckerberg, Max Levchin, Menlo Park, Moneyball by Michael Lewis explains big data, Nate Silver, natural language processing, Netflix Prize, Network effects, obamacare, optical character recognition, PageRank, paypal mafia, performance metric, Peter Thiel, Plato's cave, post-materialism, random walk, recommendation engine, Salesforce, self-driving car, sentiment analysis, Silicon Valley, Silicon Valley startup, smart grid, smart meter, social graph, sparse data, speech recognition, Steve Jobs, Steven Levy, systematic bias, the scientific method, The Signal and the Noise by Nate Silver, The Wealth of Nations by Adam Smith, Thomas Davenport, Turing test, vertical integration, Watson beat the top human players on Jeopardy!

Arguing that governments are only custodians of the information they collect, and that the private sector and society will be more innovative, advocates of open data call on official bodies to publicly release data for purposes both civic and commercial. To work, of course, the data must be in a standardized, machine-readable form so it can be easily processed. Otherwise, the information might be considered public only in name. The idea of open government data got a big boost when President Barack Obama, on his first full day in office on January 21, 2009, issued a presidential memorandum ordering the heads of federal agencies to release as much data as possible.


pages: 291 words: 81,703

Average Is Over: Powering America Beyond the Age of the Great Stagnation by Tyler Cowen

Amazon Mechanical Turk, behavioural economics, Black Swan, brain emulation, Brownian motion, business cycle, Cass Sunstein, Charles Babbage, choice architecture, complexity theory, computer age, computer vision, computerized trading, cosmological constant, crowdsourcing, dark matter, David Brooks, David Ricardo: comparative advantage, deliberate practice, driverless car, Drosophila, en.wikipedia.org, endowment effect, epigenetics, Erik Brynjolfsson, eurozone crisis, experimental economics, Flynn Effect, Freestyle chess, full employment, future of work, game design, Higgs boson, income inequality, industrial robot, informal economy, Isaac Newton, Johannes Kepler, John Markoff, Ken Thompson, Khan Academy, labor-force participation, Loebner Prize, low interest rates, low skilled workers, machine readable, manufacturing employment, Mark Zuckerberg, meta-analysis, microcredit, Myron Scholes, Narrative Science, Netflix Prize, Nicholas Carr, off-the-grid, P = NP, P vs NP, pattern recognition, Peter Thiel, randomized controlled trial, Ray Kurzweil, reshoring, Richard Florida, Richard Thaler, Ronald Reagan, Silicon Valley, Skype, statistical model, stem cell, Steve Jobs, Turing test, Tyler Cowen, Tyler Cowen: Great Stagnation, upwardly mobile, Yogi Berra

Rather than “reading articles,” we will consult the programs to spit out the results of their meta-studies, summarizing the research work to date, much as Rybka spits out an evaluation of a chess position. What used to be an individual journal article will become an input into the programs. The “expert” might be someone trained in making sense of the machine’s output, or turning the data into machine-readable form, rather than someone who does the actual work generating the estimates. That’s the single biggest change in economic science we can expect over the next fifty years. When it comes to “the new paradigm,” a lot of people are expecting the next Marx, Keynes, or Hayek. The changes to come will be more radical than that and they will challenge the very relationship that the scientist has to his or her craft of study.


pages: 308 words: 84,713

The Glass Cage: Automation and Us by Nicholas Carr

Airbnb, Airbus A320, Andy Kessler, Atul Gawande, autonomous vehicles, Bernard Ziegler, business process, call centre, Captain Sullenberger Hudson, Charles Lindbergh, Checklist Manifesto, cloud computing, cognitive load, computerized trading, David Brooks, deep learning, deliberate practice, deskilling, digital map, Douglas Engelbart, driverless car, drone strike, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, Flash crash, Frank Gehry, Frank Levy and Richard Murnane: The New Division of Labor, Frederick Winslow Taylor, future of work, gamification, global supply chain, Google Glasses, Google Hangouts, High speed trading, human-factors engineering, indoor plumbing, industrial robot, Internet of things, Ivan Sutherland, Jacquard loom, James Watt: steam engine, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Kevin Kelly, knowledge worker, low interest rates, Lyft, machine readable, Marc Andreessen, Mark Zuckerberg, means of production, natural language processing, new economy, Nicholas Carr, Norbert Wiener, Oculus Rift, pattern recognition, Peter Thiel, place-making, plutocrats, profit motive, Ralph Waldo Emerson, RAND corporation, randomized controlled trial, Ray Kurzweil, recommendation engine, robot derives from the Czech word robota Czech, meaning slave, scientific management, Second Machine Age, self-driving car, Silicon Valley, Silicon Valley ideology, software is eating the world, Stephen Hawking, Steve Jobs, systems thinking, tacit knowledge, TaskRabbit, technological determinism, technological solutionism, technoutopianism, TED Talk, The Wealth of Nations by Adam Smith, turn-by-turn navigation, Tyler Cowen, US Airways Flight 1549, Watson beat the top human players on Jeopardy!, William Langewiesche

“If the computational system is invisible as well as extensive,” the lab’s chief technologist, Mark Weiser, wrote in a 1999 article in IBM Systems Journal, “it becomes hard to know what is controlling what, what is connected to what, where information is flowing, [and] how it is being used.”13 We’d have to place a whole lot of trust in the people and companies running the system. The excitement about ubiquitous computing proved premature, as did the anxiety. The technology of the 1990s was not up to making the world machine-readable, and after the dot-com crash, investors were in no mood to bankroll the installation of expensive microchips and sensors everywhere. But much has changed in the succeeding fifteen years. The economic equations are different now. The price of computing gear has fallen sharply, as has the cost of high-speed data transmission.


pages: 254 words: 81,009

Busy by Tony Crabbe

airport security, Bluma Zeigarnik, British Empire, business process, classic study, cognitive dissonance, Daniel Kahneman / Amos Tversky, death from overwork, fear of failure, Frederick Winslow Taylor, gamification, haute cuisine, informal economy, inventory management, Isaac Newton, job satisfaction, karōshi / gwarosa / guolaosi, knowledge worker, Lao Tzu, Larry Ellison, loss aversion, low cost airline, machine readable, Marc Benioff, meta-analysis, Milgram experiment, Paradox of Choice, placebo effect, Richard Feynman, Rubik’s Cube, Salesforce, Saturday Night Live, science of happiness, scientific management, Shai Danziger, Stuart Kauffman, TED Talk, the long tail, Thorstein Veblen, Tim Cook: Apple

Ann Burnett, Denise Gorsline, Julie Semlak, and Adam Tyma, “Earning the Badge of Honor: The Social Construction of Time and Pace of Life.” Paper presented at the Annual Meeting of the NCA 93rd Annual Convention, TBA, Chicago, IL, November 14, 2007. 5. Tom W. Smith et al., General Social Surveys, 1972–2010 (machine-readable data file) (Chicago: National Opinion Research Center, 2011), in Brigid Schulte, Overwhelmed: Work, Love, and Play When No One Has the Time (New York: Sarah Crichton Books, 2014). 6. B. S. McEwen, “Allostasis and allostatic load: implications for neuropsychopharmacology,” Neuropsychopharmacology 22 (2000): 108–24. 7.


pages: 321

Finding Alphas: A Quantitative Approach to Building Trading Strategies by Igor Tulchinsky

algorithmic trading, asset allocation, automated trading system, backpropagation, backtesting, barriers to entry, behavioural economics, book value, business cycle, buy and hold, capital asset pricing model, constrained optimization, corporate governance, correlation coefficient, credit crunch, Credit Default Swap, currency risk, data science, deep learning, discounted cash flows, discrete time, diversification, diversified portfolio, Eugene Fama: efficient market hypothesis, financial engineering, financial intermediation, Flash crash, Geoffrey Hinton, implied volatility, index arbitrage, index fund, intangible asset, iterative process, Long Term Capital Management, loss aversion, low interest rates, machine readable, market design, market microstructure, merger arbitrage, natural language processing, passive investing, pattern recognition, performance metric, Performance of Mutual Funds in the Period, popular capitalism, prediction markets, price discovery process, profit motive, proprietary trading, quantitative trading / quantitative finance, random walk, Reminiscences of a Stock Operator, Renaissance Technologies, risk free rate, risk tolerance, risk-adjusted returns, risk/return, selection bias, sentiment analysis, shareholder value, Sharpe ratio, short selling, Silicon Valley, speech recognition, statistical arbitrage, statistical model, stochastic process, survivorship bias, systematic bias, systematic trading, text mining, transaction costs, Vanguard fund, yield curve

Sometimes vendors do parsing and processing before providing data to their clients; fundamental data is an example. For unstructured yet sophisticated data, such as news, Twitter posts, and so on, vendors typically apply natural language processing techniques to analyze the content of the raw data. They provide machine-readable data to their clients instead of raw data that is only human-readable. Some vendors even sell alpha models directly – this means the data itself is the output of alpha models. The clients need only to load the data and trade according to it. Such alpha models are risky, however, because they may be overfit and/or overcrowded, with many clients of the same vendor trading the same model.


pages: 326 words: 84,180

Dark Matters: On the Surveillance of Blackness by Simone Browne

4chan, affirmative action, Affordable Care Act / Obamacare, airport security, autonomous vehicles, bitcoin, British Empire, cloud computing, colonial rule, computer vision, crowdsourcing, dark matter, disinformation, Edward Snowden, European colonialism, ghettoisation, Google Glasses, Internet Archive, job satisfaction, lifelogging, machine readable, mass incarceration, obamacare, Panopticon Jeremy Bentham, pattern recognition, r/findbostonbombers, Scientific racism, security theater, sexual politics, transatlantic slave trade, urban renewal, US Airways Flight 1549, W. E. B. Du Bois, Wayback Machine, Works Progress Administration

So when Mayer instructs her viewers that when it comes to facial recognition, it “isn’t about blending in” but rather “sticking out, yet remaining undetected” and that “black lipstick is a great way to cover lots of surface on your face quickly,” she points out the productive possibilities that come from being unseen, where blackness, in this case applying black makeup, could be subversive in its capacity to distort and interfere when it comes to machine readability and standard algorithms. For this digital camouflage technique to be most effective, meaning for cv Dazzle to render the subject either unrecognized or a false match, it is often a matter of contrast. Adam Harvey’s cv Dazzle Look Book features mainly white-looking women with hair styled in dissymmetrical ways that work to partially conceal their facial features and certain facial landmarks, like the space between the eyes.


pages: 453 words: 79,218

Lonely Planet Best of Hawaii by Lonely Planet

Airbnb, bike sharing, call centre, carbon footprint, G4S, Kickstarter, land reform, Larry Ellison, low cost airline, machine readable, Maui Hawaii, Peter Pan Syndrome, polynesian navigation

If you’re not sure whether something’s sacred, consider that in Hawaiian thinking, everything is sacred, especially in nature. oDon’t stack rocks or wrap them in ti leaves at waterfalls, heiau (temples) etc. This bastardization of the ancient Hawaiian practice of leaving hoʻokupu (offerings) at sacred sites is littering. Passports oA machine-readable passport (MRP) is required for all foreign citizens to enter the USA. oYour passport must be valid for six months beyond your expected dates of stay in the USA. oIf your passport was issued/renewed after October 26, 2006, you need an ‘e-passport’ with a digital photo and an integrated chip containing biometric data.


pages: 422 words: 86,414

Hands-On RESTful API Design Patterns and Best Practices by Harihara Subramanian

blockchain, business logic, business process, cloud computing, continuous integration, create, read, update, delete, cyber-physical system, data science, database schema, DevOps, disruptive innovation, domain-specific language, fault tolerance, information security, Infrastructure as a Service, Internet of things, inventory management, job automation, Kickstarter, knowledge worker, Kubernetes, loose coupling, Lyft, machine readable, microservices, MITM: man-in-the-middle, MVC pattern, Salesforce, self-driving car, semantic web, single page application, smart cities, smart contracts, software as a service, SQL injection, supply-chain management, web application, WebSocket

username=my_username --header 'Content-Type: application/json' --header 'Accept: application/json' We can conclude the following: Support media type selection using a query parameter: To support clients with simple links and debugging, REST APIs should support media type selection through a query parameter named accept, with a value format that mirrors that of the accept HTTP request header An example is REST APIs should prefer a more precise and generic approach as following media type, using the GET https://swapi.co/api/planets/1/?format=json query parameter identification over the other alternatives Windows OS users can use MobaXterm (https://mobaxterm.mobatek.net/) or any SSH clients that supports Unix commands. Representations As we know, machine-readable description of a resource's current state with a request or response is a representation, and it can be in different formats. The following section discusses the rules for most common resource formats, such as JSON and hypermedia, and error types in brief. Message body format REST API communications in the distributed environment are most often as a text-based format, and we will discuss the JSON text-format representation rules as follows: Use JSON for resource representation and it should be well-formed You may use XML and other formats as well Don't create additional envelopes or any custom transport wrappers and leverage only HTTP envelopes Hypermedia representation As we have understood from Chapter 1, Introduction to the Basics of RESTful Architecture, REST API clients can programmatically navigate using a uniform link structure as a HATEOAS response, and following are a few rules related to hypermedia representations.


pages: 288 words: 86,995

Rule of the Robots: How Artificial Intelligence Will Transform Everything by Martin Ford

AI winter, Airbnb, algorithmic bias, algorithmic trading, Alignment Problem, AlphaGo, Amazon Mechanical Turk, Amazon Web Services, artificial general intelligence, Automated Insights, autonomous vehicles, backpropagation, basic income, Big Tech, big-box store, call centre, carbon footprint, Chris Urmson, Claude Shannon: information theory, clean water, cloud computing, commoditize, computer age, computer vision, Computing Machinery and Intelligence, coronavirus, correlation does not imply causation, COVID-19, crowdsourcing, data is the new oil, data science, deep learning, deepfake, DeepMind, Demis Hassabis, deskilling, disruptive innovation, Donald Trump, Elon Musk, factory automation, fake news, fulfillment center, full employment, future of work, general purpose technology, Geoffrey Hinton, George Floyd, gig economy, Gini coefficient, global pandemic, Googley, GPT-3, high-speed rail, hype cycle, ImageNet competition, income inequality, independent contractor, industrial robot, informal economy, information retrieval, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jeff Bezos, job automation, John Markoff, Kiva Systems, knowledge worker, labor-force participation, Law of Accelerating Returns, license plate recognition, low interest rates, low-wage service sector, Lyft, machine readable, machine translation, Mark Zuckerberg, Mitch Kapor, natural language processing, Nick Bostrom, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, Ocado, OpenAI, opioid epidemic / opioid crisis, passive income, pattern recognition, Peter Thiel, Phillips curve, post scarcity, public intellectual, Ray Kurzweil, recommendation engine, remote working, RFID, ride hailing / ride sharing, Robert Gordon, Rodney Brooks, Rubik’s Cube, Sam Altman, self-driving car, Silicon Valley, Silicon Valley startup, social distancing, SoftBank, South of Market, San Francisco, special economic zone, speech recognition, stealth mode startup, Stephen Hawking, superintelligent machines, TED Talk, The Future of Employment, The Rise and Fall of American Growth, the scientific method, Turing machine, Turing test, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber and Lyft, uber lyft, universal basic income, very high income, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, WikiLeaks, women in the workforce, Y Combinator

As far back as 2013, a group of physicists studied financial markets and published a paper in the journal Nature declaring that “an emerging ecology of competitive machines featuring ‘crowds’ of predatory algorithms” existed and that algorithmic trading had perhaps already progressed beyond the control—and even comprehension—of the humans who designed the systems.20 Those algorithms now incorporate the latest advances in AI, their influence on markets has increased dramatically, and the ways in which they interact have grown even more incomprehensible. Many algorithms, for example, have the ability to tap directly into machine-readable news sources provided by companies like Bloomberg and Reuters and then trade on that information in tiny fractions of a second. When it comes to short-term moment-by-moment trading, no human being can begin to comprehend the details of what is unfolding, let alone attempt to outsmart the algorithms.


pages: 708 words: 223,211

The Friendly Orange Glow: The Untold Story of the PLATO System and the Dawn of Cyberculture by Brian Dear

air traffic controllers' union, AltaVista, Alvin Toffler, Apple II, Apple Newton, Buckminster Fuller, Charles Babbage, cloud computing, complexity theory, computer age, Computer Lib, conceptual framework, corporate social responsibility, disruptive innovation, Douglas Engelbart, Douglas Engelbart, Dynabook, Elon Musk, en.wikipedia.org, Fairchild Semiconductor, finite state, Future Shock, game design, Hacker News, Howard Rheingold, Ivan Sutherland, John Markoff, lateral thinking, linear programming, machine readable, Marc Andreessen, Marshall McLuhan, Menlo Park, Metcalfe’s law, Mitch Kapor, Mother of all demos, natural language processing, Neal Stephenson, Palm Treo, Plato's cave, pre–internet, publish or perish, Ralph Nader, Robert Metcalfe, Ronald Reagan, Silicon Valley, Silicon Valley startup, Skinner box, Skype, software is eating the world, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Ted Nelson, the medium is the message, The Soul of a New Machine, three-martini lunch, Watson beat the top human players on Jeopardy!, Whole Earth Catalog

And I think that’s why he and Don would get along so extraordinarily well.” The “turn ’em loose” recruiting style led to great things. Steve Singer, Hanson says, “wrote an entire compiler from scratch, he was quite amazing.” The compiler (a system program that takes a human-readable programming language and converts it into machine-readable form for execution by the central processor) was called CATO, standing for, appropriately enough, “Compiler for Automatic Teaching Operations.” Frampton, like so many Uni kids would do in coming years, had one day wandered over to CSL and marveled at the work being done in the lab. He was particularly impressed with the Cornfield project.

Joseph’s College in Indiana, and went on to Ohio State University for a master’s and a PhD in music theory. The research for both graduate degrees involved extensive use of computers. For his master’s thesis, he wrote a program that enabled a person to type a musical score into a keypunch machine using a special, machine-readable code. The system then analyzed the music. For his 1973 doctoral dissertation he constructed a computerized, musical equivalent of Professor Henry Higgins: given a piece of music, the system could determine what country it was written in by analyzing its stylistic traits. He took sixteen string quartets: four from Germany, four from France, four from Czechoslovakia, and four from Russia.


pages: 371 words: 93,570

Broad Band: The Untold Story of the Women Who Made the Internet by Claire L. Evans

4chan, Ada Lovelace, air gap, Albert Einstein, Bletchley Park, British Empire, Charles Babbage, colonial rule, Colossal Cave Adventure, computer age, crowdsourcing, D. B. Cooper, dark matter, dematerialisation, Doomsday Book, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, East Village, Edward Charles Pickering, game design, glass ceiling, Grace Hopper, Gödel, Escher, Bach, Haight Ashbury, Harvard Computers: women astronomers, Honoré de Balzac, Howard Rheingold, HyperCard, hypertext link, index card, information retrieval, Internet Archive, Jacquard loom, John von Neumann, Joseph-Marie Jacquard, junk bonds, knowledge worker, Leonard Kleinrock, machine readable, Mahatma Gandhi, Mark Zuckerberg, Menlo Park, military-industrial complex, Mondo 2000, Mother of all demos, Network effects, old-boy network, On the Economy of Machinery and Manufactures, packet switching, PalmPilot, pets.com, rent control, RFC: Request For Comment, rolodex, San Francisco homelessness, semantic web, side hustle, Silicon Valley, Skype, South of Market, San Francisco, Steve Jobs, Steven Levy, Stewart Brand, subscription business, tech worker, technoutopianism, Ted Nelson, telepresence, The Soul of a New Machine, Wayback Machine, Whole Earth Catalog, Whole Earth Review, women in the workforce, Works Progress Administration, Y2K

“We are now, twenty-seven years after the Web, living in a world that is driven by data,” Wendy reminds me. How and why that data are linked is becoming increasingly important, especially as we teach machines to interpret connections for us—in order for artificial intelligence to understand the Web, it will need an additional layer of machine-readable information on top of our documents, a kind of meta-Web that proponents call the Semantic Web. While humans might understand connections intuitively, and are willing to ignore when links rot or lead nowhere, computers require more consistent information about the source, the destination, and the meaning of every link.


pages: 285 words: 86,853

What Algorithms Want: Imagination in the Age of Computing by Ed Finn

Airbnb, Albert Einstein, algorithmic bias, algorithmic management, algorithmic trading, AlphaGo, Amazon Mechanical Turk, Amazon Web Services, bitcoin, blockchain, business logic, Charles Babbage, Chuck Templeton: OpenTable:, Claude Shannon: information theory, commoditize, Computing Machinery and Intelligence, Credit Default Swap, crowdsourcing, cryptocurrency, data science, DeepMind, disruptive innovation, Donald Knuth, Donald Shoup, Douglas Engelbart, Douglas Engelbart, Elon Musk, Evgeny Morozov, factory automation, fiat currency, Filter Bubble, Flash crash, game design, gamification, Google Glasses, Google X / Alphabet X, Hacker Conference 1984, High speed trading, hiring and firing, Ian Bogost, industrial research laboratory, invisible hand, Isaac Newton, iterative process, Jaron Lanier, Jeff Bezos, job automation, John Conway, John Markoff, Just-in-time delivery, Kickstarter, Kiva Systems, late fees, lifelogging, Loebner Prize, lolcat, Lyft, machine readable, Mother of all demos, Nate Silver, natural language processing, Neal Stephenson, Netflix Prize, new economy, Nicholas Carr, Nick Bostrom, Norbert Wiener, PageRank, peer-to-peer, Peter Thiel, power law, Ray Kurzweil, recommendation engine, Republic of Letters, ride hailing / ride sharing, Satoshi Nakamoto, self-driving car, sharing economy, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Silicon Valley startup, SimCity, Skinner box, Snow Crash, social graph, software studies, speech recognition, statistical model, Steve Jobs, Steven Levy, Stewart Brand, supply-chain management, tacit knowledge, TaskRabbit, technological singularity, technological solutionism, technoutopianism, the Cathedral and the Bazaar, The Coming Technological Singularity, the scientific method, The Signal and the Noise by Nate Silver, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, transaction costs, traveling salesman, Turing machine, Turing test, Uber and Lyft, Uber for X, uber lyft, urban planning, Vannevar Bush, Vernor Vinge, wage slave

Their variations of pragmatism then inspire elaborate responses and counter-solutions, or what communication researcher Tarleton Gillespie calls the “tacit negotiation” we perform to adapt ourselves to algorithmic systems: we enunciate differently when speaking to machines, use hashtags to make updates more machine-readable, and describe our work in search engine-friendly terms.13 The tacit assumptions lurking beneath the pragmatist’s definition are becoming harder and harder to ignore. The apparent transparency and simplicity of computational systems are leading many to see them as vehicles for unbiased decision-making.


pages: 389 words: 87,758

No Ordinary Disruption: The Four Global Forces Breaking All the Trends by Richard Dobbs, James Manyika

2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, access to a mobile phone, additive manufacturing, Airbnb, Amazon Mechanical Turk, American Society of Civil Engineers: Report Card, asset light, autonomous vehicles, Bakken shale, barriers to entry, business cycle, business intelligence, carbon tax, Carmen Reinhart, central bank independence, circular economy, cloud computing, corporate governance, creative destruction, crowdsourcing, data science, demographic dividend, deskilling, digital capitalism, disintermediation, disruptive innovation, distributed generation, driverless car, Erik Brynjolfsson, financial innovation, first square of the chessboard, first square of the chessboard / second half of the chessboard, Gini coefficient, global supply chain, global village, high-speed rail, hydraulic fracturing, illegal immigration, income inequality, index fund, industrial robot, intangible asset, Intergovernmental Panel on Climate Change (IPCC), Internet of things, inventory management, job automation, Just-in-time delivery, Kenneth Rogoff, Kickstarter, knowledge worker, labor-force participation, low interest rates, low skilled workers, Lyft, M-Pesa, machine readable, mass immigration, megacity, megaproject, mobile money, Mohammed Bouazizi, Network effects, new economy, New Urbanism, ocean acidification, oil shale / tar sands, oil shock, old age dependency ratio, openstreetmap, peer-to-peer lending, pension reform, pension time bomb, private sector deleveraging, purchasing power parity, quantitative easing, recommendation engine, Report Card for America’s Infrastructure, RFID, ride hailing / ride sharing, Salesforce, Second Machine Age, self-driving car, sharing economy, Silicon Valley, Silicon Valley startup, Skype, smart cities, Snapchat, sovereign wealth fund, spinning jenny, stem cell, Steve Jobs, subscription business, supply-chain management, synthetic biology, TaskRabbit, The Great Moderation, trade route, transaction costs, Travis Kalanick, uber lyft, urban sprawl, Watson beat the top human players on Jeopardy!, working-age population, Zipcar

., strength, weight, conductivity) or functionality RETHINKING ENERGY COMES OF AGE 3.Energy storage Devices or systems that store energy for later use, including batteries 4.Advanced oil and gas exploration and recovery Exploration and recovery techniques that make extraction of unconventional oil and gas economical 5.Renewable energy Generation of electricity from renewable sources with reduced harmful climate impact MACHINES WORKING FOR US 6.Advanced robotics Increasingly capable robots with enhanced senses, dexterity, and intelligence used to automate tasks or augment humans 7.Autonomous and near-autonomous vehicles Vehicles that can navigate and operate with reduced or no human intervention 8.3-D printing Additive manufacturing techniques to create objects by printing layers of material based on digital models IT AND HOW WE USE IT 9.Mobile Internet Increasingly inexpensive and capable mobile computing devices and Internet connectivity 10.Internet of things Networks of low-cost sensors and actuators for data collection, monitoring, decision making, and process optimization 11.Cloud technology Use of computer hardware and software resources delivered over a network or the Internet, often as a service 12.Automation of knowledge work Intelligent software systems that can perform knowledge work tasks involving unstructured commands and subtle judgments The data avalanche is set to become more powerful only because of a movement toward “open data,” in which data are freely shared beyond their originating organizations—including governments and businesses—in a machine-readable format at low cost. More than forty nations, including Canada, India, and Singapore, have committed to opening up their electronic data, everything from weather records and crime statistics to transport data. The excitement about open data has largely revolved around the potential to empower citizens and improve the delivery of public services, ranging from urban transportation to personalized health care.


pages: 692 words: 95,244

Speaking JavaScript: An In-Depth Guide for Programmers by Axel Rauschmayer

Airbnb, anti-pattern, digital divide, en.wikipedia.org, fail fast, Firefox, functional programming, higher-order functions, machine readable, web application

This method is provided by the ECMAScript Internationalization API (see The ECMAScript Internationalization API) and does not make much sense without it. Date.prototype.toUTCString(): Tue, 30 Oct 2001 16:43:07 GMT Date and time, in UTC. Date.prototype.toGMTString(): Deprecated; use toUTCString() instead. Date and time (machine-readable) Date.prototype.toISOString(): 2001-10-30T16:43:07.856Z All internal properties show up in the returned string. The format is in accordance with Date Time Formats; the time zone is always Z. Date.prototype.toJSON(): This method internally calls toISOString(). It is used by JSON.stringify() (see JSON.stringify(value, replacer?


pages: 398 words: 86,855

Bad Data Handbook by Q. Ethan McCallum

Amazon Mechanical Turk, asset allocation, barriers to entry, Benoit Mandelbrot, business intelligence, cellular automata, chief data officer, Chuck Templeton: OpenTable:, cloud computing, cognitive dissonance, combinatorial explosion, commoditize, conceptual framework, data science, database schema, DevOps, en.wikipedia.org, Firefox, Flash crash, functional programming, Gini coefficient, hype cycle, illegal immigration, iterative process, labor-force participation, loose coupling, machine readable, natural language processing, Netflix Prize, One Laptop per Child (OLPC), power law, quantitative trading / quantitative finance, recommendation engine, selection bias, sentiment analysis, SQL injection, statistical model, supply-chain management, survivorship bias, text mining, too big to fail, web application

RPM Revenue Per 1,000 Impressions (usually ad impressions). CTR Click Through Rate—Ratio of Clicks to Impressions. Used as a measure of the success of an advertising campaign or content recommendation. XML Extensible Markup Language—Text-based markup language designed to be both human and machine-readable. JSON JavaScript Object Notation—Lightweight text-based open standard designed for human-readable data interchange. Natively supported by JavaScript, so often used by JavaScript widgets on websites to communicate with back-end servers. CSV Comma Separated Value—Text file containing one record per row, with fields separated by commas.


pages: 326 words: 91,532

The Pay Off: How Changing the Way We Pay Changes Everything by Gottfried Leibbrandt, Natasha de Teran

"World Economic Forum" Davos, Alan Greenspan, Ayatollah Khomeini, bank run, banking crisis, banks create money, Bear Stearns, Big Tech, bitcoin, blockchain, call centre, cashless society, Clayton Christensen, cloud computing, coronavirus, COVID-19, Credit Default Swap, cross-border payments, cryptocurrency, David Graeber, Donald Trump, Edward Snowden, Ethereum, ethereum blockchain, financial exclusion, global pandemic, global reserve currency, illegal immigration, information asymmetry, initial coin offering, interest rate swap, Internet of things, Irish bank strikes, Julian Assange, large denomination, light touch regulation, lockdown, low interest rates, M-Pesa, machine readable, Money creation, money: store of value / unit of account / medium of exchange, move fast and break things, Network effects, Northern Rock, off grid, offshore financial centre, payday loans, post-industrial society, printed gun, QR code, RAND corporation, ransomware, Real Time Gross Settlement, reserve currency, Rishi Sunak, Silicon Valley, Silicon Valley startup, Skype, smart contracts, sovereign wealth fund, special drawing rights, tech billionaire, the payments system, too big to fail, transaction costs, WikiLeaks, you are the product

In 1973 alone, credit card losses were estimated to be almost $300 million, or 1.15 per cent of sales. It turned out the answer had already been invented. One day in the early 1960s, Dorothea Parry had been busy with the housework when her husband Forrest, an engineer at IBM, came home to regale her with the problems he was having at work. He had been tasked with designing a machine-readable identity card for CIA officials. His plan was to attach a strip of magnetised tape to a plastic card, but glue warped the tape, making it unreadable. The resourceful Mrs Parry suggested he use an iron to melt the strip onto the card. It worked, and the magnetised data strip, or ‘magstripe’, was born.


Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems by Martin Kleppmann

active measures, Amazon Web Services, billion-dollar mistake, bitcoin, blockchain, business intelligence, business logic, business process, c2.com, cloud computing, collaborative editing, commoditize, conceptual framework, cryptocurrency, data science, database schema, deep learning, DevOps, distributed ledger, Donald Knuth, Edward Snowden, end-to-end encryption, Ethereum, ethereum blockchain, exponential backoff, fake news, fault tolerance, finite state, Flash crash, Free Software Foundation, full text search, functional programming, general-purpose programming language, Hacker News, informal economy, information retrieval, Internet of things, iterative process, John von Neumann, Ken Thompson, Kubernetes, Large Hadron Collider, level 1 cache, loose coupling, machine readable, machine translation, Marc Andreessen, microservices, natural language processing, Network effects, no silver bullet, operational security, packet switching, peer-to-peer, performance metric, place-making, premature optimization, recommendation engine, Richard Feynman, self-driving car, semantic web, Shoshana Zuboff, social graph, social web, software as a service, software is eating the world, sorting algorithm, source of truth, SPARQL, speech recognition, SQL injection, statistical model, surveillance capitalism, systematic bias, systems thinking, Tragedy of the Commons, undersea cable, web application, WebSocket, wikimedia commons

The triple-store data model is completely independ‐ ent of the semantic web—for example, Datomic [40] is a triple-store that does not claim to have anything to do with it.vii But since the two are so closely linked in many people’s minds, we should discuss them briefly. The semantic web is fundamentally a simple and reasonable idea: websites already publish information as text and pictures for humans to read, so why don’t they also publish information as machine-readable data for computers to read? The Resource Description Framework (RDF) [41] was intended as a mechanism for different web‐ sites to publish data in a consistent format, allowing data from different websites to be automatically combined into a web of data—a kind of internet-wide “database of everything.”

It was started in 2009 as a subproject of Hadoop, as a result of Thrift not being a good fit for Hadoop’s use cases [21]. Avro also uses a schema to specify the structure of the data being encoded. It has two schema languages: one (Avro IDL) intended for human editing, and one (based on JSON) that is more easily machine-readable. Our example schema, written in Avro IDL, might look like this: record Person { string userName; union { null, long } favoriteNumber = null; array<string> interests; } The equivalent JSON representation of that schema is as follows: { "type": "record", "name": "Person", "fields": [ {"name": "userName", "type": "string"}, {"name": "favoriteNumber", "type": ["null", "long"], "default": null}, {"name": "interests", "type": {"type": "array", "items": "string"}} ] } First of all, notice that there are no tag numbers in the schema.


pages: 1,065 words: 229,099

Real World Haskell by Bryan O'Sullivan, John Goerzen, Donald Stewart, Donald Bruce Stewart

bash_history, database schema, Debian, distributed revision control, domain-specific language, duck typing, en.wikipedia.org, Firefox, functional programming, general-purpose programming language, Guido van Rossum, higher-order functions, job automation, Larry Wall, lateral thinking, level 1 cache, machine readable, p-value, panic early, plutocrats, revision control, sorting algorithm, SQL injection, transfer pricing, type inference, web application, Yochai Benkler

That would fail, because we haven’t written a main function, which GHC calls to start the execution of a standalone program. After ghc completes, if we list the contents of the directory, it should contain two new files: SimpleJSON.hi and SimpleJSON.o. The former is an interface file, in which ghc stores information about the names exported from our module in machine-readable form. The latter is an object file, which contains the generated machine code. Generating a Haskell Program and Importing Modules Now that we’ve successfully compiled our minimal library, we’ll write a tiny program to exercise it. Create the following file in your text editor and save it as Main.hs: -- file: ch05/Main.hs module Main () where import SimpleJSON main = print (JObject [("foo", JNumber 1), ("bar", JBool False)]) Notice the import directive that follows the module declaration.

Serialization with read and show You may often have a data structure in memory that you need to store on disk for later retrieval or to send across the network. The process of converting data in memory to a flat series of bits for storage is called serialization. It turns out that read and show make excellent tools for serialization. show produces output that is both human- and machine-readable. Most show output is also syntactically valid Haskell, though it is up to people that write Show instances to make it so. Parsing large strings String handling in Haskell is normally lazy, so read and show can be used on quite large data structures without incident. The built-in read and show instances in Haskell are efficient and implemented in pure Haskell.


pages: 1,237 words: 227,370

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems by Martin Kleppmann

active measures, Amazon Web Services, billion-dollar mistake, bitcoin, blockchain, business intelligence, business logic, business process, c2.com, cloud computing, collaborative editing, commoditize, conceptual framework, cryptocurrency, data science, database schema, deep learning, DevOps, distributed ledger, Donald Knuth, Edward Snowden, end-to-end encryption, Ethereum, ethereum blockchain, exponential backoff, fake news, fault tolerance, finite state, Flash crash, Free Software Foundation, full text search, functional programming, general-purpose programming language, Hacker News, informal economy, information retrieval, Infrastructure as a Service, Internet of things, iterative process, John von Neumann, Ken Thompson, Kubernetes, Large Hadron Collider, level 1 cache, loose coupling, machine readable, machine translation, Marc Andreessen, microservices, natural language processing, Network effects, no silver bullet, operational security, packet switching, peer-to-peer, performance metric, place-making, premature optimization, recommendation engine, Richard Feynman, self-driving car, semantic web, Shoshana Zuboff, social graph, social web, software as a service, software is eating the world, sorting algorithm, source of truth, SPARQL, speech recognition, SQL injection, statistical model, surveillance capitalism, systematic bias, systems thinking, Tragedy of the Commons, undersea cable, web application, WebSocket, wikimedia commons

The triple-store data model is completely independent of the semantic web—for example, Datomic [40] is a triple-store that does not claim to have anything to do with it.vii But since the two are so closely linked in many people’s minds, we should discuss them briefly. The semantic web is fundamentally a simple and reasonable idea: websites already publish information as text and pictures for humans to read, so why don’t they also publish information as machine-readable data for computers to read? The Resource Description Framework (RDF) [41] was intended as a mechanism for different websites to publish data in a consistent format, allowing data from different websites to be automatically combined into a web of data—a kind of internet-wide “database of everything.”

It was started in 2009 as a subproject of Hadoop, as a result of Thrift not being a good fit for Hadoop’s use cases [21]. Avro also uses a schema to specify the structure of the data being encoded. It has two schema languages: one (Avro IDL) intended for human editing, and one (based on JSON) that is more easily machine-readable. Our example schema, written in Avro IDL, might look like this: record Person { string userName; union { null, long } favoriteNumber = null; array<string> interests; } The equivalent JSON representation of that schema is as follows: { "type": "record", "name": "Person", "fields": [ {"name": "userName", "type": "string"}, {"name": "favoriteNumber", "type": ["null", "long"], "default": null}, {"name": "interests", "type": {"type": "array", "items": "string"}} ] } First of all, notice that there are no tag numbers in the schema.


pages: 322 words: 99,066

The End of Secrecy: The Rise and Fall of WikiLeaks by The "Guardian", David Leigh, Luke Harding

"World Economic Forum" Davos, 4chan, air gap, banking crisis, centre right, Chelsea Manning, citizen journalism, Climategate, cloud computing, credit crunch, crowdsourcing, Downton Abbey, drone strike, end-to-end encryption, eurozone crisis, Evgeny Morozov, friendly fire, global village, Hacker Ethic, impulse control, Jacob Appelbaum, Julian Assange, knowledge economy, machine readable, military-industrial complex, Mohammed Bouazizi, Nelson Mandela, offshore financial centre, operational security, post-work, rolodex, Seymour Hersh, Silicon Valley, Skype, Steven Levy, sugar pill, uranium enrichment, WikiLeaks

The small company that licensed it, Tableau Software, removed the graphic from its public site – also feeling the pressure (though there was no direct contact) from Lieberman’s office. The dominoes then started to fall. The company EveryDNS, which provides free routing services (translating human-readable addresses such as wikileaks.org into machine readable internet addresses such as 64.64.12.170) terminated the wikileaks.org domain name. It also deleted all email addresses associated with it. Justifying the move, EveryDNS said the constant hacker attacks on WikiLeaks were inconveniencing other customers. In effect, WikiLeaks had now vanished from the web for anyone who couldn’t work out how to discover a numeric address for the site.


RDF Database Systems: Triples Storage and SPARQL Query Processing by Olivier Cure, Guillaume Blin

Amazon Web Services, bioinformatics, business intelligence, cloud computing, database schema, fault tolerance, folksonomy, full text search, functional programming, information retrieval, Internet Archive, Internet of things, linked data, machine readable, NP-complete, peer-to-peer, performance metric, power law, random walk, recommendation engine, RFID, semantic web, Silicon Valley, social intelligence, software as a service, SPARQL, sparse data, web application

For example, as a semi-structured data model, RDF data sets can be described with expressive schema languages, such as RDF Schema (RDFS) or Web Ontology Language (OWL), and can be linked to other documents present on the Web, forming the Linked Data movement. With the emergence of Linked Data, a pattern for hyperlinking machine-readable data sets that extensively uses RDF, URIs, and HTTP, we can consider that more and more data will be directly produced in or transformed into RDF. In 2013, the linked open data (LOD), a set of RDF data produced from open data sources, is considered to contain over 50 billion triples on domains as diverse as medicine, culture, and science, just to name a few.


pages: 332 words: 100,601

Rebooting India: Realizing a Billion Aspirations by Nandan Nilekani

Airbnb, Atul Gawande, autonomous vehicles, barriers to entry, bitcoin, call centre, carbon credits, cashless society, clean water, cloud computing, collaborative consumption, congestion charging, DARPA: Urban Challenge, data science, dematerialisation, demographic dividend, digital rights, driverless car, Edward Snowden, en.wikipedia.org, energy security, fail fast, financial exclusion, gamification, Google Hangouts, illegal immigration, informal economy, information security, Khan Academy, Kickstarter, knowledge economy, land reform, law of one price, M-Pesa, machine readable, Mahatma Gandhi, Marc Andreessen, Mark Zuckerberg, mobile money, Mohammed Bouazizi, more computing power than Apollo, Negawatt, Network effects, new economy, off-the-grid, offshore financial centre, price mechanism, price stability, rent-seeking, RFID, Ronald Coase, school choice, school vouchers, self-driving car, sharing economy, Silicon Valley, single source of truth, Skype, smart grid, smart meter, software is eating the world, source of truth, Steve Jobs, systems thinking, The future is already here, The Nature of the Firm, transaction costs, vertical integration, WikiLeaks, work culture

When we already have a centralized system capable of storing the Aadhaar data of 1.2 billion Indians, there is no reason why we can’t build a similar system for voter ID data as well. Transparency is a second, equally important attribute. As part of the government’s open-data initiative, voter lists should be made available for anyone to inspect in a machine-readable format, one that any computer can recognize and process. That is not the case today; voter rolls are available only in formats that computers cannot read, which means that you have to download the data manually and build your own software to read and analyse them, unless you are up to the task of sifting through hundreds upon thousands of entries yourself.


Cataloging the World: Paul Otlet and the Birth of the Information Age by Alex Wright

1960s counterculture, Ada Lovelace, barriers to entry, British Empire, business climate, business intelligence, Cape to Cairo, card file, centralized clearinghouse, Charles Babbage, Computer Lib, corporate governance, crowdsourcing, Danny Hillis, Deng Xiaoping, don't be evil, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, European colonialism, folksonomy, Frederick Winslow Taylor, Great Leap Forward, hive mind, Howard Rheingold, index card, information retrieval, invention of movable type, invention of the printing press, Jane Jacobs, John Markoff, Kevin Kelly, knowledge worker, Law of Accelerating Returns, Lewis Mumford, linked data, Livingstone, I presume, lone genius, machine readable, Menlo Park, military-industrial complex, Mother of all demos, Norman Mailer, out of africa, packet switching, pneumatic tube, profit motive, RAND corporation, Ray Kurzweil, scientific management, Scramble for Africa, self-driving car, semantic web, Silicon Valley, speech recognition, Steve Jobs, Stewart Brand, systems thinking, Ted Nelson, The Death and Life of Great American Cities, the scientific method, Thomas L Friedman, urban planning, Vannevar Bush, W. E. B. Du Bois, Whole Earth Catalog

In Paul Otlet et La Bibliologie, Fondateur du Mundaneum (1868–1944). Architecte du savoir, artisan de paix, 159–175. Bruxelles: Les Impressions Nouvelles, 2010. ———. “Web 2.0 and the Semantic Web in Research from a Historical Perspective. The Designs of Paul Otlet (1868–1944) for Telecommunication and Machine Readable Documentation to Organize Research and Society.” Knowledge Organization 36, no. 4 (2009): 214–26. Visite d’Andrew Carnegie au Palais Mondial-Mundaneum/1913 (BXLS). Le Mundaneum, 1913. http://www.youtube.com/watch?v=Q2T7mk16zqs&list=PLjMHaWxVFdUi4-133HuZ1dllZAvJ-3Nu&index=9. Von Bethmann-Hollweg, Chancellor Theobald.


pages: 268 words: 109,447

The Cultural Logic of Computation by David Golumbia

Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, American ideology, Benoit Mandelbrot, Bletchley Park, borderless world, business process, cellular automata, citizen journalism, Claude Shannon: information theory, computer age, Computing Machinery and Intelligence, corporate governance, creative destruction, digital capitalism, digital divide, en.wikipedia.org, finite state, folksonomy, future of work, Google Earth, Howard Zinn, IBM and the Holocaust, iterative process, Jaron Lanier, jimmy wales, John von Neumann, Joseph Schumpeter, late capitalism, Lewis Mumford, machine readable, machine translation, means of production, natural language processing, Norbert Wiener, One Laptop per Child (OLPC), packet switching, RAND corporation, Ray Kurzweil, RFID, Richard Stallman, semantic web, Shoshana Zuboff, Slavoj Žižek, social web, stem cell, Stephen Hawking, Steve Ballmer, Stewart Brand, strong AI, supply-chain management, supply-chain management software, technological determinism, Ted Nelson, telemarketer, The Wisdom of Crowds, theory of mind, Turing machine, Turing test, Vannevar Bush, web application, Yochai Benkler

The Emperor’s New Mind: Concerning Computers, Minds, and the Laws of Physics. New York: Oxford University Press. ———. 1994. Shadows of the Mind: A Search for the Missing Science of Consciousness. New York: Oxford University Press. Phillipson, Robert. 1992. Linguistic Imperialism. Oxford: Oxford University Press. Pichler, Alois. 1995. “Advantages of a Machine-Readable Version of Wittgenstein’s Nachlass.” In Johannessen and Nordenstam, eds., Culture and Value: Philosophy and the Cultural Sciences. The Austrian Ludwig Wittgenstein Society, Vienna. Pierrehumbert, Janet. 1993. “Prosody, Intonation, and Speech Technology.” In Bates and Weischedel (1993), 257–282.


pages: 349 words: 95,972

Messy: The Power of Disorder to Transform Our Lives by Tim Harford

affirmative action, Air France Flight 447, Airbnb, airport security, Albert Einstein, Amazon Mechanical Turk, Amazon Web Services, assortative mating, Atul Gawande, autonomous vehicles, banking crisis, Barry Marshall: ulcers, Basel III, Berlin Wall, Bletchley Park, British Empire, Broken windows theory, call centre, Cass Sunstein, Chris Urmson, cloud computing, collateralized debt obligation, Computing Machinery and Intelligence, crowdsourcing, deindustrialization, Donald Trump, Erdős number, experimental subject, Ferguson, Missouri, Filter Bubble, financial engineering, Frank Gehry, game design, global supply chain, Googley, Guggenheim Bilbao, Helicobacter pylori, high net worth, Inbox Zero, income inequality, industrial cluster, Internet of things, Jane Jacobs, Jeff Bezos, Loebner Prize, Louis Pasteur, machine readable, Marc Andreessen, Mark Zuckerberg, Menlo Park, Merlin Mann, microbiome, out of africa, Paul Erdős, Richard Thaler, Rosa Parks, self-driving car, side project, Silicon Valley, Silicon Valley startup, Skype, Steve Jobs, Steven Levy, Stewart Brand, Susan Wojcicki, tacit knowledge, TED Talk, telemarketer, the built environment, The Death and Life of Great American Cities, the strength of weak ties, Turing test, Tyler Cowen, urban decay, warehouse robotics, William Langewiesche

It seems as though actively encouraging staff to take control is far scarcer than the benign neglect of Building 20. Why is creativity something that happens only when the boss isn’t looking? Some clues come from the remarkable career of Robert Propst. Propst was a sculptor, painter, art teacher, and inventor of devices as varied as a vertical timber harvester and a machine-readable livestock tag. A trained chemical engineer, he’d spent the Second World War managing beachhead logistics in the South Pacific. In 1958, he was hired by the Herman Miller company, a manufacturer of office furniture. Herman Miller’s managers thought Propst was a genius.28 He was certainly an independent spirit: he stayed in Ann Arbor, Michigan, 150 miles away from Herman Miller’s headquarters in Zeeland, later persuading the company to set up a research division there to accommodate him.


pages: 364 words: 102,926

What the F: What Swearing Reveals About Our Language, Our Brains, and Ourselves by Benjamin K. Bergen

correlation does not imply causation, information retrieval, intentional community, machine readable, Parler "social media", pre–internet, Ronald Reagan, seminal paper, statistical model, Steven Pinker, traumatic brain injury

Retrieved from http://www.livescience.com/16570-profanity-tv-video-games-teen-aggression.html. Williams, J. N. (1992). Processing polysemous words in context: Evidence for interrelated meanings. Journal of Psycholinguistic Research, 21(3), 193–218. Wilson, M. D. (1988). The MRC psycholinguistic database: Machine readable dictionary, version 2. Behavioural Research Methods, Instruments and Computers, 20(1), 6–11. Winslow, A. G. (1900 [1772]). Diary of Anna Green Winslow: A Boston school girl of 1771. Boston: Houghton, Mifflin and Company. Xu, J., Gannon, P. J., Emmorey, K., Smith, J. F., and Braun, A. R. (2009).


pages: 400 words: 94,847

Reinventing Discovery: The New Era of Networked Science by Michael Nielsen

Albert Einstein, augmented reality, barriers to entry, bioinformatics, Cass Sunstein, Climategate, Climatic Research Unit, conceptual framework, dark matter, discovery of DNA, Donald Knuth, double helix, Douglas Engelbart, Douglas Engelbart, Easter island, en.wikipedia.org, Erik Brynjolfsson, fault tolerance, Fellow of the Royal Society, Firefox, Free Software Foundation, Freestyle chess, Galaxy Zoo, Higgs boson, Internet Archive, invisible hand, Jane Jacobs, Jaron Lanier, Johannes Kepler, Kevin Kelly, Large Hadron Collider, machine readable, machine translation, Magellanic Cloud, means of production, medical residency, Nicholas Carr, P = NP, P vs NP, publish or perish, Richard Feynman, Richard Stallman, selection bias, semantic web, Silicon Valley, Silicon Valley startup, Simon Singh, Skype, slashdot, social intelligence, social web, statistical model, Stephen Hawking, Stewart Brand, subscription business, tacit knowledge, Ted Nelson, the Cathedral and the Bazaar, The Death and Life of Great American Cities, The Nature of the Firm, The Wisdom of Crowds, University of East Anglia, Vannevar Bush, Vernor Vinge, Wayback Machine, Yochai Benkler

This doesn’t just mean the information conventionally shared in scientific papers, but all information of scientific value, from raw experimental data and computer code to all the questions, ideas, folk knowledge, and speculations that are currently locked up inside the heads of individual scientists. Information not on the network can’t do any good. In an ideal world, we’d achieve a kind of extreme openness. That means expressing all our scientific knowledge in forms that are not just human-readable, but also machine-readable, as part of a data web, so computers can help us find meaning in our collective knowledge. It means opening the scientific community up to the rest of society, in a two-way exchange of information and ideas. It means an ethic of sharing, in which all information of scientific value is put on the network.


pages: 304 words: 22,886

Nudge: Improving Decisions About Health, Wealth, and Happiness by Richard H. Thaler, Cass R. Sunstein

Al Roth, Albert Einstein, asset allocation, availability heuristic, behavioural economics, call centre, carbon tax, Cass Sunstein, choice architecture, continuous integration, currency risk, Daniel Kahneman / Amos Tversky, desegregation, diversification, diversified portfolio, do well by doing good, endowment effect, equity premium, feminist movement, financial engineering, fixed income, framing effect, full employment, George Akerlof, index fund, invisible hand, late fees, libertarian paternalism, loss aversion, low interest rates, machine readable, Mahatma Gandhi, Mason jar, medical malpractice, medical residency, mental accounting, meta-analysis, Milgram experiment, money market fund, pension reform, presumed consent, price discrimination, profit maximization, rent-seeking, Richard Thaler, Right to Buy, risk tolerance, Robert Shiller, Saturday Night Live, school choice, school vouchers, systems thinking, Tragedy of the Commons, transaction costs, Vanguard fund, Zipcar

This would ensure that borrowers at least know what their payments will be when the teaser rate ends. It would be a good idea to add some kind of worst-case scenario information so that borrowers can see how much their payments could go up in the future. Lenders would also have to provide a machine-readable detailed RECAP report, one that incorporates all the fees and interest rate provisions, including teaser rates, what the variable-rate changes are linked to, caps on the changes per year, and so forth. This information would allow independent third parties to offer much better advice. Our strong hunch is that if the RECAP data were made available, third-party services would emerge to compare lenders.


The Paths Between Worlds: This Alien Earth Book One by Paul Antony Jones

Any sufficiently advanced technology is indistinguishable from magic, machine readable, megastructure, period drama

“What is it?” I asked, wondering at how perfectly the lines had been etched into the slate’s surface. “In anticipation of the memory loss I will undoubtedly experience when my battery is exhausted, I have inscribed all pertinent information of the events leading up to today onto the slate in machine-readable code. It includes your names and everything you have told me, and that I should trust what you tell me without question. It will save us all time, I believe. I will update the slate on a daily basis until I am able to find a more permanent solution to my memory loss.” “Wow!” I said, honestly impressed.


pages: 420 words: 100,811

We Are Data: Algorithms and the Making of Our Digital Selves by John Cheney-Lippold

algorithmic bias, bioinformatics, business logic, Cass Sunstein, centre right, computer vision, critical race theory, dark matter, data science, digital capitalism, drone strike, Edward Snowden, Evgeny Morozov, Filter Bubble, Google Chrome, Google Earth, Hans Moravec, Ian Bogost, informal economy, iterative process, James Bridle, Jaron Lanier, Julian Assange, Kevin Kelly, late capitalism, Laura Poitras, lifelogging, Lyft, machine readable, machine translation, Mark Zuckerberg, Marshall McLuhan, mass incarceration, Mercator projection, meta-analysis, Nick Bostrom, Norbert Wiener, offshore financial centre, pattern recognition, price discrimination, RAND corporation, Ray Kurzweil, Richard Thaler, ride hailing / ride sharing, Rosa Parks, Silicon Valley, Silicon Valley startup, Skype, Snapchat, software studies, statistical model, Steven Levy, technological singularity, technoutopianism, the scientific method, Thomas Bayes, Toyota Production System, Turing machine, uber lyft, web application, WikiLeaks, Zimmermann PGP

More generally, in this type of algorithmic regulation, we see how the current, almost obsessive push toward datafying everything and anything (like our fitness routines, ovulation cycles, sleep patterns, even the quality of our posture) becomes much more than a simple transcoding of life into machine-readable information. This process of datafication is also the process of materially connecting these data “points” with power. By checking up on us each and every time we make a datafied step, rather than only when we stand before a judge or a police officer detains us, power becomes exceptionally intimate and efficient.


The Myth of Artificial Intelligence: Why Computers Can't Think the Way We Do by Erik J. Larson

AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, Alignment Problem, AlphaGo, Amazon Mechanical Turk, artificial general intelligence, autonomous vehicles, Big Tech, Black Swan, Bletchley Park, Boeing 737 MAX, business intelligence, Charles Babbage, Claude Shannon: information theory, Computing Machinery and Intelligence, conceptual framework, correlation does not imply causation, data science, deep learning, DeepMind, driverless car, Elon Musk, Ernest Rutherford, Filter Bubble, Geoffrey Hinton, Georg Cantor, Higgs boson, hive mind, ImageNet competition, information retrieval, invention of the printing press, invention of the wheel, Isaac Newton, Jaron Lanier, Jeff Hawkins, John von Neumann, Kevin Kelly, Large Hadron Collider, Law of Accelerating Returns, Lewis Mumford, Loebner Prize, machine readable, machine translation, Nate Silver, natural language processing, Nick Bostrom, Norbert Wiener, PageRank, PalmPilot, paperclip maximiser, pattern recognition, Peter Thiel, public intellectual, Ray Kurzweil, retrograde motion, self-driving car, semantic web, Silicon Valley, social intelligence, speech recognition, statistical model, Stephen Hawking, superintelligent machines, tacit knowledge, technological singularity, TED Talk, The Coming Technological Singularity, the long tail, the scientific method, The Signal and the Noise by Nate Silver, The Wisdom of Crowds, theory of mind, Turing machine, Turing test, Vernor Vinge, Watson beat the top human players on Jeopardy!, Yochai Benkler

RDF helped knowledge bases become, in essence, computational encyclopedias (as the late AI researcher John Haugeland once put it) with larger proj­ects’ knowledge bases having thousands of ­triples. AI researchers hoped that the ease of use would encourage even non-­experts to make ­triples—­a dream articulated by Tim Berners-­Lee, the creator of HTML. Berners-­L ee called it the Semantic Web, ­because with web pages converted into machine-­readable RDF statements, computers would know what every­thing meant. The web would be intelligently readable by computers. AI researchers touted knowledge bases as the end of brittle systems using only statistics—­because, ­after all, statistics a­ ren’t sufficient for understanding. The Semantic Web and other knowledge base–­centered proj­ects in AI could fi­nally “know” about the world, and do more than just number-­crunch.


Artificial Whiteness by Yarden Katz

affirmative action, AI winter, algorithmic bias, AlphaGo, Amazon Mechanical Turk, autonomous vehicles, benefit corporation, Black Lives Matter, blue-collar work, Californian Ideology, Cambridge Analytica, cellular automata, Charles Babbage, cloud computing, colonial rule, computer vision, conceptual framework, Danny Hillis, data science, David Graeber, deep learning, DeepMind, desegregation, Donald Trump, Dr. Strangelove, driverless car, Edward Snowden, Elon Musk, Erik Brynjolfsson, European colonialism, fake news, Ferguson, Missouri, general purpose technology, gentrification, Hans Moravec, housing crisis, income inequality, information retrieval, invisible hand, Jeff Bezos, Kevin Kelly, knowledge worker, machine readable, Mark Zuckerberg, mass incarceration, Menlo Park, military-industrial complex, Nate Silver, natural language processing, Nick Bostrom, Norbert Wiener, pattern recognition, phenotype, Philip Mirowski, RAND corporation, recommendation engine, rent control, Rodney Brooks, Ronald Reagan, Salesforce, Seymour Hersh, Shoshana Zuboff, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Skype, speech recognition, statistical model, Stephen Hawking, Stewart Brand, Strategic Defense Initiative, surveillance capitalism, talking drums, telemarketer, The Signal and the Noise by Nate Silver, W. E. B. Du Bois, Whole Earth Catalog, WikiLeaks

Department of Justice that recognized the “growing ecosystem of third-party intermediaries”—like “businesses, nonprofits, and news agencies”—that “are making use of open criminal justice data, investing time, money, and resources into processing data before use, prepping data through cleaning, standardizing and organizing, and linking and aggregating different data sets together.” It was recommended that “to encourage such reuse, data should be machine-readable and structured for interoperability.”25 This is essentially a call for more data collection, as well as the very “interoperability” that anticarceral activists argued enables mass deportation and incarceration. Through these prescriptions, critical experts normalize the prison-industrial complex.


pages: 502 words: 107,657

Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die by Eric Siegel

Alan Greenspan, Albert Einstein, algorithmic trading, Amazon Mechanical Turk, Apollo 11, Apple's 1984 Super Bowl advert, backtesting, Black Swan, book scanning, bounce rate, business intelligence, business process, butter production in bangladesh, call centre, Charles Lindbergh, commoditize, computer age, conceptual framework, correlation does not imply causation, crowdsourcing, dark matter, data is the new oil, data science, driverless car, en.wikipedia.org, Erik Brynjolfsson, Everything should be made as simple as possible, experimental subject, Google Glasses, happiness index / gross national happiness, information security, job satisfaction, Johann Wolfgang von Goethe, lifelogging, machine readable, Machine translation of "The spirit is willing, but the flesh is weak." to Russian and back, mass immigration, Moneyball by Michael Lewis explains big data, Nate Silver, natural language processing, Netflix Prize, Network effects, Norbert Wiener, personalized medicine, placebo effect, prediction markets, Ray Kurzweil, recommendation engine, risk-adjusted returns, Ronald Coase, Search for Extraterrestrial Intelligence, self-driving car, sentiment analysis, Shai Danziger, software as a service, SpaceShipOne, speech recognition, statistical model, Steven Levy, supply chain finance, text mining, the scientific method, The Signal and the Noise by Nate Silver, The Wisdom of Crowds, Thomas Bayes, Thomas Davenport, Turing test, Watson beat the top human players on Jeopardy!, X Prize, Yogi Berra, zero-sum game

Following the open data movement, often embracing a not-for-profit philosophy, many data sets are available online from fields like biodiversity, business, cartography, chemistry, genomics, and medicine. Look at one central index, www.kdnuggets.com/datasets, and you’ll see what amounts to lists of lists of data resources. The Federal Chief Information Officer of the United States launched Data.gov “to increase public access to high value, machine readable datasets generated by . . . the Government.” Data.gov sports over 390,000 data sets, including data about marine casualties, pollution, active mines, earthquakes, and commercial flights. Its growth is prescribed: a directive in 2009 obliged all U.S. federal agencies to post at least three “high-value” data sets.


pages: 354 words: 105,322

The Road to Ruin: The Global Elites' Secret Plan for the Next Financial Crisis by James Rickards

"World Economic Forum" Davos, Affordable Care Act / Obamacare, Alan Greenspan, Albert Einstein, asset allocation, asset-backed security, bank run, banking crisis, barriers to entry, Bayesian statistics, Bear Stearns, behavioural economics, Ben Bernanke: helicopter money, Benoit Mandelbrot, Berlin Wall, Bernie Sanders, Big bang: deregulation of the City of London, bitcoin, Black Monday: stock market crash in 1987, Black Swan, blockchain, Boeing 747, Bonfire of the Vanities, Bretton Woods, Brexit referendum, British Empire, business cycle, butterfly effect, buy and hold, capital controls, Capital in the Twenty-First Century by Thomas Piketty, Carmen Reinhart, cellular automata, cognitive bias, cognitive dissonance, complexity theory, Corn Laws, corporate governance, creative destruction, Credit Default Swap, cuban missile crisis, currency manipulation / currency intervention, currency peg, currency risk, Daniel Kahneman / Amos Tversky, David Ricardo: comparative advantage, debt deflation, Deng Xiaoping, disintermediation, distributed ledger, diversification, diversified portfolio, driverless car, Edward Lorenz: Chaos theory, Eugene Fama: efficient market hypothesis, failed state, Fall of the Berlin Wall, fiat currency, financial repression, fixed income, Flash crash, floating exchange rates, forward guidance, Fractional reserve banking, G4S, George Akerlof, Glass-Steagall Act, global macro, global reserve currency, high net worth, Hyman Minsky, income inequality, information asymmetry, interest rate swap, Isaac Newton, jitney, John Meriwether, John von Neumann, Joseph Schumpeter, junk bonds, Kenneth Rogoff, labor-force participation, large denomination, liquidity trap, Long Term Capital Management, low interest rates, machine readable, mandelbrot fractal, margin call, market bubble, Mexican peso crisis / tequila crisis, Minsky moment, Money creation, money market fund, mutually assured destruction, Myron Scholes, Naomi Klein, nuclear winter, obamacare, offshore financial centre, operational security, Paul Samuelson, Peace of Westphalia, Phillips curve, Pierre-Simon Laplace, plutocrats, prediction markets, price anchoring, price stability, proprietary trading, public intellectual, quantitative easing, RAND corporation, random walk, reserve currency, RFID, risk free rate, risk-adjusted returns, Robert Solow, Ronald Reagan, Savings and loan crisis, Silicon Valley, sovereign wealth fund, special drawing rights, stock buybacks, stocks for the long run, tech billionaire, The Bell Curve by Richard Herrnstein and Charles Murray, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, Thomas Bayes, Thomas Kuhn: the structure of scientific revolutions, too big to fail, transfer pricing, value at risk, Washington Consensus, We are all Keynesians now, Westphalian system

After observing events from July through August 2007, I was convinced that this crisis dynamic really was unstoppable and would spread widely. Treasury needed to know and act soon. “You should issue an order requiring all banks and hedge funds to report their derivatives positions to you, in detail, with counterparty names, underlying instruments, payment flows, and termination dates. The information should be in standardized machine-readable form delivered one week from the date the order goes out. Anyone who can’t deliver should go to the top of your problem list. Once you get the information, hire IBM Global Services to process it for you in a secure environment so there’s no leakage. Build a matrix and find out who owes what to whom.


pages: 406 words: 105,602

The Startup Way: Making Entrepreneurship a Fundamental Discipline of Every Enterprise by Eric Ries

activist fund / activist shareholder / activist investor, Affordable Care Act / Obamacare, Airbnb, AOL-Time Warner, autonomous vehicles, barriers to entry, basic income, Ben Horowitz, billion-dollar mistake, Black-Scholes formula, Blitzscaling, call centre, centralized clearinghouse, Clayton Christensen, cognitive dissonance, connected car, corporate governance, DevOps, Elon Musk, en.wikipedia.org, fault tolerance, financial engineering, Frederick Winslow Taylor, global supply chain, Great Leap Forward, hockey-stick growth, index card, Jeff Bezos, Kickstarter, Lean Startup, loss aversion, machine readable, Marc Andreessen, Mark Zuckerberg, means of production, minimum viable product, moral hazard, move fast and break things, obamacare, PalmPilot, peer-to-peer, place-making, rent-seeking, Richard Florida, Sam Altman, Sand Hill Road, scientific management, secular stagnation, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, six sigma, skunkworks, Steve Jobs, TechCrunch disrupt, the scientific method, time value of money, Toyota Production System, two-pizza team, Uber for X, universal basic income, web of trust, Y Combinator

A federal job guarantee might achieve similar outcomes: jacobinmag.com/​2017/​02/​federal-job-guarantee-universal-basic-income-investment-jobs-unemployment/. 21. nytimes.com/​2016/​12/​17/​business/​economy/​universal-basic-income-finland.html. 22. qz.com/​696377/​y-combinator-is-running-a-basic-income-experiment-with-100-oakland-families. 23. kauffman.org/​what-we-do/​resources/​entrepreneurship-policy-digest/​can-social-insurance-unlock-entrepreneurial-opportunities. 24. theatlantic.com/​business/​archive/​2016/​06/​netherlands-utrecht-universal-basic-income-experiment/​487883/; theguardian.com/​world/​2016/​oct/​28/​universal-basic-income-ontario-poverty-pilot-project-canada. 25. vox.com/​new-money/​2017/​2/​13/​14580874/​google-self-driving-noncompetes. 26. kauffman.org/​what-we-do/​resources/​entrepreneurship-policy-digest/​how-intellectual-property-can-help-or-hinder-innovation. 27. forbes.com/​2009/​08/​10/​government-internet-software-technology-breakthroughs-oreilly.html. 28. obamawhitehouse.archives.gov/​the-press-office/​2013/​05/​09/​executive-order-making-open-and-machine-readable-new-default-government-. 29. Chopra, Innovative State, pp. 121–22. 30. hbr.org/​2017/​02/​a-few-unicorns-are-no-substitute-for-a-competitive-innovative-economy. 31. site.warrington.ufl.edu/​ritter/​files/​2017/​06/​IPOs2016Statistics.pdf. 32. jstor.org/​stable/​1806983?seq=1#page_scan_tab_contents; larrysummers.com/​2017/​06/​01/​secular-stagnation-even-truer-today. 33. techcrunch.com/​2017/​06/​28/​a-look-back-at-amazons-1997-ipo. 34. niskanencenter.org/​blog/​future-liberalism-politicization-everything/.


pages: 345 words: 105,722

The Hacker Crackdown by Bruce Sterling

Apple II, back-to-the-land, Future Shock, game design, ghettoisation, Hacker Conference 1984, Haight Ashbury, Howard Rheingold, HyperCard, index card, informal economy, information security, Jaron Lanier, John Gilmore, John Perry Barlow, machine readable, Mitch Kapor, pirate software, plutocrats, radical decentralization, Silicon Valley, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, technological determinism, The Hackers Conference, the scientific method, Whole Earth Catalog, Whole Earth Review

Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg-tm depends upon and cannot survive without wide spread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine readable form accessible by the widest array of equipment including outdated equipment. Many small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States.


pages: 397 words: 102,910

The Idealist: Aaron Swartz and the Rise of Free Culture on the Internet by Justin Peters

4chan, Aaron Swartz, activist lawyer, Alan Greenspan, Any sufficiently advanced technology is indistinguishable from magic, Bayesian statistics, Brewster Kahle, buy low sell high, crowdsourcing, digital rights, disintermediation, don't be evil, Free Software Foundation, global village, Hacker Ethic, hypertext link, index card, informal economy, information retrieval, Internet Archive, invention of movable type, invention of writing, Isaac Newton, John Markoff, Joi Ito, Lean Startup, machine readable, military-industrial complex, moral panic, Open Library, Paul Buchheit, Paul Graham, profit motive, RAND corporation, Republic of Letters, Richard Stallman, selection bias, semantic web, Silicon Valley, social bookmarking, social web, Steve Jobs, Steven Levy, Stewart Brand, strikebreaker, subprime mortgage crisis, Twitter Arab Spring, Vannevar Bush, Whole Earth Catalog, Y Combinator

“I know I will never be happy without trying to see if I can change the world for the better in a major manner,” he wrote in 1990.59 That January, Hart traveled to the American Library Association’s midwinter meeting to proselytize for e-books and Project Gutenberg. There, he vowed, “There will be 10,000 Machine-Readable-Texts available by Dec. 31, 2000, even if I had to make them all myself.”60 * * * IN 1990, a British computer scientist named Tim Berners-Lee wrote an article for a house newsletter at CERN, a particle-physics laboratory in Switzerland. Berners-Lee programmed software at CERN, and, like many idealistic coders before him, he had become enamored of the Gospel of Richard Stallman.


pages: 358 words: 106,729

Fault Lines: How Hidden Fractures Still Threaten the World Economy by Raghuram Rajan

"World Economic Forum" Davos, accounting loophole / creative accounting, Alan Greenspan, Andrei Shleifer, Asian financial crisis, asset-backed security, assortative mating, bank run, barriers to entry, Bear Stearns, behavioural economics, Bernie Madoff, Bretton Woods, business climate, business cycle, carbon tax, Clayton Christensen, clean water, collapse of Lehman Brothers, collateralized debt obligation, colonial rule, corporate governance, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, crony capitalism, currency manipulation / currency intervention, currency risk, diversification, Edward Glaeser, financial innovation, fixed income, floating exchange rates, full employment, Glass-Steagall Act, global supply chain, Goldman Sachs: Vampire Squid, Greenspan put, illegal immigration, implied volatility, income inequality, index fund, interest rate swap, Joseph Schumpeter, Kaizen: continuous improvement, Kenneth Rogoff, knowledge worker, labor-force participation, Long Term Capital Management, longitudinal study, low interest rates, machine readable, market bubble, Martin Wolf, medical malpractice, microcredit, money market fund, moral hazard, new economy, Northern Rock, offshore financial centre, open economy, Phillips curve, price stability, profit motive, proprietary trading, Real Time Gross Settlement, Richard Florida, Richard Thaler, risk tolerance, Robert Shiller, Ronald Reagan, Savings and loan crisis, school vouchers, seminal paper, short selling, sovereign wealth fund, tail risk, The Great Moderation, the payments system, The Wealth of Nations by Adam Smith, too big to fail, upwardly mobile, Vanguard fund, women in the workforce, World Values Survey

So did the loan officer’s knowledge that his client would be back to haunt his conscience if he put him in an unaffordable house. But as investment banks put together gigantic packages of mortgages, the judgment calls became less and less important in credit assessments: after all, there was no way to code the borrower’s capacity to hold a job in an objective, machine-readable way.9 Indeed, recording judgment calls in a way that could not be supported by hard facts might have opened the mortgage lender to lawsuits alleging discrimination. All that seemed to matter to the investment banks and the rating agencies were the numerical credit score of the borrower and the amount of the loan relative to house value.


pages: 382 words: 105,819

Zucked: Waking Up to the Facebook Catastrophe by Roger McNamee

"Susan Fowler" uber, "World Economic Forum" Davos, 4chan, Albert Einstein, algorithmic trading, AltaVista, Amazon Web Services, Andy Rubin, barriers to entry, Bernie Sanders, Big Tech, Bill Atkinson, Black Lives Matter, Boycotts of Israel, Brexit referendum, Cambridge Analytica, carbon credits, Cass Sunstein, cloud computing, computer age, cross-subsidies, dark pattern, data is the new oil, data science, disinformation, Donald Trump, Douglas Engelbart, Douglas Engelbart, driverless car, Electric Kool-Aid Acid Test, Elon Musk, fake news, false flag, Filter Bubble, game design, growth hacking, Ian Bogost, income inequality, information security, Internet of things, It's morning again in America, Jaron Lanier, Jeff Bezos, John Markoff, laissez-faire capitalism, Lean Startup, light touch regulation, Lyft, machine readable, Marc Andreessen, Marc Benioff, Mark Zuckerberg, market bubble, Max Levchin, Menlo Park, messenger bag, Metcalfe’s law, minimum viable product, Mother of all demos, move fast and break things, Network effects, One Laptop per Child (OLPC), PalmPilot, paypal mafia, Peter Thiel, pets.com, post-work, profit maximization, profit motive, race to the bottom, recommendation engine, Robert Mercer, Ronald Reagan, Russian election interference, Sand Hill Road, self-driving car, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, Skype, Snapchat, social graph, software is eating the world, Stephen Hawking, Steve Bannon, Steve Jobs, Steven Levy, Stewart Brand, subscription business, TED Talk, The Chicago School, The future is already here, Tim Cook: Apple, two-sided market, Uber and Lyft, Uber for X, uber lyft, Upton Sinclair, vertical integration, WikiLeaks, Yom Kippur War

Accordingly, you have a right in a clear and transparent manner to: (1) consent or opt in when personal information is collected or shared with a third party and to limit the use of personal information not necessary to provide the requested service. (2) obtain, correct or delete personal data held by a company. (3) be notified immediately when a security breach is discovered. (4) be able to move data in useable, machine-readable format. I loved the simplicity and directness of this data bill of rights. Similar in objectives and approach to a bill introduced by Senators Klobuchar and Kennedy, as well as to Europe’s GDPR, Representative Lofgren’s proposal could be a valuable first step in an effort to regulate the platforms.


The Deep Learning Revolution (The MIT Press) by Terrence J. Sejnowski

AI winter, Albert Einstein, algorithmic bias, algorithmic trading, AlphaGo, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, augmented reality, autonomous vehicles, backpropagation, Baxter: Rethink Robotics, behavioural economics, bioinformatics, cellular automata, Claude Shannon: information theory, cloud computing, complexity theory, computer vision, conceptual framework, constrained optimization, Conway's Game of Life, correlation does not imply causation, crowdsourcing, Danny Hillis, data science, deep learning, DeepMind, delayed gratification, Demis Hassabis, Dennis Ritchie, discovery of DNA, Donald Trump, Douglas Engelbart, driverless car, Drosophila, Elon Musk, en.wikipedia.org, epigenetics, Flynn Effect, Frank Gehry, future of work, Geoffrey Hinton, Google Glasses, Google X / Alphabet X, Guggenheim Bilbao, Gödel, Escher, Bach, haute couture, Henri Poincaré, I think there is a world market for maybe five computers, industrial robot, informal economy, Internet of things, Isaac Newton, Jim Simons, John Conway, John Markoff, John von Neumann, language acquisition, Large Hadron Collider, machine readable, Mark Zuckerberg, Minecraft, natural language processing, Neil Armstrong, Netflix Prize, Norbert Wiener, OpenAI, orbital mechanics / astrodynamics, PageRank, pattern recognition, pneumatic tube, prediction markets, randomized controlled trial, Recombinant DNA, recommendation engine, Renaissance Technologies, Rodney Brooks, self-driving car, Silicon Valley, Silicon Valley startup, Socratic dialogue, speech recognition, statistical model, Stephen Hawking, Stuart Kauffman, theory of mind, Thomas Bayes, Thomas Kuhn: the structure of scientific revolutions, traveling salesman, Turing machine, Von Neumann architecture, Watson beat the top human players on Jeopardy!, world market for maybe five computers, X Prize, Yogi Berra

Barbara Oakley and I developed a popular MOOC called “Learning How to Learn” that teaches you how to become a better learner (figure 1.11) and a follow-up MOOC called “Mindshift” that teaches you how to reinvent yourself and change your lifestyle (both MOOCs will be described in chapter 12). As you interact with the Internet, you are generating big data about yourself that is machine readable. You are being targeted by ads generated The Rise of Machine Learning 23 Figure 1.11 “Learning How to Learn,” a massive open online course (MOOC) that teaches you how to become a better learner is the most popular MOOC on the Internet, with over 3 million learners. Courtesy of Terrence Sejnowski and Barbara Oakley.


pages: 370 words: 105,085

Joel on Software by Joel Spolsky

AltaVista, AOL-Time Warner, Apple Newton, barriers to entry, Beos Apple "Steve Jobs" next macos , business logic, c2.com, commoditize, Dennis Ritchie, General Magic , George Gilder, index card, Jeff Bezos, knowledge worker, machine readable, Metcalfe's law, Mitch Kapor, Multics, Network effects, new economy, off-by-one error, PageRank, PalmPilot, Paul Graham, pneumatic tube, profit motive, reality distortion field, Robert X Cringely, shareholder value, Silicon Valley, Silicon Valley startup, SimCity, six sigma, slashdot, Steve Ballmer, Steve Jobs, the scientific method, thinkpad, VA Linux, web application

Raymond has just written a long book about UNIX programming called The Art of UNIX Programming exploring his own culture in great detail.1 You can buy the book and read it on paper, or, if Raymond's politics are just too anti-idiotarian2 for you to consider giving him money, you can even read it online3 for free and rest assured that the author will not receive a penny for his hard work.4 Let's look at a small example. The UNIX programming culture holds in high esteem programs that can be called from the command line, that take arguments that control every aspect of their behavior, and whose output can be captured as regularly formatted, machine-readable plain text. Such programs are valued because they can be easily incorporated into other programs or larger software systems by programmers. To take one miniscule example, there is a core value in the UNIX culture, which Raymond calls "Silence is Golden," that a program that has done exactly what you told it to do successfully should provide no output whatsoever.5 It doesn't matter if you've just typed a 300-character command line to create a file system, or built and installed a complicated piece of software, or sent a manned rocket to the moon.


pages: 354 words: 26,550

High-Frequency Trading: A Practical Guide to Algorithmic Strategies and Trading Systems by Irene Aldridge

algorithmic trading, asset allocation, asset-backed security, automated trading system, backtesting, Black Swan, Brownian motion, business cycle, business process, buy and hold, capital asset pricing model, centralized clearinghouse, collapse of Lehman Brothers, collateralized debt obligation, collective bargaining, computerized trading, diversification, equity premium, fault tolerance, financial engineering, financial intermediation, fixed income, global macro, high net worth, implied volatility, index arbitrage, information asymmetry, interest rate swap, inventory management, Jim Simons, law of one price, Long Term Capital Management, Louis Bachelier, machine readable, margin call, market friction, market microstructure, martingale, Myron Scholes, New Journalism, p-value, paper trading, performance metric, Performance of Mutual Funds in the Period, pneumatic tube, profit motive, proprietary trading, purchasing power parity, quantitative trading / quantitative finance, random walk, Renaissance Technologies, risk free rate, risk tolerance, risk-adjusted returns, risk/return, Sharpe ratio, short selling, Small Order Execution System, statistical arbitrage, statistical model, stochastic process, stochastic volatility, systematic trading, tail risk, trade route, transaction costs, value at risk, yield curve, zero-sum game

MatLab and R have emerged as the industry’s most popular quantitative modeling choices. Internet-wide information-gathering software facilitates highfrequency fundamental pricing of securities. Promptly capturing rumors and news announcements enhances forecasts of short-term price moves. Thomson/Reuters has a range of products that deliver real-time news in a machine-readable format. Trading software incorporates optimal execution algorithms for achieving the best execution price within a given time interval through timing of trades, decisions on market aggressiveness, and sizing orders into optimal lots. New York–based MarketFactory provides a suite of software tools to help automated traders get an extra edge in the market, help their models scale, increase their fill ratios, reduce slippage, and thereby improve profitability (P&L).


pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman

activist lawyer, Benjamin Mako Hill, commoditize, Computer Lib, crowdsourcing, Debian, disinformation, Donald Knuth, dumpster diving, Eben Moglen, en.wikipedia.org, financial independence, Free Software Foundation, Gabriella Coleman, ghettoisation, GnuPG, Hacker Conference 1984, Hacker Ethic, Hacker News, Herbert Marcuse, informal economy, information security, Jacob Appelbaum, Jaron Lanier, Jason Scott: textfiles.com, Jean Tirole, knowledge economy, laissez-faire capitalism, Larry Wall, Louis Pasteur, machine readable, means of production, Multics, Neal Stephenson, Paul Graham, peer-to-peer, pirate software, popular electronics, RFC: Request For Comment, Richard Stallman, rolodex, Ronald Reagan, Silicon Valley, Silicon Valley startup, slashdot, software patent, software studies, Steve Ballmer, Steven Levy, tacit knowledge, technological determinism, Ted Nelson, the Cathedral and the Bazaar, The Hackers Conference, the scientific method, The Soul of a New Machine, The Structural Transformation of the Public Sphere, web application, web of trust, Yochai Benkler

Sharkie’s and Matthew’s accounts were typical of developers who first learned about free software in the 1980s and early to mid-1990s, especially those who were young or students, without a steady income to pay for expensive software like compilers (a tool that transforms source code, written in a programming language, into machine readable binary code). Early in their relationship with this technology, most hackers developed a strong pragmatic and utilitarian commitment to free software. But the underlying philosophy underwent change as more developers started to attach and make their own meanings. Access to source code and the model of open development represented by Linux, they said, was a superior technical methodology.


pages: 392 words: 108,745

Talk to Me: How Voice Computing Will Transform the Way We Live, Work, and Think by James Vlahos

Albert Einstein, AltaVista, Amazon Mechanical Turk, Amazon Web Services, augmented reality, Automated Insights, autonomous vehicles, backpropagation, Big Tech, Cambridge Analytica, Chuck Templeton: OpenTable:, cloud computing, Colossal Cave Adventure, computer age, deep learning, DeepMind, Donald Trump, Elon Musk, fake news, Geoffrey Hinton, information retrieval, Internet of things, Jacques de Vaucanson, Jeff Bezos, lateral thinking, Loebner Prize, machine readable, machine translation, Machine translation of "The spirit is willing, but the flesh is weak." to Russian and back, Mark Zuckerberg, Menlo Park, natural language processing, Neal Stephenson, Neil Armstrong, OpenAI, PageRank, pattern recognition, Ponzi scheme, randomized controlled trial, Ray Kurzweil, Ronald Reagan, Rubik’s Cube, self-driving car, sentiment analysis, Silicon Valley, Skype, Snapchat, speech recognition, statistical model, Steve Jobs, Steve Wozniak, Steven Levy, TechCrunch disrupt, Turing test, Watson beat the top human players on Jeopardy!

Some of the latest generative techniques were derived from advances in machine translation, so let’s detour briefly to explain those. The classic technique is for computers to start by analyzing sentences in a source language. The sentences are then transformed phrase by phrase into an interlingua, a machine-readable digital halfway house that encodes the linguistic information. Finally, sentences are converted from the interlingua into the target human language following all of the definitions and grammatical rules of that language. This process, which is known as “phrase-based statistical machine translation,” is every bit as onerous as it sounds.


pages: 416 words: 112,268

Human Compatible: Artificial Intelligence and the Problem of Control by Stuart Russell

3D printing, Ada Lovelace, AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Alfred Russel Wallace, algorithmic bias, AlphaGo, Andrew Wiles, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, basic income, behavioural economics, Bletchley Park, blockchain, Boston Dynamics, brain emulation, Cass Sunstein, Charles Babbage, Claude Shannon: information theory, complexity theory, computer vision, Computing Machinery and Intelligence, connected car, CRISPR, crowdsourcing, Daniel Kahneman / Amos Tversky, data science, deep learning, deepfake, DeepMind, delayed gratification, Demis Hassabis, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Ernest Rutherford, fake news, Flash crash, full employment, future of work, Garrett Hardin, Geoffrey Hinton, Gerolamo Cardano, Goodhart's law, Hans Moravec, ImageNet competition, Intergovernmental Panel on Climate Change (IPCC), Internet of things, invention of the wheel, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Nash: game theory, John von Neumann, Kenneth Arrow, Kevin Kelly, Law of Accelerating Returns, luminiferous ether, machine readable, machine translation, Mark Zuckerberg, multi-armed bandit, Nash equilibrium, Nick Bostrom, Norbert Wiener, NP-complete, OpenAI, openstreetmap, P = NP, paperclip maximiser, Pareto efficiency, Paul Samuelson, Pierre-Simon Laplace, positional goods, probability theory / Blaise Pascal / Pierre de Fermat, profit maximization, RAND corporation, random walk, Ray Kurzweil, Recombinant DNA, recommendation engine, RFID, Richard Thaler, ride hailing / ride sharing, Robert Shiller, robotic process automation, Rodney Brooks, Second Machine Age, self-driving car, Shoshana Zuboff, Silicon Valley, smart cities, smart contracts, social intelligence, speech recognition, Stephen Hawking, Steven Pinker, superintelligent machines, surveillance capitalism, Thales of Miletus, The Future of Employment, The Theory of the Leisure Class by Thorstein Veblen, Thomas Bayes, Thorstein Veblen, Tragedy of the Commons, transport as a service, trolley problem, Turing machine, Turing test, universal basic income, uranium enrichment, vertical integration, Von Neumann architecture, Wall-E, warehouse robotics, Watson beat the top human players on Jeopardy!, web application, zero-sum game

As with assistants for daily life, the up-front cost of creating the necessary general knowledge in each of these three areas amortizes across billions of users. In the case of health, for example, we all have roughly the same physiology, and detailed knowledge of how it works has already been encoded in machine-readable form.11 Systems will adapt to your individual characteristics and lifestyle, providing preventive suggestions and early warning of problems. In the area of education, the promise of intelligent tutoring systems was recognized even in the 1960s,12 but real progress has been a long time coming.


pages: 461 words: 106,027

Zero to Sold: How to Start, Run, and Sell a Bootstrapped Business by Arvid Kahl

business logic, business process, centre right, Chuck Templeton: OpenTable:, cognitive load, content marketing, continuous integration, coronavirus, COVID-19, crowdsourcing, domain-specific language, financial independence, functional programming, Google Chrome, hockey-stick growth, if you build it, they will come, information asymmetry, information retrieval, inventory management, Jeff Bezos, job automation, Kanban, Kubernetes, machine readable, minimum viable product, Network effects, performance metric, post-work, premature optimization, risk tolerance, Ruby on Rails, sentiment analysis, side hustle, Silicon Valley, single source of truth, software as a service, solopreneur, source of truth, statistical model, subscription business, sunk-cost fallacy, supply-chain management, the long tail, trickle-down economics, value engineering, web application

Your customers may not need it all the time, but this data format is surprisingly relevant for retention. It's commonly used when your customers want to experiment with what using your data with another tool would be like. If you allow them to do this easily, it can further consolidate your product as an essential part of completing tasks. Produce machine-readable data like JSON. A service that can be accessed by humans and machines is twice as valuable as one that can only be used by people. Allow your more technical customers to use your product in a programmatical way, and the impact of your solution will increase significantly. After all, the types of solutions that other businesses can create by integrating your service as one of many are thousand-fold and extraordinary!


pages: 432 words: 106,612

Trillions: How a Band of Wall Street Renegades Invented the Index Fund and Changed Finance Forever by Robin Wigglesworth

Albert Einstein, algorithmic trading, asset allocation, Bear Stearns, behavioural economics, Benoit Mandelbrot, Big Tech, Black Monday: stock market crash in 1987, Blitzscaling, Brownian motion, buy and hold, California gold rush, capital asset pricing model, Carl Icahn, cloud computing, commoditize, coronavirus, corporate governance, corporate raider, COVID-19, data science, diversification, diversified portfolio, Donald Trump, Elon Musk, Eugene Fama: efficient market hypothesis, fear index, financial engineering, fixed income, Glass-Steagall Act, Henri Poincaré, index fund, industrial robot, invention of the wheel, Japanese asset price bubble, Jeff Bezos, Johannes Kepler, John Bogle, John von Neumann, Kenneth Arrow, lockdown, Louis Bachelier, machine readable, money market fund, Myron Scholes, New Journalism, passive investing, Paul Samuelson, Paul Volcker talking about ATMs, Performance of Mutual Funds in the Period, Peter Thiel, pre–internet, RAND corporation, random walk, risk-adjusted returns, road to serfdom, Robert Shiller, rolodex, seminal paper, Sharpe ratio, short selling, Silicon Valley, sovereign wealth fund, subprime mortgage crisis, the scientific method, transaction costs, uptick rule, Upton Sinclair, Vanguard fund

HBS itself had no computers available to students, so he would have to trek over the Charles River to MIT to get his regular fix. There, he met an MIT professor who was attempting to see if he could predict future stock market prices from past trading volumes and patterns. McQuown became his “data dog,” collecting the raw numbers of stock market prices from the magazine Barron’s, converting them into a machine-readable form, and testing the professor’s hypotheses through MIT’s IBM mainframe. McQuown graduated in 1961, but his background and interests raised eyebrows among some of the investment banks he interviewed with. “What the hell would an engineer want to do on Wall Street?” one interviewer inquired.7 These days, degrees in engineering, physics, and mathematics are de rigueur in finance.


pages: 405 words: 105,395

Empire of the Sum: The Rise and Reign of the Pocket Calculator by Keith Houston

Ada Lovelace, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Andy Kessler, Apollo 11, Apollo 13, Apple II, Bletchley Park, Boris Johnson, Charles Babbage, classic study, clockwork universe, computer age, Computing Machinery and Intelligence, double entry bookkeeping, Edmond Halley, Fairchild Semiconductor, Fellow of the Royal Society, Grace Hopper, human-factors engineering, invention of movable type, invention of the telephone, Isaac Newton, Johann Wolfgang von Goethe, Johannes Kepler, John Markoff, John von Neumann, Jony Ive, Kickstarter, machine readable, Masayoshi Son, Menlo Park, meta-analysis, military-industrial complex, Mitch Kapor, Neil Armstrong, off-by-one error, On the Revolutions of the Heavenly Spheres, orbital mechanics / astrodynamics, pattern recognition, popular electronics, QWERTY keyboard, Ralph Waldo Emerson, Robert X Cringely, side project, Silicon Valley, skunkworks, SoftBank, Steve Jobs, Steve Wozniak, The Home Computer Revolution, the payments system, Turing machine, Turing test, V2 rocket, William Shockley: the traitorous eight, Works Progress Administration, Yom Kippur War

Founded in 1878 to make ticket punches for tram and bus conductors, the Sumlock Company* of postwar Britain was a parochial echo of the corporate giants on the other side of the Atlantic.1 Where IBM built gleaming mainframes, Sumlock peddled comptometers first developed in the nineteenth century.2 Where AT&T’s Bell Labs inhabited a neoclassical tower in Manhattan, Sumlock’s engineers toiled in a converted air-raid shelter in London’s suburban hinterlands.3 And where Burroughs, NCR, and General Electric worked with the Federal Reserve to develop a nationwide system of machine-readable checks, Sumlock fretted about competition from a chain of tea shops.4 On the flip side, the British firm was nothing if not adaptable. Sumlock had rebounded from a fire that leveled its factory at the end of the nineteenth century to become Britain’s premier manufacturer of taximeters and racecourse betting boards, or “totalizators.”


pages: 982 words: 221,145

Ajax: The Definitive Guide by Anthony T. Holdener

AltaVista, Amazon Web Services, business logic, business process, centre right, Citizen Lab, Colossal Cave Adventure, create, read, update, delete, database schema, David Heinemeier Hansson, en.wikipedia.org, Firefox, full text search, game design, general-purpose programming language, Guido van Rossum, information retrieval, loose coupling, machine readable, MVC pattern, Necker cube, p-value, Ruby on Rails, SimCity, slashdot, social bookmarking, sorting algorithm, SQL injection, Wayback Machine, web application

XML, the eXtensible Markup Language, is an Internet-friendly format for data and documents, invented by the World Wide Web Consortium (W3C). The word Markup in the term denotes a way to express a document’s structure within the document itself. XML has its roots in the Standard Generalized Markup Language (SGML), which is used in publishing. HTML was an application of SGML to web publishing. 843 XML was created to do for machine-readable documents on the Web what HTML did for human-readable documents: provide a commonly agreed-upon syntax so that processing the underlying format becomes commonplace and documents are made accessible to all users. The current version of the W3C Recommendation is the XML 1.1 (Second Edition), published on September 29, 2006 and available at http://www.w3.org/ TR/xml11/.

If your friends had used number as you did to denote the phone number, and not phone, there would not have been a problem. However, as it is, this second file probably will not be usable by programs set up to work with the first file; from the program’s perspective, it is not valid. For validity to be a useful general concept, we need a machine-readable way to say what a valid document is; that is, which elements and attributes must be present and in what order. XML 1.0 achieves this by introducing document type definitions (DTDs). DTDs The purpose of a DTD is to express which elements and attributes are allowed in a certain document type and to constrain the order in which elements must appear within that document type.


Coastal California Travel Guide by Lonely Planet

1960s counterculture, Airbnb, airport security, Albert Einstein, anti-communist, Apollo 11, Apple II, Asilomar, back-to-the-land, Bay Area Rapid Transit, bike sharing, Burning Man, buy and hold, California gold rush, call centre, car-free, carbon footprint, company town, Day of the Dead, Donner party, East Village, El Camino Real, Electric Kool-Aid Acid Test, flex fuel, Frank Gehry, gentrification, glass ceiling, Golden Gate Park, Haight Ashbury, haute couture, haute cuisine, income inequality, intermodal, Joan Didion, Kickstarter, Loma Prieta earthquake, low cost airline, Lyft, machine readable, Mason jar, military-industrial complex, New Journalism, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, off-the-grid, Peoples Temple, ride hailing / ride sharing, Ronald Reagan, Rosa Parks, Saturday Night Live, Silicon Valley, Silicon Valley startup, South of Market, San Francisco, starchitect, stealth mode startup, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, trade route, transcontinental railway, uber lyft, Upton Sinclair, upwardly mobile, urban sprawl, Wall-E, white picket fence, Whole Earth Catalog, women in the workforce, working poor, Works Progress Administration, young professional, Zipcar

Depending on your country of origin, the rules for entering the USA keep changing. Double-check current visa requirements before arriving. ACurrently, under the US Visa Waiver Program (VWP), visas are not required for citizens of 38 countries for stays up to 90 days (no extensions) if you have a machine-readable passport (MRP) that meets current US standards and is valid for six months beyond your intended stay. ACitizens of VWP countries must still register online with the Electronic System for Travel Authorization (ESTA; https://esta.cbp.dhs.gov) at least 72 hours before travel. Once approved, ESTA registration ($14) is valid for up to two years or until your passport expires, whichever comes first.

If you drive into California across the border from Mexico or from the neighboring states of Oregon, Nevada or Arizona, you may have to stop for a quick questioning and inspection by California Department of Food & Agriculture (www.cdfa.ca.gov) agents. Passport AUnder the Western Hemisphere Travel Initiative (WHTI), all travelers must have a valid machine-readable passport (MRP) when entering the USA by air, land or sea. AThe only exceptions are for some US, Canadian and Mexican citizens traveling by land who can present other WHTI-compliant documents (eg pre-approved ‘trusted traveler’ cards). A regular driver's license is not sufficient. AAll foreign passports must meet current US standards and be valid for at least six months longer than your intended stay.


pages: 918 words: 260,504

Nature's Metropolis: Chicago and the Great West by William Cronon

active transport: walking or cycling, book value, British Empire, business cycle, City Beautiful movement, classic study, conceptual framework, credit crunch, gentleman farmer, it's over 9,000, Lewis Mumford, machine readable, New Urbanism, Ralph Waldo Emerson, refrigerator car, Robert Gordon, short selling, The Chicago School, Thorstein Veblen, trade route, transaction costs, transcontinental railway, traveling salesman, Upton Sinclair, vertical integration, zero-sum game

George Smith’s famous Chicago Marine and Fire Insurance Company was so successful that it supplied a sizable portion of Chicago’s circulating currency during the 1840s and early 1850s, behaving as much like a bank as an insurance company. It was able to do this partly because the state legislature had imposed steep restrictions on the ability of Illinois banks to issue notes. 37.Burrows, Fifty Years in Iowa, 183. 38.ICPSR, “Historical Demographic, Economic and Social Data: The United States, 1790–1970” (machine-readable dataset of census statistics). Statistical work for this book is based on an eleven-state subset of the master series, containing economic and demographic statistics for Michigan, Indiana, Illinois, Wisconsin, Minnesota, Iowa, Missouri, Kansas, Nebraska, North Dakota, and South Dakota between 1840 and 1900.

Peoria Board of Trade. Annual Reports. 1871–75. Poor’s Manual of Railroads. Prairie Farmer. 1848–1900. St. Louis Chamber of Commerce, Annual Reports. Sears, Roebuck and Company. Catalogs. U.S. Censuses of Population, Agriculture, and Manufactures. 1840–1900. (In original printed reports and in machine-readable datasets of the ICPSR.) U.S. Department of Agriculture. Yearbooks. 1885–1960. Western Monthly. Western Rural. 1866–80. Wisconsin Lumberman. 1870–80. Wisconsin State Agricultural Society. Transactions. 1870–90. Wisconsin State Grange. Proceedings and Bulletins of the Executive Committee. 1872–90.


pages: 390 words: 113,737

Someone comes to town, someone leaves town by Cory Doctorow

Burning Man, Chekhov's gun, clean water, combinatorial explosion, dumpster diving, lock screen, machine readable, UUNET

Campbell Award for Best New Writer at the 2000 Hugo awards and his novel Down and Out in the Magic Kingdom (http://craphound.com/down/) won the Locus Award for Best First Novel the same year that his short story collection A Place So Foreign and Eight More (http://craphound.com/place/) won the Sunburst Award for best Canadian science fiction book. His other books include Eastern Standard Tribe (http://craphound.com/est/) and Rapture of the Nerds (with Charles Stross). Join my mailing list for infrequent notices of books, articles, stories and appearances. http://www.ctyme.com/mailman/listinfo/doctorow * * * Machine-readable metadata * * * <rdf:RDF xmlns="http://web.resource.org/cc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <Work rdf:about="http://craphound.com/someone"> <dc:title>Someone Comes to Town, Someone Leaves Town</dc:title> <dc:date>2005-7-1</dc:date> <dc:description>A novel by Cory Doctorow </dc:description> <dc:creator><Agent> <dc:title>Cory Doctorow</dc:title> </Agent></dc:creator> <dc:rights><Agent> <dc:title>Cory Doctorow</dc:title> </Agent></dc:rights> <dc:type rdf:resource="http://purl.org/dc/dcmitype/Text" /> <license rdf:resource="http://creativecommons.org/licenses/by-nd-nc/1.0" /> </Work> <License rdf:about="http://creativecommons.org/licenses/by-nd-nc/1.0"> <requires rdf:resource="http://web.resource.org/cc/Attribution" /> <permits rdf:resource="http://web.resource.org/cc/Reproduction" /> <permits rdf:resource="http://web.resource.org/cc/Distribution" /> <prohibits rdf:resource="http://web.resource.org/cc/CommercialUse" /> <requires rdf:resource="http://web.resource.org/cc/Notice" /> </License> <rdf:RDF xmlns="http://web.resource.org/cc/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <License rdf:about="http://creativecommons.org/licenses/devnations/2.0/"> <permits rdf:resource="http://web.resource.org/cc/Reproduction" /> <permits rdf:resource="http://web.resource.org/cc/Distribution" /> <requires rdf:resource="http://web.resource.org/cc/Notice" /> <requires rdf:resource="http://web.resource.org/cc/Attribution" /> <permits rdf:resource="http://web.resource.org/cc/DerivativeWorks" /> <prohibits rdf:resource="http://web.resource.org/cc/HighIncomeNationUse" /> </License> </rdf:RDF> eof


pages: 463 words: 118,936

Darwin Among the Machines by George Dyson

Ada Lovelace, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, anti-communist, backpropagation, Bletchley Park, British Empire, carbon-based life, cellular automata, Charles Babbage, Claude Shannon: information theory, combinatorial explosion, computer age, Computing Machinery and Intelligence, Danny Hillis, Donald Davies, fault tolerance, Fellow of the Royal Society, finite state, IFF: identification friend or foe, independent contractor, invention of the telescope, invisible hand, Isaac Newton, Jacquard loom, James Watt: steam engine, John Nash: game theory, John von Neumann, launch on warning, low earth orbit, machine readable, Menlo Park, Nash equilibrium, Norbert Wiener, On the Economy of Machinery and Manufactures, packet switching, pattern recognition, phenotype, RAND corporation, Richard Feynman, spectrum auction, strong AI, synthetic biology, the scientific method, The Wealth of Nations by Adam Smith, Turing machine, Von Neumann architecture, zero-sum game

“It is the Elixir or Philosophers Stone, to which all Nations, and every thing within those Nations must be subservient, either by faire meanes or by foule.”31 An economy is a system that assigns numerical values to tangible and intangible things. These numbers, having a peculiar tendency, common to all numbers, of lending themselves to intelligent processing, start moving the things around. The history of money has been a step-by-step progression from things to numbers: numbers stamped on coins, numbers printed on banknotes, machine-readable codes on checks, coded electronic transfers between numbered accounts, credit-card numbers transferred over the phone, and now a host of competing forms of digital currency, represented by numbers alone. The relations between money and information go both ways: the flow of information conveys and represents money, and the flow of money conveys and represents information.


pages: 429 words: 114,726

The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise by Nathan L. Ensmenger

barriers to entry, business process, Charles Babbage, Claude Shannon: information theory, computer age, deskilling, Donald Knuth, Firefox, Frederick Winslow Taylor, functional programming, future of work, Grace Hopper, informal economy, information retrieval, interchangeable parts, Isaac Newton, Jacquard loom, job satisfaction, John von Neumann, knowledge worker, Larry Ellison, loose coupling, machine readable, new economy, no silver bullet, Norbert Wiener, pattern recognition, performance metric, Philip Mirowski, post-industrial society, Productivity paradox, RAND corporation, Robert Gordon, scientific management, Shoshana Zuboff, sorting algorithm, Steve Jobs, Steven Levy, systems thinking, tacit knowledge, technological determinism, the market place, The Theory of the Leisure Class by Thorstein Veblen, Thomas Kuhn: the structure of scientific revolutions, Thorstein Veblen, Turing machine, Von Neumann architecture, world market for maybe five computers, Y2K

Backus spoke their language, published in their journals, and shared their disdain for coders and other “technicians.” Second, FORTRAN was designed specifically to solve the kinds of problems that interested academics. Its use of algebraic expressions greatly simplified the process of defining mathematical problems in machine-readable syntax. Finally, and perhaps most significantly, FORTRAN provided them more direct access to the computer. Its introduction “caused a partial revolution in the way in which computer installations were run because it became not only possible but quite practical to have engineers, scientists, and other people actually programming their own problems without the intermediary of a professional programmer.”27 The use of FORTRAN actually became the centerpiece of an ongoing debate about “open” versus “closed” programming “shops.”


pages: 352 words: 120,202

Tools for Thought: The History and Future of Mind-Expanding Technology by Howard Rheingold

Ada Lovelace, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Bletchley Park, card file, cellular automata, Charles Babbage, Claude Shannon: information theory, combinatorial explosion, Compatible Time-Sharing System, computer age, Computer Lib, Computing Machinery and Intelligence, conceptual framework, Conway's Game of Life, Douglas Engelbart, Dynabook, experimental subject, Hacker Ethic, heat death of the universe, Howard Rheingold, human-factors engineering, interchangeable parts, invention of movable type, invention of the printing press, Ivan Sutherland, Jacquard loom, John von Neumann, knowledge worker, machine readable, Marshall McLuhan, Menlo Park, Neil Armstrong, Norbert Wiener, packet switching, pattern recognition, popular electronics, post-industrial society, Project Xanadu, RAND corporation, Robert Metcalfe, Silicon Valley, speech recognition, Steve Jobs, Steve Wozniak, Stewart Brand, Ted Nelson, telemarketer, The Home Computer Revolution, Turing machine, Turing test, Vannevar Bush, Von Neumann architecture

., numbers expressed in powers of two, using only two symbols), while humans are used to writing numbers in the decimal system (in which numbers are expressed in powers of ten, using ten symbols. Turing was involved in the writing of instruction tables that automatically converted human-written decimals to machine-readable binary digits. If basic operations like addition, multiplication, and decimal-to-binary conversion could be fed to the machine in terms of instruction tables, Turing saw that it would be possible to build up heirarchies of such tables. The programmer would no longer have to worry about writing each and every operational instruction, step by repetitive step, and would thus be freed to write programs for more complex operations.


pages: 1,172 words: 114,305

New Laws of Robotics: Defending Human Expertise in the Age of AI by Frank Pasquale

affirmative action, Affordable Care Act / Obamacare, Airbnb, algorithmic bias, Amazon Mechanical Turk, Anthropocene, augmented reality, Automated Insights, autonomous vehicles, basic income, battle of ideas, Bernie Sanders, Big Tech, Bill Joy: nanobots, bitcoin, blockchain, Brexit referendum, call centre, Cambridge Analytica, carbon tax, citizen journalism, Clayton Christensen, collective bargaining, commoditize, computer vision, conceptual framework, contact tracing, coronavirus, corporate social responsibility, correlation does not imply causation, COVID-19, critical race theory, cryptocurrency, data is the new oil, data science, decarbonisation, deep learning, deepfake, deskilling, digital divide, digital twin, disinformation, disruptive innovation, don't be evil, Donald Trump, Douglas Engelbart, driverless car, effective altruism, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, fake news, Filter Bubble, finite state, Flash crash, future of work, gamification, general purpose technology, Google Chrome, Google Glasses, Great Leap Forward, green new deal, guns versus butter model, Hans Moravec, high net worth, hiring and firing, holacracy, Ian Bogost, independent contractor, informal economy, information asymmetry, information retrieval, interchangeable parts, invisible hand, James Bridle, Jaron Lanier, job automation, John Markoff, Joi Ito, Khan Academy, knowledge economy, late capitalism, lockdown, machine readable, Marc Andreessen, Mark Zuckerberg, means of production, medical malpractice, megaproject, meta-analysis, military-industrial complex, Modern Monetary Theory, Money creation, move fast and break things, mutually assured destruction, natural language processing, new economy, Nicholas Carr, Nick Bostrom, Norbert Wiener, nuclear winter, obamacare, One Laptop per Child (OLPC), open immigration, OpenAI, opioid epidemic / opioid crisis, paperclip maximiser, paradox of thrift, pattern recognition, payday loans, personalized medicine, Peter Singer: altruism, Philip Mirowski, pink-collar, plutocrats, post-truth, pre–internet, profit motive, public intellectual, QR code, quantitative easing, race to the bottom, RAND corporation, Ray Kurzweil, recommendation engine, regulatory arbitrage, Robert Shiller, Rodney Brooks, Ronald Reagan, self-driving car, sentiment analysis, Shoshana Zuboff, Silicon Valley, Singularitarianism, smart cities, smart contracts, software is eating the world, South China Sea, Steve Bannon, Strategic Defense Initiative, surveillance capitalism, Susan Wojcicki, tacit knowledge, TaskRabbit, technological solutionism, technoutopianism, TED Talk, telepresence, telerobotics, The Future of Employment, The Turner Diaries, Therac-25, Thorstein Veblen, too big to fail, Turing test, universal basic income, unorthodox policies, wage slave, Watson beat the top human players on Jeopardy!, working poor, workplace surveillance , Works Progress Administration, zero day

They need to be addressed squarely, however, so that roboticists do not adopt emotional simulation as simply one more obvious entailment of well-established AI research. Even if the prospect of AI claiming rights, resources, and respect from humans seems far-fetched, the first steps toward it are degrading the quality of many of our current interactions. There is increasing pressure to simplify emotion’s measure or monitoring so it can become machine-readable and machine-expressible. Supposedly, this is done simply to serve us better. It is far easier, for example, to cross-correlate six Facebook reaction buttons with user behavior than the hundreds or thousands of subtle forms of disapproval, curiosity, intrigue, resignation, and so on that pass across users’ faces while scrolling through a newsfeed.


pages: 409 words: 112,055

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Affordable Care Act / Obamacare, air gap, Airbnb, Albert Einstein, Amazon Web Services, autonomous vehicles, barriers to entry, bitcoin, Black Lives Matter, Black Swan, blockchain, Boeing 737 MAX, borderless world, Boston Dynamics, business cycle, business intelligence, call centre, Cass Sunstein, cloud computing, cognitive bias, commoditize, computer vision, corporate governance, cryptocurrency, data acquisition, data science, deep learning, DevOps, disinformation, don't be evil, Donald Trump, Dr. Strangelove, driverless car, Edward Snowden, Exxon Valdez, false flag, geopolitical risk, global village, immigration reform, information security, Infrastructure as a Service, Internet of things, Jeff Bezos, John Perry Barlow, Julian Assange, Kubernetes, machine readable, Marc Benioff, Mark Zuckerberg, Metcalfe’s law, MITM: man-in-the-middle, Morris worm, move fast and break things, Network effects, open borders, platform as a service, Ponzi scheme, quantum cryptography, ransomware, Richard Thaler, Salesforce, Sand Hill Road, Schrödinger's Cat, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, Snapchat, software as a service, Steven Levy, Stuxnet, technoutopianism, The future is already here, Tim Cook: Apple, undersea cable, unit 8200, WikiLeaks, Y2K, zero day

This software learns not just from what it sees on its endpoint, not just from what happens on other endpoints on the network, but, in a classic example of Metcalfe’s law, they learn from every endpoint on every network on which they are deployed. A second widespread use of AI today is in applications known as vulnerability managers. AI can intake machine-readable intelligence reports on new threats and can automatically prioritize those threats based upon what it already knows or can quickly find out about your network. For example, an AI-driven vulnerability manager could check to see whether you have already addressed the weakness the new attack exploits.


pages: 444 words: 117,770

The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma by Mustafa Suleyman

"World Economic Forum" Davos, 23andMe, 3D printing, active measures, Ada Lovelace, additive manufacturing, agricultural Revolution, AI winter, air gap, Airbnb, Alan Greenspan, algorithmic bias, Alignment Problem, AlphaGo, Alvin Toffler, Amazon Web Services, Anthropocene, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, ASML, autonomous vehicles, backpropagation, barriers to entry, basic income, benefit corporation, Big Tech, biodiversity loss, bioinformatics, Bletchley Park, Blitzscaling, Boston Dynamics, business process, business process outsourcing, call centre, Capital in the Twenty-First Century by Thomas Piketty, ChatGPT, choice architecture, circular economy, classic study, clean tech, cloud computing, commoditize, computer vision, coronavirus, corporate governance, correlation does not imply causation, COVID-19, creative destruction, CRISPR, critical race theory, crowdsourcing, cryptocurrency, cuban missile crisis, data science, decarbonisation, deep learning, deepfake, DeepMind, deindustrialization, dematerialisation, Demis Hassabis, disinformation, drone strike, drop ship, dual-use technology, Easter island, Edward Snowden, effective altruism, energy transition, epigenetics, Erik Brynjolfsson, Ernest Rutherford, Extinction Rebellion, facts on the ground, failed state, Fairchild Semiconductor, fear of failure, flying shuttle, Ford Model T, future of work, general purpose technology, Geoffrey Hinton, global pandemic, GPT-3, GPT-4, hallucination problem, hive mind, hype cycle, Intergovernmental Panel on Climate Change (IPCC), Internet Archive, Internet of things, invention of the wheel, job automation, John Maynard Keynes: technological unemployment, John von Neumann, Joi Ito, Joseph Schumpeter, Kickstarter, lab leak, large language model, Law of Accelerating Returns, Lewis Mumford, license plate recognition, lockdown, machine readable, Marc Andreessen, meta-analysis, microcredit, move 37, Mustafa Suleyman, mutually assured destruction, new economy, Nick Bostrom, Nikolai Kondratiev, off grid, OpenAI, paperclip maximiser, personalized medicine, Peter Thiel, planetary scale, plutocrats, precautionary principle, profit motive, prompt engineering, QAnon, quantum entanglement, ransomware, Ray Kurzweil, Recombinant DNA, Richard Feynman, Robert Gordon, Ronald Reagan, Sam Altman, Sand Hill Road, satellite internet, Silicon Valley, smart cities, South China Sea, space junk, SpaceX Starlink, stealth mode startup, stem cell, Stephen Fry, Steven Levy, strong AI, synthetic biology, tacit knowledge, tail risk, techlash, techno-determinism, technoutopianism, Ted Kaczynski, the long tail, The Rise and Fall of American Growth, Thomas Malthus, TikTok, TSMC, Turing test, Tyler Cowen, Tyler Cowen: Great Stagnation, universal basic income, uranium enrichment, warehouse robotics, William MacAskill, working-age population, world market for maybe five computers, zero day

This was the first time I had encountered evidence that language modeling was making real progress, and I quickly became fixated, reading hundreds of papers, deeply immersing myself in the burgeoning field. By the summer of 2020, I was convinced that the future of computing was conversational. Every interaction with a computer is already a conversation of sorts, just using buttons, keys, and pixels to translate human thoughts to machine-readable code. Now that barrier was starting to break down. Machines would soon understand our language. It was, and still is, a thrilling prospect. Long before the much-publicized launch of ChatGPT, I was part of the team at Google working on a new large language model that we called LaMDA, short for Language Model for Dialogue Applications.


pages: 385 words: 112,842

Arriving Today: From Factory to Front Door -- Why Everything Has Changed About How and What We Buy by Christopher Mims

air freight, Airbnb, Amazon Robotics, Amazon Web Services, Apollo 11, augmented reality, autonomous vehicles, big-box store, blue-collar work, Boeing 747, book scanning, business logic, business process, call centre, cloud computing, company town, coronavirus, cotton gin, COVID-19, creative destruction, data science, Dava Sobel, deep learning, dematerialisation, deskilling, digital twin, Donald Trump, easy for humans, difficult for computers, electronic logging device, Elon Musk, Frederick Winslow Taylor, fulfillment center, gentrification, gig economy, global pandemic, global supply chain, guest worker program, Hans Moravec, heat death of the universe, hive mind, Hyperloop, immigration reform, income inequality, independent contractor, industrial robot, interchangeable parts, intermodal, inventory management, Jacquard loom, Jeff Bezos, Jessica Bruder, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, Joseph Schumpeter, Kaizen: continuous improvement, Kanban, Kiva Systems, level 1 cache, Lewis Mumford, lockdown, lone genius, Lyft, machine readable, Malacca Straits, Mark Zuckerberg, market bubble, minimum wage unemployment, Nomadland, Ocado, operation paperclip, Panamax, Pearl River Delta, planetary scale, pneumatic tube, polynesian navigation, post-Panamax, random stow, ride hailing / ride sharing, robot derives from the Czech word robota Czech, meaning slave, Rodney Brooks, rubber-tired gantry crane, scientific management, self-driving car, sensor fusion, Shenzhen special economic zone , Shoshana Zuboff, Silicon Valley, six sigma, skunkworks, social distancing, South China Sea, special economic zone, spinning jenny, standardized shipping container, Steve Jobs, supply-chain management, surveillance capitalism, TED Talk, the scientific method, Tim Cook: Apple, Toyota Production System, traveling salesman, Turing test, two-sided market, Uber and Lyft, Uber for X, uber lyft, Upton Sinclair, vertical integration, warehouse automation, warehouse robotics, workplace surveillance

Darin is leading me through a maze of conveyors—here he pauses to unlatch a three-foot section of one and lift it out of our path, like a raised drawbridge—to the heart of a fulfillment center that serves the whole of the U.S. Northeast. We pass people walking up and down aisles between walls of shelving stuffed, floor to ceiling, with blue bins. We pause to watch one employee, a middle-aged woman, work. She uses a bar code scanner to light up the machine-readable labels on the front of a cubby, plucks an item, then drops it in a plastic tote riding on a cart. Periodically, she wheels those carts to a nearby conveyor and places the blue tote into a stream of others, all flowing in the same direction. At the end of the conveyor, they disappear into some other part of the Byzantine clockwork that surrounds us.


pages: 370 words: 112,809

The Equality Machine: Harnessing Digital Technology for a Brighter, More Inclusive Future by Orly Lobel

2021 United States Capitol attack, 23andMe, Ada Lovelace, affirmative action, Airbnb, airport security, Albert Einstein, algorithmic bias, Amazon Mechanical Turk, augmented reality, barriers to entry, basic income, Big Tech, bioinformatics, Black Lives Matter, Boston Dynamics, Charles Babbage, choice architecture, computer vision, Computing Machinery and Intelligence, contact tracing, coronavirus, corporate social responsibility, correlation does not imply causation, COVID-19, crowdsourcing, data science, David Attenborough, David Heinemeier Hansson, deep learning, deepfake, digital divide, digital map, Elon Musk, emotional labour, equal pay for equal work, feminist movement, Filter Bubble, game design, gender pay gap, George Floyd, gig economy, glass ceiling, global pandemic, Google Chrome, Grace Hopper, income inequality, index fund, information asymmetry, Internet of things, invisible hand, it's over 9,000, iterative process, job automation, Lao Tzu, large language model, lockdown, machine readable, machine translation, Mark Zuckerberg, market bubble, microaggression, Moneyball by Michael Lewis explains big data, natural language processing, Netflix Prize, Network effects, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, occupational segregation, old-boy network, OpenAI, openstreetmap, paperclip maximiser, pattern recognition, performance metric, personalized medicine, price discrimination, publish or perish, QR code, randomized controlled trial, remote working, risk tolerance, robot derives from the Czech word robota Czech, meaning slave, Ronald Coase, Salesforce, self-driving car, sharing economy, Sheryl Sandberg, Silicon Valley, social distancing, social intelligence, speech recognition, statistical model, stem cell, Stephen Hawking, Steve Jobs, Steve Wozniak, surveillance capitalism, tech worker, TechCrunch disrupt, The Future of Employment, TikTok, Turing test, universal basic income, Wall-E, warehouse automation, women in the workforce, work culture , you are the product

The mainstream books were the winners of Newbery and Caldecott Medals from 1923 to 2019; diversity books were a set of books identified by the Association for Library Service to Children as highlighting diverse communities. The research used Google’s machine learning vision platform consisting of facial recognition, evaluation of skin color, and classification of race, gender, and age on the illustrations in these books; a “text-to-data pipeline” scanned pages to machine-readable text and searched for words expressing gender, nationality, and color. The researchers found that over the past century, mainstream books—those that children are more likely to be exposed to—still contain racial and gender biases. Most of the images in these mainstream children’s books are of white male characters; although images of female characters still appear more than text about female characters, women and girls continue to be underrepresented in mainstream children’s books.


California by Sara Benson

airport security, Albert Einstein, Apple II, Asilomar, back-to-the-land, Bay Area Rapid Transit, Berlin Wall, Blue Bottle Coffee, Burning Man, buy and hold, California gold rush, call centre, car-free, carbon footprint, Columbine, company town, dark matter, Day of the Dead, desegregation, Donald Trump, Donner party, East Village, El Camino Real, Electric Kool-Aid Acid Test, Fillmore Auditorium, San Francisco, Frank Gehry, gentrification, global village, Golden Gate Park, Haight Ashbury, haute cuisine, Joan Didion, Khyber Pass, Loma Prieta earthquake, low cost airline, machine readable, McDonald's hot coffee lawsuit, McMansion, means of production, megaproject, Menlo Park, Neil Armstrong, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, off-the-grid, planetary scale, retail therapy, RFID, ride hailing / ride sharing, Ronald Reagan, Silicon Valley, South of Market, San Francisco, SpaceShipOne, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, the new new thing, trade route, transcontinental railway, Upton Sinclair, urban sprawl, Wall-E, white picket fence, Whole Earth Catalog, working poor, Works Progress Administration, young professional

If your passport does not meet current US standards, you’ll be turned back at the border, even if you’re from a VWP country and have travel authorization. If your passport was issued before October 26, 2005, it must be ‘machine readable’ (with two lines of letters, numbers and <<< at the bottom); if it was issued between October 26, 2005, and October 25, 2006, it must be machine-readable and include a digital photo; and if it was issued on or after October 26, 2006, it must be an ePassport containing a digital photo and an integrated RFID chip containing biometric data. Citizens from all non-VWP countries, as well as those whose passports are not machine-readable or otherwise don’t meet the current US standards, will need to wrangle a nonimmigrant visa from a US consulate or embassy abroad.


pages: 593 words: 118,995

Relevant Search: With Examples Using Elasticsearch and Solr by Doug Turnbull, John Berryman

business logic, cognitive load, commoditize, crowdsourcing, data science, domain-specific language, Dr. Strangelove, fail fast, finite state, fudge factor, full text search, heat death of the universe, information retrieval, machine readable, natural language processing, premature optimization, recommendation engine, sentiment analysis, the long tail

And you can identify feasibility risks that may arise as a result of hard-to-get information or information that doesn’t quite answer your users’ questions. Let’s first consider the content being searched—restaurants. At a minimum, a restaurant is represented as a name and an address. Usually this information is publicly available. Restaurant names and addresses that are more accurate and machine readable can be purchased from a business database provider. Restaurant names will be of obvious use, both in search and in the presentation to the user on the details page. You need to use the address for location information. You’ll use a geolocation service to convert restaurant addresses into their corresponding latitude-longitude coordinates.


pages: 597 words: 119,204

Website Optimization by Andrew B. King

AltaVista, AOL-Time Warner, bounce rate, don't be evil, Dr. Strangelove, en.wikipedia.org, Firefox, In Cold Blood by Truman Capote, information retrieval, iterative process, Kickstarter, machine readable, medical malpractice, Network effects, OSI model, performance metric, power law, satellite internet, search engine result page, second-price auction, second-price sealed-bid, semantic web, Silicon Valley, slashdot, social bookmarking, social graph, Steve Jobs, the long tail, three-martini lunch, traumatic brain injury, web application

announced that its web crawler would begin to process microformats and other forms of structured metadata, making it available to developers as a way to present richer search results. [34] For example, instead of a blue link and a plain text abstract, a search result for an electronic gizmo could contain a thumbnail of the device, its price, its availability, reviews, and perhaps a link to buy it immediately. The greater the percentage of search results that take advantage of metadata (from any search engine), the greater interest site owners have in structuring their sites accordingly. Metadata generally means machine-readable "data about data," which can take many forms. Perhaps the simplest form falls under the classification of microformats, [35] which can be as simple as a single attribute value such as nofollow, described in more detail in "Step 10: Build Inbound Links with Online Promotion," earlier in this chapter.


pages: 960 words: 125,049

Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos, Gavin Wood Ph. D.

air gap, Amazon Web Services, bitcoin, blockchain, business logic, continuous integration, cryptocurrency, Debian, digital divide, Dogecoin, domain-specific language, don't repeat yourself, Edward Snowden, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, functional programming, Google Chrome, information security, initial coin offering, intangible asset, Internet of things, litecoin, machine readable, move fast and break things, node package manager, non-fungible token, peer-to-peer, Ponzi scheme, prediction markets, pull request, QR code, Ruby on Rails, Satoshi Nakamoto, sealed-bid auction, sharing economy, side project, smart contracts, transaction costs, Turing complete, Turing machine, Vickrey auction, Vitalik Buterin, web application, WebSocket

. */ jumpi(tag_1, iszero(callvalue)) 0x0 dup1 revert tag_1: /* "Example.sol":115:125 msg.sender */ caller /* "Example.sol":99:112 contractOwner */ 0x0 dup1 /* "Example.sol":99:125 contractOwner = msg.sender */ 0x100 exp dup2 sload dup2 0xffffffffffffffffffffffffffffffffffffffff mul not and swap1 dup4 0xffffffffffffffffffffffffffffffffffffffff and mul or swap1 sstore pop /* "Example.sol":26:132 contract example {... */ dataSize(sub_0) dup1 dataOffset(sub_0) 0x0 codecopy 0x0 return stop sub_0: assembly { /* "Example.sol":26:132 contract example {... */ mstore(0x40, 0x60) 0x0 dup1 revert auxdata: 0xa165627a7a7230582056b99dcb1edd3eece01f27c9649c5abcc14a435efe3b... } The --bin-runtime option produces the machine-readable hexadecimal bytecode: 60606040523415600e57600080fd5b336000806101000a81548173 ffffffffffffffffffffffffffffffffffffffff 021916908373 ffffffffffffffffffffffffffffffffffffffff 160217905550603580605b6000396000f3006060604052600080fd00a165627a7a7230582056b... You can investigate what’s going on here in detail using the opcode list given in “The EVM Instruction Set (Bytecode Operations)”.


pages: 561 words: 120,899

The Theory That Would Not Die: How Bayes' Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant From Two Centuries of Controversy by Sharon Bertsch McGrayne

Abraham Wald, Alan Greenspan, Bayesian statistics, bioinformatics, Bletchley Park, British Empire, classic study, Claude Shannon: information theory, Daniel Kahneman / Amos Tversky, data science, double helix, Dr. Strangelove, driverless car, Edmond Halley, Fellow of the Royal Society, full text search, government statistician, Henri Poincaré, Higgs boson, industrial research laboratory, Isaac Newton, Johannes Kepler, John Markoff, John Nash: game theory, John von Neumann, linear programming, longitudinal study, machine readable, machine translation, meta-analysis, Nate Silver, p-value, Pierre-Simon Laplace, placebo effect, prediction markets, RAND corporation, recommendation engine, Renaissance Technologies, Richard Feynman, Richard Feynman: Challenger O-ring, Robert Mercer, Ronald Reagan, seminal paper, speech recognition, statistical model, stochastic process, Suez canal 1869, Teledyne, the long tail, Thomas Bayes, Thomas Kuhn: the structure of scientific revolutions, traveling salesman, Turing machine, Turing test, uranium enrichment, We are all Keynesians now, Yom Kippur War

During the Second World War, Warren Weaver of the Rockefeller Foundation was impressed with how “a multiplicity of languages impedes cultural interchange between the peoples of the earth and is a serious deterrent to international understanding.”6 Struck by the power of mechanized cryptography and by Claude Shannon’s new information theory, Weaver suggested that computerized statistical methods could treat translation as a cryptography problem. In the absence of computer power and a wealth of machine-readable text, Weaver’s idea lay fallow for decades. Ever since, the holy grail of translators has been a universal machine that can transform written and spoken words from one language into any other. As part of this endeavor, linguists like Noam Chomsky developed structural rules for English sentences, subjects, verbs, adjectives, and grammar but failed to produce an algorithm that could explain why one string of words makes an English sentence while another string does not.


pages: 320 words: 87,853

The Black Box Society: The Secret Algorithms That Control Money and Information by Frank Pasquale

Adam Curtis, Affordable Care Act / Obamacare, Alan Greenspan, algorithmic trading, Amazon Mechanical Turk, American Legislative Exchange Council, asset-backed security, Atul Gawande, bank run, barriers to entry, basic income, Bear Stearns, Berlin Wall, Bernie Madoff, Black Swan, bonus culture, Brian Krebs, business cycle, business logic, call centre, Capital in the Twenty-First Century by Thomas Piketty, Chelsea Manning, Chuck Templeton: OpenTable:, cloud computing, collateralized debt obligation, computerized markets, corporate governance, Credit Default Swap, credit default swaps / collateralized debt obligations, crowdsourcing, cryptocurrency, data science, Debian, digital rights, don't be evil, drone strike, Edward Snowden, en.wikipedia.org, Evgeny Morozov, Fall of the Berlin Wall, Filter Bubble, financial engineering, financial innovation, financial thriller, fixed income, Flash crash, folksonomy, full employment, Gabriella Coleman, Goldman Sachs: Vampire Squid, Google Earth, Hernando de Soto, High speed trading, hiring and firing, housing crisis, Ian Bogost, informal economy, information asymmetry, information retrieval, information security, interest rate swap, Internet of things, invisible hand, Jaron Lanier, Jeff Bezos, job automation, John Bogle, Julian Assange, Kevin Kelly, Kevin Roose, knowledge worker, Kodak vs Instagram, kremlinology, late fees, London Interbank Offered Rate, London Whale, machine readable, Marc Andreessen, Mark Zuckerberg, Michael Milken, mobile money, moral hazard, new economy, Nicholas Carr, offshore financial centre, PageRank, pattern recognition, Philip Mirowski, precariat, profit maximization, profit motive, public intellectual, quantitative easing, race to the bottom, reality distortion field, recommendation engine, regulatory arbitrage, risk-adjusted returns, Satyajit Das, Savings and loan crisis, search engine result page, shareholder value, Silicon Valley, Snapchat, social intelligence, Spread Networks laid a new fibre optics cable between New York and Chicago, statistical arbitrage, statistical model, Steven Levy, technological solutionism, the scientific method, too big to fail, transaction costs, two-sided market, universal basic income, Upton Sinclair, value at risk, vertical integration, WikiLeaks, Yochai Benkler, zero-sum game

“Explanations” like “too many revolving accounts” or “time since last account opened too short” are reason codes;25 rather than explain what happened in a straightforward way, they simply name a factor in the decision. We know it was more important than other, unnamed factors, but we have little sense of how the weighing went. While the term code can connote law (as in the Internal Revenue Code) or software (which involves the “coding” of instructions into machine-readable formats), it can also suggest a deliberately hidden meaning.26 Someone sends a “coded message” in order to avoid detection, to keep third parties from understanding exactly what is going on. In algorithmic decision making, this third, mysterious aspect of code too often predominates. For example, with credit decisions, there are so many vague or confl icting reason codes that it is possible to rationalize virtually any decision.27 Maybe you have too many accounts open, maybe you have too few— either could contribute, at any given time, to a decision to reduce a credit score or reject an application. 150 THE BLACK BOX SOCIETY But what we really care about is that the data at the heart of the decision was right, and that it didn’t include illicit or unfair considerations.


pages: 482 words: 121,173

Tools and Weapons: The Promise and the Peril of the Digital Age by Brad Smith, Carol Ann Browne

"World Economic Forum" Davos, Affordable Care Act / Obamacare, AI winter, air gap, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, augmented reality, autonomous vehicles, barriers to entry, Berlin Wall, Big Tech, Bletchley Park, Blitzscaling, Boeing 737 MAX, business process, call centre, Cambridge Analytica, Celtic Tiger, Charlie Hebdo massacre, chief data officer, cloud computing, computer vision, corporate social responsibility, data science, deep learning, digital divide, disinformation, Donald Trump, Eben Moglen, Edward Snowden, en.wikipedia.org, Hacker News, immigration reform, income inequality, Internet of things, invention of movable type, invention of the telephone, Jeff Bezos, Kevin Roose, Laura Poitras, machine readable, Mark Zuckerberg, minimum viable product, national security letter, natural language processing, Network effects, new economy, Nick Bostrom, off-the-grid, operational security, opioid epidemic / opioid crisis, pattern recognition, precision agriculture, race to the bottom, ransomware, Ronald Reagan, Rubik’s Cube, Salesforce, school vouchers, self-driving car, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, Skype, speech recognition, Steve Ballmer, Steve Jobs, surveillance capitalism, tech worker, The Rise and Fall of American Growth, Tim Cook: Apple, Wargames Reagan, WikiLeaks, women in the workforce

The three companies announced the Open Data Initiative, launched a month later, designed to provide a technology platform and tools to enable organizations to federate data while continuing to own and maintain control of the data they share. It will include tech tools that organizations can use to identify and assess the useful data they already possess and put it into a machine-readable and structured format suitable for sharing. Perhaps as much as anything else, an open-data revolution will require experimentation to get this right. Before our dinner ended, I pulled up a chair next to Trunnell and asked what we might do together. I was especially intrigued by the opportunity to advance work that we at Microsoft were already pursuing with other cancer institutes in our corner of North America, including with leading organizations in Vancouver, British Columbia.


Text Analytics With Python: A Practical Real-World Approach to Gaining Actionable Insights From Your Data by Dipanjan Sarkar

bioinformatics, business intelligence, business logic, computer vision, continuous integration, data science, deep learning, Dr. Strangelove, en.wikipedia.org, functional programming, general-purpose programming language, Guido van Rossum, information retrieval, Internet of things, invention of the printing press, iterative process, language acquisition, machine readable, machine translation, natural language processing, out of africa, performance metric, premature optimization, recommendation engine, self-driving car, semantic web, sentiment analysis, speech recognition, statistical model, text mining, Turing test, web application

By definition, a body of text under analysis is often a document, and by applying various techniques we usually convert this document to a vector of words, which is a numeric array whose values are specific weights for each word that could either be its frequency, its occurrence, or various other depictions—some of which we will explore in Chapter 3. Often the text needs to be cleaned and processed to remove noisy terms and data, called text pre-processing. Once we have the data in a machine-readable and understandable format, we can apply relevant algorithms based on the problem to be solved at hand. The applications of text analytics are manifold. Some of the most popular ones include the following: Spam detection News articles categorization Social media analysis and monitoring Bio-medical Security intelligence Marketing and CRM Sentiment analysis Ad placements Chatbots Virtual assistants Summary Congratulations on sticking it out till the end of this long chapter!


pages: 400 words: 121,988

Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets by Donald MacKenzie

algorithmic trading, automated trading system, banking crisis, barriers to entry, bitcoin, blockchain, Bonfire of the Vanities, Bretton Woods, Cambridge Analytica, centralized clearinghouse, Claude Shannon: information theory, coronavirus, COVID-19, cryptocurrency, disintermediation, diversification, en.wikipedia.org, Ethereum, ethereum blockchain, family office, financial intermediation, fixed income, Flash crash, Google Earth, Hacker Ethic, Hibernia Atlantic: Project Express, interest rate derivative, interest rate swap, inventory management, Jim Simons, level 1 cache, light touch regulation, linked data, lockdown, low earth orbit, machine readable, market design, market microstructure, Martin Wolf, proprietary trading, Renaissance Technologies, Satoshi Nakamoto, Small Order Execution System, Spread Networks laid a new fibre optics cable between New York and Chicago, statistical arbitrage, statistical model, Steven Levy, The Great Moderation, transaction costs, UUNET, zero-sum game

Fragmentation: transactions in or changes in the order books for the same shares on different trading venues. 4. Related shares and other instruments: changes in the market for, e.g., shares whose price is correlated with that of the shares being traded. Note: A signal is a data pattern that informs an algorithm’s trading. A number of other classes of signal are in more specialized use, such as machine-readable corporate or macroeconomic news releases. There are many other sources of information used in trading, including automated analysis of social media “sentiment,” satellite data on, e.g., oil-tanker movements, etc. (although such data are often more useful to trading firms with longer time horizons than those of HFT).


pages: 580 words: 125,129

Androids: The Team That Built the Android Operating System by Chet Haase

Andy Rubin, Apple II, Apple's 1984 Super Bowl advert, augmented reality, barriers to entry, Beos Apple "Steve Jobs" next macos , Big Tech, Bill Atkinson, commoditize, continuous integration, crowdsourcing, en.wikipedia.org, fault tolerance, Firefox, General Magic , Google Chrome, Ken Thompson, lock screen, machine readable, Menlo Park, PalmPilot, Parkinson's law, pull request, QWERTY keyboard, side project, Silicon Valley, skunkworks, speech recognition, stealth mode startup, Steve Ballmer, Steve Jobs, Steve Wozniak, Tony Fadell, turn-by-turn navigation, web application

Instead, the original source code needs to be compiled into a different binary version for each different type of hardware you want to run it on. Separate compilers create unique executables for every type of machine on which the code will be run. Along comes Java. The Java compiler translates source code not into machine-readable code, but into an intermediate representation called bytecode. This code can be executed on any computer platform that has an additional piece of software running on it called a runtime. The runtime interprets the bytecode and translates it into the binary representation of that computer, essentially compiling it on the fly.


pages: 494 words: 121,217

Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency by Andy Greenberg

2021 United States Capitol attack, Airbnb, augmented reality, bitcoin, Bitcoin Ponzi scheme, Black Lives Matter, blockchain, Brian Krebs, Cody Wilson, commoditize, computerized markets, COVID-19, crowdsourcing, cryptocurrency, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, forensic accounting, Global Witness, Google Glasses, Higgs boson, hive mind, impulse control, index card, Internet Archive, Jeff Bezos, Julian Assange, Large Hadron Collider, machine readable, market design, operational security, opioid epidemic / opioid crisis, pirate software, Ponzi scheme, ransomware, reserve currency, ride hailing / ride sharing, rolodex, Ross Ulbricht, Satoshi Nakamoto, Skype, slashdot, Social Justice Warrior, the market place, web application, WikiLeaks

When his parents saw his interest in the machine and bought him a Commodore 64, his life was transformed. Soon, frustrated by the inelegant way the machine displayed text on the screen, he was coding his own word processor. The Commodore didn’t have a real compiler, the software that turns human-readable computer commands in a language like BASIC into machine-readable instructions. Instead, it interpreted the commands in his program one by one as it ran, which Gronager found far too slow and inefficient. Undaunted—and unaware that he was taking on an absurdly technical challenge for a self-taught middle schooler—Gronager began writing his programs directly in Assembly, the near-native language of the Commodore’s processor, the better to get his hands as close as possible to the computer’s real mechanics.


pages: 945 words: 292,893

Seveneves by Neal Stephenson

Apollo 13, Biosphere 2, clean water, Colonization of Mars, Danny Hillis, digital map, double helix, epigenetics, fault tolerance, Fellow of the Royal Society, Filipino sailors, gravity well, hydroponic farming, Isaac Newton, Jeff Bezos, kremlinology, Kuiper Belt, low earth orbit, machine readable, microbiome, military-industrial complex, Neal Stephenson, orbital mechanics / astrodynamics, phenotype, Potemkin village, pre–internet, random walk, remote working, selection bias, side project, Silicon Valley, Skype, Snow Crash, space junk, statistical model, Stewart Brand, supervolcano, tech billionaire, TED Talk, the scientific method, Tunguska event, VTOL, zero day, éminence grise

“Take the first one that’s unlabeled,” Moira said. “Leave the door open, please.” Dr. Andrada coughed as the chilly air made his throat spasm. He opened one of the small hatches and slid the sample rack into it. In the meantime Moira was using a handheld printer to generate a sticker identifying the sample in English, in Filipino, and in a machine-readable bar code language. Once Dr. Andrada had returned to the central module, she went up to the open hatch, verified that the sample rack was properly seated in the tubular cavity beyond, then closed the hatch and affixed the sticker to its front. Printed on the hatch was a unique identification number and a bar code conveying the same thing, which she zapped and then double-checked.

A yellow-striped tube stretched away into the part of Quarantine set aside for people who, like them, were returning from the surface of Earth. A few meters in, they were confronted by a one-way door, constructed so that only one person at a time could pass through it. Hanging on a rack nearby were a number of hard bracelets, color-coded to indicate that they were intended for Survey personnel, also striped with machine-readable glyphs. Kath Two selected one and ratcheted it around her wrist. After a moment, a red diode began to blink on its back and digits began to count time. She waved it at the door, which unlocked itself and allowed her to pass into the tube beyond. This part of the Q consisted essentially of plumbing: a snarl of human-sized pipes that drained people away from incoming ships and let them pool in separate reservoirs until they had passed muster.


pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex by Yasha Levine

23andMe, activist fund / activist shareholder / activist investor, Adam Curtis, Airbnb, AltaVista, Amazon Web Services, Anne Wojcicki, anti-communist, AOL-Time Warner, Apple's 1984 Super Bowl advert, bitcoin, Black Lives Matter, borderless world, Boston Dynamics, British Empire, Californian Ideology, call centre, Charles Babbage, Chelsea Manning, cloud computing, collaborative editing, colonial rule, company town, computer age, computerized markets, corporate governance, crowdsourcing, cryptocurrency, data science, digital map, disinformation, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, drone strike, dual-use technology, Edward Snowden, El Camino Real, Electric Kool-Aid Acid Test, Elon Musk, end-to-end encryption, fake news, fault tolerance, gentrification, George Gilder, ghettoisation, global village, Google Chrome, Google Earth, Google Hangouts, Greyball, Hacker Conference 1984, Howard Zinn, hypertext link, IBM and the Holocaust, index card, Jacob Appelbaum, Jeff Bezos, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Julian Assange, Kevin Kelly, Kickstarter, Laura Poitras, life extension, Lyft, machine readable, Mark Zuckerberg, market bubble, Menlo Park, military-industrial complex, Mitch Kapor, natural language processing, Neal Stephenson, Network effects, new economy, Norbert Wiener, off-the-grid, One Laptop per Child (OLPC), packet switching, PageRank, Paul Buchheit, peer-to-peer, Peter Thiel, Philip Mirowski, plutocrats, private military company, RAND corporation, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, Skype, slashdot, Snapchat, Snow Crash, SoftBank, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, Telecommunications Act of 1996, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Hackers Conference, Tony Fadell, uber lyft, vertical integration, Whole Earth Catalog, Whole Earth Review, WikiLeaks

.… The very existence of a National Data Center may encourage certain federal officials to engage in questionable surveillance tactics. For example, optical scanners—devices with the capacity to read a variety of type fonts or handwriting at fantastic rates of speed—could be used to monitor our mail. By linking scanners with a computer system, the information drawn in by the scanner would be converted into machine-readable form and transferred into the subject’s file in the National Data Center. Then, with sophisticated programming, the dossiers of all of the surveillance subject’s correspondents could be produced at the touch of a button, and an appropriate entry—perhaps “associates with known criminals”—could be added to all of them.


Stocks for the Long Run, 4th Edition: The Definitive Guide to Financial Market Returns & Long Term Investment Strategies by Jeremy J. Siegel

addicted to oil, Alan Greenspan, asset allocation, backtesting, behavioural economics, Black-Scholes formula, book value, Bretton Woods, business cycle, buy and hold, buy low sell high, California gold rush, capital asset pricing model, cognitive dissonance, compound rate of return, correlation coefficient, currency risk, Daniel Kahneman / Amos Tversky, diversification, diversified portfolio, dividend-yielding stocks, dogs of the Dow, equity premium, equity risk premium, Eugene Fama: efficient market hypothesis, Everybody Ought to Be Rich, fixed income, German hyperinflation, implied volatility, index arbitrage, index fund, Isaac Newton, it's over 9,000, John Bogle, joint-stock company, Long Term Capital Management, loss aversion, machine readable, market bubble, mental accounting, Money creation, Myron Scholes, new economy, oil shock, passive investing, Paul Samuelson, popular capitalism, prediction markets, price anchoring, price stability, proprietary trading, purchasing power parity, random walk, Richard Thaler, risk free rate, risk tolerance, risk/return, Robert Shiller, Ronald Reagan, shareholder value, short selling, South Sea Bubble, stock buybacks, stocks for the long run, subprime mortgage crisis, survivorship bias, technology bubble, The Great Moderation, The Wisdom of Crowds, transaction costs, tulip mania, uptick rule, Vanguard fund, vertical integration

The firm wanted to investigate how well people had done investing in common stock and could not find reliable historical data. Professor Lorie teamed up with colleague Lawrence Fisher to build a database of securities data that could answer that question. With computer technology in its infancy, Lorie and Fisher created the Center for Research in Security Prices (CRSP, pronounced “crisp”) that compiled the first machine-readable file of stock prices dating from 1926 that was to become the accepted database for academic and professional research. The database currently contains all stocks traded on the New York and American Stock Exchanges and the Nasdaq. At the end of 2006, the market value of the 6,744 stocks was $18 trillion.


From Airline Reservations to Sonic the Hedgehog: A History of the Software Industry by Martin Campbell-Kelly

Apple II, Apple's 1984 Super Bowl advert, barriers to entry, Bill Gates: Altair 8800, business process, card file, Charles Babbage, computer age, computer vision, continuous integration, Dennis Ritchie, deskilling, Donald Knuth, Gary Kildall, Grace Hopper, history of Unix, hockey-stick growth, independent contractor, industrial research laboratory, information asymmetry, inventory management, John Markoff, John von Neumann, Larry Ellison, linear programming, longitudinal study, machine readable, Menlo Park, Mitch Kapor, Multics, Network effects, popular electronics, proprietary trading, RAND corporation, Robert X Cringely, Ronald Reagan, seminal paper, Silicon Valley, SimCity, software patent, Steve Jobs, Steve Wozniak, Steven Levy, Thomas Kuhn: the structure of scientific revolutions, vertical integration

Disclosing the code would make it relatively easy to re-engineer the 108 Chapter 4 software and produce a functional replica perfectly legally. For this reason, Informatics decided to rely on trade secret law for protection. It required its customers and its employees to sign non-disclosure agreements. The programs were kept secret, only machine-readable binary code being supplied to the customer. The product was supplied by a perpetual license, which could be revoked should the user make unauthorized copies for other installations or for non-purchasers. Informatics did, however, fully utilize copyright law to protect the supporting documentation for Mark IV as conventional literary works.


pages: 666 words: 131,148

Frommer's Seattle 2010 by Karl Samson

airport security, British Empire, company town, flying shuttle, Frank Gehry, glass ceiling, global village, haute cuisine, land bank, machine readable, place-making, sustainable-tourism, transcontinental railway, urban sprawl, white picket fence

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if it is a valid passport issued before October 26, 2005, and includes a machine-readable zone, or between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to http://travel.state.gov/visa. Canadian citizens may enter the United States without visas; they will need to show passports (if traveling by air) and proof of residence, however.


Frommer's Denver, Boulder & Colorado Springs by Eric Peterson

airport security, Columbine, Easter island, Ford Model T, glass ceiling, life extension, machine readable, Maui Hawaii, Ronald Reagan, Skype, sustainable-tourism, transcontinental railway, upwardly mobile, young professional

E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. (You can identify an e-Passport by the symbol on the bottom center cover of your passport.) If your passport doesn’t have this feature, you can still travel without a visa if it is a valid passport issued before October 26, 2005, and includes a machine-readable zone, or between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to www. travel.state.gov/visa. Citizens of all other countries must have (1) a valid passport that expires at least 6 months later than the scheduled end of their visit to the U.S., and (2) a tourist visa, which may be obtained without charge from any U.S. consulate.


pages: 455 words: 133,719

Overwhelmed: Work, Love, and Play When No One Has the Time by Brigid Schulte

8-hour work day, affirmative action, Bertrand Russell: In Praise of Idleness, blue-collar work, Burning Man, business cycle, call centre, cognitive dissonance, David Brooks, deliberate practice, desegregation, DevOps, East Village, Edward Glaeser, epigenetics, fear of failure, feminist movement, financial independence, game design, gender pay gap, glass ceiling, Great Leap Forward, helicopter parent, hiring and firing, income inequality, job satisfaction, John Maynard Keynes: Economic Possibilities for our Grandchildren, knowledge economy, knowledge worker, labor-force participation, machine readable, meta-analysis, new economy, profit maximization, Results Only Work Environment, Richard Feynman, Ronald Reagan, Saturday Night Live, sensible shoes, sexual politics, Sheryl Sandberg, Silicon Valley, Skype, Steve Jobs, tech worker, TED Talk, The Theory of the Leisure Class by Thorstein Veblen, Thorstein Veblen, women in the workforce, work culture , working poor, Zipcar, éminence grise

The institute found an increasing number of men in dual-earning couples experiencing conflict between the pressures of work and home, from 35 percent in 1977 to 60 percent in 2008, higher even than women, whose stress rose from 41 to 47 percent in the same period. http://familiesandwork.org/site/research/reports/newmalemystique.pdf. See also Brad Harrington, Fred Van Deusen, and Beth Humberd, The New Dad: Caring, Committed, and Conflicted (Boston: Boston College Center for Work & Family, 2011), www.bc.edu/content/dam/files/centers/cwf/pdf/FH-Study-Web-2.pdf. 8. Tom W. Smith et al., General Social Surveys, 1972–2010 (machine-readable data file) (Chicago: National Opinion Research Center, 2011), www3.norc.org/GSS+Website/. I ran a table on the question, “In general, how do you feel about your time, would you say you always feel rushed, sometimes or almost never?” and sorted the data by sex and by number of children. The question was asked in 1982, 1996, and 2004. 9.


pages: 505 words: 133,661

Who Owns England?: How We Lost Our Green and Pleasant Land, and How to Take It Back by Guy Shrubsole

Adam Curtis, Anthropocene, back-to-the-land, Beeching cuts, Boris Johnson, Capital in the Twenty-First Century by Thomas Piketty, centre right, congestion charging, Crossrail, deindustrialization, digital map, do-ocracy, Downton Abbey, false flag, financial deregulation, fixed income, fulfillment center, Garrett Hardin, gentrification, Global Witness, Goldman Sachs: Vampire Squid, Google Earth, housing crisis, housing justice, James Dyson, Jeremy Corbyn, Kickstarter, land bank, land reform, land tenure, land value tax, linked data, loadsamoney, Londongrad, machine readable, mega-rich, mutually assured destruction, new economy, Occupy movement, offshore financial centre, oil shale / tar sands, openstreetmap, place-making, plutocrats, profit motive, rent-seeking, rewilding, Right to Buy, Ronald Reagan, Russell Brand, sceptred isle, Stewart Brand, the built environment, the map is not the territory, The Wealth of Nations by Adam Smith, Tragedy of the Commons, trickle-down economics, urban sprawl, web of trust, Yom Kippur War, zero-sum game

Since then, the growth of GIS (Geographic Information System) mapping tools has transformed how maps can be made and shared. An EU directive called INSPIRE has forced the Land Registry and Ordnance Survey to publish digital maps showing the outlines of all land parcels in England and Wales – but not who owns them, and with licensing restrictions in place on reproducing the maps. Machine-readable datasets and open-source software have made it easier to analyse complex datasets detailing who owns land, while modern web mapping allows us to create powerful online maps. The Open Data movement has also sought to shift culture, both within government and wider civil society, so that previously closed data is made open and easily accessible.


pages: 752 words: 131,533

Python for Data Analysis by Wes McKinney

Alignment Problem, backtesting, Bear Stearns, cognitive dissonance, crowdsourcing, data science, Debian, duck typing, Firefox, functional programming, Google Chrome, Guido van Rossum, index card, machine readable, random walk, recommendation engine, revision control, sentiment analysis, Sharpe ratio, side project, sorting algorithm, statistical model, type inference

XML and HTML: Web Scraping Python has many libraries for reading and writing data in the ubiquitous HTML and XML formats. lxml (http://lxml.de) is one that has consistently strong performance in parsing very large files. lxml has multiple programmer interfaces; first I’ll show using lxml.html for HTML, then parse some XML using lxml.objectify. Many websites make data available in HTML tables for viewing in a browser, but not downloadable as an easily machine-readable format like JSON, HTML, or XML. I noticed that this was the case with Yahoo! Finance’s stock options data. If you aren’t familiar with this data; options are derivative contracts giving you the right to buy (call option) or sell (put option) a company’s stock at some particular price (the strike) between now and some fixed point in the future (the expiry).


pages: 260 words: 130,109

Frommer's Kauai by Jeanette Foster

airport security, Easter island, indoor plumbing, machine readable, Maui Hawaii, Skype, sustainable-tourism

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if it is a valid passport issued before October 26, 2005, and includes a machine-readable zone, or between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to http://travel.state.gov/visa. Canadian citizens may enter the United States without visas; they will need to show passports and proof of residence, however. Citizens of all other countries must have (1) a valid passport that expires at least 6 months later than the scheduled end of their visit to the U.S., and (2) a tourist visa.


How I Became a Quant: Insights From 25 of Wall Street's Elite by Richard R. Lindsey, Barry Schachter

Albert Einstein, algorithmic trading, Andrew Wiles, Antoine Gombaud: Chevalier de Méré, asset allocation, asset-backed security, backtesting, bank run, banking crisis, Bear Stearns, Black-Scholes formula, Bob Litterman, Bonfire of the Vanities, book value, Bretton Woods, Brownian motion, business cycle, business process, butter production in bangladesh, buy and hold, buy low sell high, capital asset pricing model, centre right, collateralized debt obligation, commoditize, computerized markets, corporate governance, correlation coefficient, creative destruction, Credit Default Swap, credit default swaps / collateralized debt obligations, currency manipulation / currency intervention, currency risk, discounted cash flows, disintermediation, diversification, Donald Knuth, Edward Thorp, Emanuel Derman, en.wikipedia.org, Eugene Fama: efficient market hypothesis, financial engineering, financial innovation, fixed income, full employment, George Akerlof, global macro, Gordon Gekko, hiring and firing, implied volatility, index fund, interest rate derivative, interest rate swap, Ivan Sutherland, John Bogle, John von Neumann, junk bonds, linear programming, Loma Prieta earthquake, Long Term Capital Management, machine readable, margin call, market friction, market microstructure, martingale, merger arbitrage, Michael Milken, Myron Scholes, Nick Leeson, P = NP, pattern recognition, Paul Samuelson, pensions crisis, performance metric, prediction markets, profit maximization, proprietary trading, purchasing power parity, quantitative trading / quantitative finance, QWERTY keyboard, RAND corporation, random walk, Ray Kurzweil, Reminiscences of a Stock Operator, Richard Feynman, Richard Stallman, risk free rate, risk-adjusted returns, risk/return, seminal paper, shareholder value, Sharpe ratio, short selling, Silicon Valley, six sigma, sorting algorithm, statistical arbitrage, statistical model, stem cell, Steven Levy, stochastic process, subscription business, systematic trading, technology bubble, The Great Moderation, the scientific method, too big to fail, trade route, transaction costs, transfer pricing, value at risk, volatility smile, Wiener process, yield curve, young professional

A brief sermonette on how to avoid fooling yourself too badly is found in a talk I gave to a convention of computer scientists in 2002.13 The label quantitative suggests that we are talking about numerically driven strategies. In the Internet era, we find ourselves drinking from an JWPR007-Lindsey 26 May 7, 2007 16:12 h ow i b e cam e a quant information fire hose that includes prodigious amounts of text as well. The original quants were the first to exploit the machine-readable numerical data. Now, many are using computational language approaches to analyze text. The original customers for these technologies, again, were the military and civilian intelligence agencies. Their sources were clandestine intercepts, and later, Web content. Financial textual sources of interest include the usual news suspects, both specialized and general, and many sources of pre-news such as the SEC, the courts, and government agencies.


pages: 464 words: 127,283

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia by Anthony M. Townsend

1960s counterculture, 4chan, A Pattern Language, Adam Curtis, air gap, Airbnb, Amazon Web Services, anti-communist, Apple II, Bay Area Rapid Transit, Big Tech, bike sharing, Boeing 747, Burning Man, business process, call centre, carbon footprint, charter city, chief data officer, clean tech, clean water, cloud computing, company town, computer age, congestion charging, congestion pricing, connected car, crack epidemic, crowdsourcing, DARPA: Urban Challenge, data acquisition, Deng Xiaoping, digital divide, digital map, Donald Davies, East Village, Edward Glaeser, Evgeny Morozov, food desert, game design, garden city movement, General Motors Futurama, gentrification, Geoffrey West, Santa Fe Institute, George Gilder, ghettoisation, global supply chain, Grace Hopper, Haight Ashbury, Hedy Lamarr / George Antheil, Herman Kahn, hive mind, Howard Rheingold, interchangeable parts, Internet Archive, Internet of things, Jacquard loom, Jane Jacobs, Jevons paradox, jitney, John Snow's cholera map, Joi Ito, Khan Academy, Kibera, Kickstarter, knowledge worker, Lewis Mumford, load shedding, lolcat, M-Pesa, machine readable, Mark Zuckerberg, megacity, megaproject, messenger bag, mobile money, mutually assured destruction, new economy, New Urbanism, Norbert Wiener, Occupy movement, off grid, One Laptop per Child (OLPC), openstreetmap, packet switching, PalmPilot, Panopticon Jeremy Bentham, Parag Khanna, patent troll, Pearl River Delta, place-making, planetary scale, popular electronics, power law, RFC: Request For Comment, RFID, ride hailing / ride sharing, Robert Gordon, scientific management, self-driving car, sharing economy, Shenzhen special economic zone , Silicon Valley, SimCity, Skype, smart cities, smart grid, smart meter, social graph, social software, social web, SpaceShipOne, special economic zone, Steve Jobs, Steve Wozniak, Stuxnet, supply-chain management, technoutopianism, Ted Kaczynski, telepresence, The Death and Life of Great American Cities, too big to fail, trade route, Twitter Arab Spring, Tyler Cowen, Tyler Cowen: Great Stagnation, undersea cable, Upton Sinclair, uranium enrichment, urban decay, urban planning, urban renewal, Vannevar Bush, working poor, working-age population, X Prize, Y2K, zero day, Zipcar

All transit operators face the thorny problem of communicating schedules, delays, and arrival information to millions of riders. Apps provide a quick, cheap, flexible, intuitive, and convenient way to push both schedules and real-time updates to anyone with a smartphone. As of early 2012, over two hundred transit agencies in North America were publishing some form of schedule information using a machine-readable format called General Transit Feed Specification, developed in 2005 by Google engineer Chris Harrelson and Bibiana McHugh, a technology manager at Portland, Oregon’s Tri-Met transit authority.21 Unlike most contest-generated apps, transit apps have a huge preexisting market, making it possible to build viable businesses that leverage open government data.


pages: 598 words: 140,612

Triumph of the City: How Our Greatest Invention Makes Us Richer, Smarter, Greener, Healthier, and Happier by Edward L. Glaeser

affirmative action, Andrei Shleifer, Berlin Wall, Boeing 747, British Empire, Broken windows theory, carbon footprint, carbon tax, Celebration, Florida, classic study, clean water, company town, congestion charging, congestion pricing, Cornelius Vanderbilt, declining real wages, desegregation, different worldview, diversified portfolio, Edward Glaeser, Elisha Otis, endowment effect, European colonialism, Fairchild Semiconductor, financial innovation, Ford Model T, Frank Gehry, global village, Guggenheim Bilbao, haute cuisine, high-speed rail, Home mortgage interest deduction, James Watt: steam engine, Jane Jacobs, job-hopping, John Snow's cholera map, junk bonds, Lewis Mumford, machine readable, Mahatma Gandhi, McMansion, megacity, megaproject, Michael Milken, mortgage debt, mortgage tax deduction, New Urbanism, place-making, Ponzi scheme, Potemkin village, Ralph Waldo Emerson, rent control, RFID, Richard Florida, Rosa Parks, school vouchers, Seaside, Florida, Silicon Valley, Skype, smart cities, Steven Pinker, streetcar suburb, strikebreaker, Thales and the olive presses, the built environment, The Death and Life of Great American Cities, the new new thing, The Wealth of Nations by Adam Smith, trade route, transatlantic slave trade, upwardly mobile, urban planning, urban renewal, urban sprawl, vertical integration, William Shockley: the traitorous eight, Works Progress Administration, young professional

Richard Wright: The Life and Times. New York: Holt, 2001. Rucker, Walter C., and James N. Upton. Encyclopedia of American Race Riots. Westport, CT: Greenwood, 2007. Ruggles, Steven, J. Trent Alexander, Katie Genadek, Ronald Goeken, Matthew B. Schroeder, and Matthew Sobek. Integrated Public Use Microdata Series, ver. 5.0 (machine-readable database). Minneapolis: University of Minnesota, 2010. Ruskin, John. The Genius of John Ruskin: Selections from His Writings, ed. John D. Rosenberg. New York: Routledge, 1980; Charlottesville: University Press of Virginia, 1997. ———. The Works of John Ruskin. London: G. Allen, 1903. Russell, Josiah C.


pages: 452 words: 134,502

Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet by David Moon, Patrick Ruffini, David Segal, Aaron Swartz, Lawrence Lessig, Cory Doctorow, Zoe Lofgren, Jamie Laurie, Ron Paul, Mike Masnick, Kim Dotcom, Tiffiniy Cheng, Alexis Ohanian, Nicole Powers, Josh Levy

4chan, Aaron Swartz, Adam Curtis, Affordable Care Act / Obamacare, Airbnb, Bernie Sanders, Big Tech, Burning Man, call centre, Cass Sunstein, Chelsea Manning, collective bargaining, creative destruction, crony capitalism, crowdsourcing, digital rights, disinformation, don't be evil, dual-use technology, facts on the ground, Firefox, Free Software Foundation, Hacker News, hive mind, hockey-stick growth, immigration reform, informal economy, jimmy wales, John Perry Barlow, Julian Assange, Kickstarter, liquidity trap, lolcat, machine readable, Mark Zuckerberg, obamacare, Occupy movement, offshore financial centre, Overton Window, peer-to-peer, plutocrats, power law, prisoner's dilemma, radical decentralization, rent-seeking, Silicon Valley, Skype, Streisand effect, technoutopianism, The future is already here, WikiLeaks, Y Combinator, Yochai Benkler

And since digital locks don’t work against determined attackers, the only way to keep files, programs, and keys out of wide circulation is to give rights holders the legal authority to demand that files be removed without court orders, to establish national censor walls that monitor Internet traffic and interdict requests for sites that rights holders have added to blacklists, and to ban tools that defeat any of this censorship. The Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), as well as related proposals, would ban the circumvention of Domain Name System (DNS) blocks and allow for IP blocking. DNS converts human-friendly Internet addresses (like ThePirateBay.se) into machine-readable numeric addresses (like 194.71.107.50). Efforts, like DNSSEC, to add a layer of security to DNS and detect and evade shenanigans at DNS servers would be illegal under SOPA and PIPA, as DNSSEC can’t (and shouldn’t be expected to) distinguish between the false DNS records doctored by a criminal, an oppressive government, and a record label.


pages: 520 words: 134,627

Unacceptable: Privilege, Deceit & the Making of the College Admissions Scandal by Melissa Korn, Jennifer Levitz

"RICO laws" OR "Racketeer Influenced and Corrupt Organizations", affirmative action, barriers to entry, Bear Stearns, benefit corporation, blockchain, call centre, Donald Trump, Gordon Gekko, helicopter parent, high net worth, impact investing, independent contractor, Jeffrey Epstein, machine readable, Maui Hawaii, medical residency, Menlo Park, multilevel marketing, performance metric, rolodex, Ronald Reagan, Salesforce, Sand Hill Road, Saturday Night Live, side hustle, side project, Silicon Valley, Snapchat, stealth mode startup, Steve Jobs, telemarketer, Thorstein Veblen, unpaid internship, upwardly mobile, yield management, young professional, zero-sum game

Early on a Saturday, the students would enter either Jack Yates High or West Hollywood Prep, where Riddell would meet them. Armed with their No. 2 pencils, the students would begin to take their tests, following special instructions. Singer’s game plan even included a way to deal with the Scantron sheets, the machine-readable paper on which students typically fill in bubbles to test questions: He told kids to write their answers on separate sheets of paper, to avoid mistakes on the grid of dots. He really had them do it so Riddell could bubble in the correct answers later, without having to first erase all those wrong bubbles.


pages: 517 words: 139,477

Stocks for the Long Run 5/E: the Definitive Guide to Financial Market Returns & Long-Term Investment Strategies by Jeremy Siegel

Alan Greenspan, AOL-Time Warner, Asian financial crisis, asset allocation, backtesting, banking crisis, Bear Stearns, behavioural economics, Black Monday: stock market crash in 1987, Black-Scholes formula, book value, break the buck, Bretton Woods, business cycle, buy and hold, buy low sell high, California gold rush, capital asset pricing model, carried interest, central bank independence, cognitive dissonance, compound rate of return, computer age, computerized trading, corporate governance, correlation coefficient, Credit Default Swap, currency risk, Daniel Kahneman / Amos Tversky, Deng Xiaoping, discounted cash flows, diversification, diversified portfolio, dividend-yielding stocks, dogs of the Dow, equity premium, equity risk premium, Eugene Fama: efficient market hypothesis, eurozone crisis, Everybody Ought to Be Rich, Financial Instability Hypothesis, fixed income, Flash crash, forward guidance, fundamental attribution error, Glass-Steagall Act, housing crisis, Hyman Minsky, implied volatility, income inequality, index arbitrage, index fund, indoor plumbing, inflation targeting, invention of the printing press, Isaac Newton, it's over 9,000, John Bogle, joint-stock company, London Interbank Offered Rate, Long Term Capital Management, loss aversion, machine readable, market bubble, mental accounting, Minsky moment, Money creation, money market fund, mortgage debt, Myron Scholes, new economy, Northern Rock, oil shock, passive investing, Paul Samuelson, Peter Thiel, Ponzi scheme, prediction markets, price anchoring, price stability, proprietary trading, purchasing power parity, quantitative easing, random walk, Richard Thaler, risk free rate, risk tolerance, risk/return, Robert Gordon, Robert Shiller, Ronald Reagan, shareholder value, short selling, Silicon Valley, South Sea Bubble, sovereign wealth fund, stocks for the long run, survivorship bias, technology bubble, The Great Moderation, the payments system, The Wisdom of Crowds, transaction costs, tulip mania, Tyler Cowen, Tyler Cowen: Great Stagnation, uptick rule, Vanguard fund

The firm wanted to investigate how well people had done investing in common stock, and it could not find reliable historical data. Professor Lorie teamed up with colleague Lawrence Fisher to build a database of securities data that could answer that question. With computer technology in its infancy, Lorie and Fisher created the Center for Research in Security Prices (CRSP, pronounced “crisp”) that compiled the first machine-readable file of stock prices dating from 1926 that was to become the accepted database for academic and professional research. The database currently contains all stocks traded on the New York and American Stock Exchanges and the Nasdaq. At the end of 2012, the market value of the nearly 5,000 stocks in the database was near $19 trillion.


Southwest USA Travel Guide by Lonely Planet

1919 Motor Transport Corps convoy, Albert Einstein, Apollo 11, Berlin Wall, Biosphere 2, Burning Man, carbon footprint, Columbine, Day of the Dead, Donner party, El Camino Real, friendly fire, G4S, haute couture, haute cuisine, housing crisis, illegal immigration, immigration reform, indoor plumbing, Intergovernmental Panel on Climate Change (IPCC), low earth orbit, machine readable, off grid, off-the-grid, place-making, SpaceShipOne, supervolcano, trade route, transcontinental railway, Virgin Galactic, walkable city, Works Progress Administration, X Prize

In most cases, your passport must be valid for at least another six months after you are due to leave the USA. If your passport doesn’t meet current US standards you’ll be turned back at the border. If your passport was issued before October 26, 2005, it must be machine readable (with two lines of letters, numbers and the repeated symbol <<< at the bottom); if it was issued between October 26, 2005 and October 25, 2006, it must be machine readable and include a digital photo on the data page or integrated chip with information from the data page; and if it was issued on or after October 26, 2006, it must be an e-Passport with a digital photo and an integrated chip containing information from the data page.


pages: 528 words: 146,459

Computer: A History of the Information Machine by Martin Campbell-Kelly, William Aspray, Nathan L. Ensmenger, Jeffrey R. Yost

Ada Lovelace, air freight, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Apple's 1984 Super Bowl advert, barriers to entry, Bill Gates: Altair 8800, Bletchley Park, borderless world, Buckminster Fuller, Build a better mousetrap, Byte Shop, card file, cashless society, Charles Babbage, cloud computing, combinatorial explosion, Compatible Time-Sharing System, computer age, Computer Lib, deskilling, don't be evil, Donald Davies, Douglas Engelbart, Douglas Engelbart, Dynabook, Edward Jenner, Evgeny Morozov, Fairchild Semiconductor, fault tolerance, Fellow of the Royal Society, financial independence, Frederick Winslow Taylor, game design, garden city movement, Gary Kildall, Grace Hopper, Herman Kahn, hockey-stick growth, Ian Bogost, industrial research laboratory, informal economy, interchangeable parts, invention of the wheel, Ivan Sutherland, Jacquard loom, Jeff Bezos, jimmy wales, John Markoff, John Perry Barlow, John von Neumann, Ken Thompson, Kickstarter, light touch regulation, linked data, machine readable, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Mitch Kapor, Multics, natural language processing, Network effects, New Journalism, Norbert Wiener, Occupy movement, optical character recognition, packet switching, PageRank, PalmPilot, pattern recognition, Pierre-Simon Laplace, pirate software, popular electronics, prediction markets, pre–internet, QWERTY keyboard, RAND corporation, Robert X Cringely, Salesforce, scientific management, Silicon Valley, Silicon Valley startup, Steve Jobs, Steven Levy, Stewart Brand, Ted Nelson, the market place, Turing machine, Twitter Arab Spring, Vannevar Bush, vertical integration, Von Neumann architecture, Whole Earth Catalog, William Shockley: the traitorous eight, women in the workforce, young professional

The first flowcharts were developed for use in industrial engineering in the 1920s, and von Neumann (who had first trained as a chemical engineer) began applying them to computer programs in the 1950s. Flowcharts were intended to serve as the blueprint for computer programmers, an intermediate step between the analysis of a system and its implementation as a software application. The second step in the translation process involved the coding of the algorithm in machine-readable form and had already been partially addressed by Wilkes and Wheeler. By about 1953, however, the center of programming research had moved from England to the United States, where there was heavy investing in computers with large memories, backed up with magnetic tapes and drums. Computers now had perhaps ten times the memory of the first prototypes.


pages: 688 words: 147,571

Robot Rules: Regulating Artificial Intelligence by Jacob Turner

"World Economic Forum" Davos, Ada Lovelace, Affordable Care Act / Obamacare, AI winter, algorithmic bias, algorithmic trading, AlphaGo, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, autonomous vehicles, backpropagation, Basel III, bitcoin, Black Monday: stock market crash in 1987, blockchain, brain emulation, Brexit referendum, Cambridge Analytica, Charles Babbage, Clapham omnibus, cognitive dissonance, Computing Machinery and Intelligence, corporate governance, corporate social responsibility, correlation does not imply causation, crowdsourcing, data science, deep learning, DeepMind, Demis Hassabis, distributed ledger, don't be evil, Donald Trump, driverless car, easy for humans, difficult for computers, effective altruism, Elon Musk, financial exclusion, financial innovation, friendly fire, future of work, hallucination problem, hive mind, Internet of things, iterative process, job automation, John Markoff, John von Neumann, Loebner Prize, machine readable, machine translation, medical malpractice, Nate Silver, natural language processing, Nick Bostrom, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, nudge unit, obamacare, off grid, OpenAI, paperclip maximiser, pattern recognition, Peace of Westphalia, Philippa Foot, race to the bottom, Ray Kurzweil, Recombinant DNA, Rodney Brooks, self-driving car, Silicon Valley, Stanislav Petrov, Stephen Hawking, Steve Wozniak, strong AI, technological singularity, Tesla Model S, The Coming Technological Singularity, The Future of Employment, The Signal and the Noise by Nate Silver, trolley problem, Turing test, Vernor Vinge

The Internet is not the only mass data set which might be prone to similar problems of inherent bias . It is possible that Google ’s TensorFlow as well as Amazon and Microsoft ’s Gluon libraries of machine learning software might have similar latent defects. 3.2.4 Data Available Is Insufficiently Detailed Sometimes the entire universe of data available in a machine-readable format is insufficiently detailed to achieve unbiased results. For example, AI might be asked to determine which candidates are best suited to jobs as labourers on a building site based on data from successful incumbent workers. If the only data made available to the AI are age and gender, then it is most likely that the AI will select younger men for the job.


pages: 550 words: 154,725

The Idea Factory: Bell Labs and the Great Age of American Innovation by Jon Gertner

Albert Einstein, back-to-the-land, Black Swan, business climate, Charles Babbage, Claude Shannon: information theory, Clayton Christensen, complexity theory, corporate governance, cuban missile crisis, Dennis Ritchie, Edward Thorp, Fairchild Semiconductor, Henry Singleton, horn antenna, Hush-A-Phone, information retrieval, invention of the telephone, James Watt: steam engine, Karl Jansky, Ken Thompson, knowledge economy, Leonard Kleinrock, machine readable, Metcalfe’s law, Nicholas Carr, Norbert Wiener, Picturephone, Richard Feynman, Robert Metcalfe, Russell Ohl, Sand Hill Road, Silicon Valley, Skype, space junk, Steve Jobs, Telecommunications Act of 1996, Teledyne, traveling salesman, undersea cable, uranium enrichment, vertical integration, William Shockley: the traitorous eight

A visitor could also try something called a portable “pager,” a big, blocky device that could alert doctors and other busy professionals when they received urgent calls.2 New York’s fair would dwarf Seattle’s. The crowds were expected to be immense—probably somewhere around 50 or 60 million people in total. Pierce and David’s 1961 memo recommended a number of exhibits: “personal hand-carried telephones,” “business letters in machine-readable form, transmitted by wire,” “information retrieval from a distant computer-automated library,” and “satellite and space communications.” By the time the fair opened in April 1964, though, the Bell System exhibits, housed in a huge white cantilevered building nicknamed the “floating wing,” described a more conservative future than the one Pierce and David had envisioned.


pages: 492 words: 153,565

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter

air gap, Ayatollah Khomeini, Brian Krebs, crowdsourcing, data acquisition, Doomsday Clock, drone strike, Edward Snowden, facts on the ground, false flag, Firefox, friendly fire, Google Earth, information retrieval, information security, John Markoff, Julian Assange, Kickstarter, Loma Prieta earthquake, machine readable, Maui Hawaii, military-industrial complex, MITM: man-in-the-middle, Morris worm, pre–internet, RAND corporation, rolling blackouts, Silicon Valley, skunkworks, smart grid, smart meter, South China Sea, Stuxnet, Timothy McVeigh, two and twenty, undersea cable, unit 8200, uranium enrichment, Vladimir Vetrov: Farewell Dossier, WikiLeaks, Y2K, zero day

File paths show the folder and subfolders where a file or document is stored on a computer. The file path for a document called “my résumé” stored in a computer’s Documents folder on the C: drive would look like this—c:\documents\myresume.doc. Sometimes when programmers run source code through a compiler—a tool that translates human-readable programming language into machine-readable binary code—the file path indicating where the programmer had stored the code on his computer gets placed in the compiled binary file. Most malware writers configure their compilers to eliminate the file path, but Stuxnet’s attackers didn’t do this, either by accident or not. The path showed up as b:\myrtus\src\objfre_w2k_x86\i386\guava.pdb in the driver file, indicating that the driver was part of a project the programmer had called “guava,” which was stored on his computer in a directory named “myrtus.”


pages: 595 words: 143,394

Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections by Mollie Hemingway

2021 United States Capitol attack, active measures, Affordable Care Act / Obamacare, Airbnb, Bernie Sanders, Big Tech, Black Lives Matter, coronavirus, corporate governance, COVID-19, critical race theory, defund the police, deplatforming, disinformation, Donald Trump, fake news, George Floyd, global pandemic, illegal immigration, inventory management, lab leak, lockdown, machine readable, Mahatma Gandhi, Mark Zuckerberg, military-industrial complex, obamacare, Oculus Rift, Paris climate accords, Ponzi scheme, power law, QR code, race to the bottom, Ronald Reagan, Silicon Valley, Snapchat, statistical model, tech billionaire, TikTok

Poll workers, many of whom had no hands-on training because of the pandemic, were often befuddled by the new technology,” O’Brien said.24 J. Alex Halderman, a University of Michigan professor of computer science, said he’d analyzed the voting system, which issues a “QR” code for each ballot—a machine-readable optical label that contains information about the item to which it is attached—and found that “there’s nothing that stops an attacker from just duplicating one, and the duplicate would count the same as the original bar code.”25 Halderman had also tested whether voters could catch deliberately placed errors on their ballot, and only 7 percent did.


Smart Grid Standards by Takuro Sato

business cycle, business process, carbon footprint, clean water, cloud computing, data acquisition, decarbonisation, demand response, distributed generation, electricity market, energy security, exponential backoff, factory automation, Ford Model T, green new deal, green transition, information retrieval, information security, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Iridium satellite, iterative process, knowledge economy, life extension, linear programming, low earth orbit, machine readable, market design, MITM: man-in-the-middle, off grid, oil shale / tar sands, OSI model, packet switching, performance metric, RFC: Request For Comment, RFID, smart cities, smart grid, smart meter, smart transportation, Thomas Davenport

Thirdly, all other specifics of the hardware environment shall be shielded by the other layers in the interface profile. 3.4.2.4 Information Exchange Model In IEC 61968 series, the following items from a compliant utility inter-application infrastructure are needed. Firstly, it shall have one logical IEC 61968 IEM and its implementation may be physically distributed. This facility allows information exchanged among components to be declared in a publicly accessible manner. Secondly, the IEM shall be accessible in machine-readable and platform-independent form. Thirdly, information is exchanged between components via one or more events whose types are defined in the IEM. Fourthly, the IEM shall maintain descriptions of the contents, syntax, and semantics (i.e., meaning) of the information exchanged Smart Grid Standards 106 between components.


pages: 625 words: 167,097

Kiln People by David Brin

Chuck Templeton: OpenTable:, Easter island, index card, jitney, life extension, machine readable, pattern recognition, phenotype, pneumatic tube, price anchoring, prisoner's dilemma, Schrödinger's Cat, telepresence, Vernor Vinge, your tax dollars at work

I sure would hate to go through stuff like that. But how else can anything be retrieved? Only the original human template can inload a duplicate's full memory. No other person or computer can substitute. If the template's missing or dead, all you can do is physically sift the copy's brain for crude sepia images -- the only data that's machine-readable from golemflesh. The rest -- your consciousness Standing Wave, the core sense of self that some call the soul -- is little more than useless static. There used to be an old riddle. Are the colors you see the same as the ones I see? When you smell a rose, are you experiencing the same heady sensations that I do, when I sniff the same flower?


pages: 552 words: 168,518

MacroWikinomics: Rebooting Business and the World by Don Tapscott, Anthony D. Williams

"World Economic Forum" Davos, accounting loophole / creative accounting, airport security, Andrew Keen, augmented reality, Ayatollah Khomeini, barriers to entry, Ben Horowitz, bioinformatics, blood diamond, Bretton Woods, business climate, business process, buy and hold, car-free, carbon footprint, carbon tax, Charles Lindbergh, citizen journalism, Clayton Christensen, clean water, Climategate, Climatic Research Unit, cloud computing, collaborative editing, collapse of Lehman Brothers, collateralized debt obligation, colonial rule, commoditize, corporate governance, corporate social responsibility, creative destruction, crowdsourcing, death of newspapers, demographic transition, digital capitalism, digital divide, disruptive innovation, distributed generation, do well by doing good, don't be evil, en.wikipedia.org, energy security, energy transition, Evgeny Morozov, Exxon Valdez, failed state, fault tolerance, financial innovation, Galaxy Zoo, game design, global village, Google Earth, Hans Rosling, hive mind, Home mortgage interest deduction, information asymmetry, interchangeable parts, Internet of things, invention of movable type, Isaac Newton, James Watt: steam engine, Jaron Lanier, jimmy wales, Joseph Schumpeter, Julian Assange, Kevin Kelly, Kickstarter, knowledge economy, knowledge worker, machine readable, Marc Andreessen, Marshall McLuhan, mass immigration, medical bankruptcy, megacity, military-industrial complex, mortgage tax deduction, Netflix Prize, new economy, Nicholas Carr, ocean acidification, off-the-grid, oil shock, old-boy network, online collectivism, open borders, open economy, pattern recognition, peer-to-peer lending, personalized medicine, radical decentralization, Ray Kurzweil, RFID, ride hailing / ride sharing, Ronald Reagan, Rubik’s Cube, scientific mainstream, shareholder value, Silicon Valley, Skype, smart grid, smart meter, social graph, social web, software patent, Steve Jobs, synthetic biology, systems thinking, text mining, the long tail, the scientific method, The Wisdom of Crowds, transaction costs, transfer pricing, University of East Anglia, urban sprawl, value at risk, WikiLeaks, X Prize, Yochai Benkler, young professional, Zipcar

If other companies were to follow suit, a patent pool for neglected diseases would provide a significant boost to researchers who have been working on treatments for diseases such as TB, malaria, and river blindness. In the near future, intelligent machines will accelerate biomedical research even further. Bradley’s team already translates their “human readable” logs into a machine-readable format. “We really want to get to the point where machines can design experiments, can execute experiments, and can analyze them,” he says. Soon it could become difficult to tell if you’re interacting with a machine or a human. “We’re not actually that far from that point,” he says. “And I think that’s when things will really accelerate.”


Turing's Cathedral by George Dyson

1919 Motor Transport Corps convoy, Abraham Wald, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, anti-communist, Benoit Mandelbrot, Bletchley Park, British Empire, Brownian motion, cellular automata, Charles Babbage, cloud computing, computer age, Computing Machinery and Intelligence, Danny Hillis, dark matter, double helix, Dr. Strangelove, fault tolerance, Fellow of the Royal Society, finite state, Ford Model T, Georg Cantor, Henri Poincaré, Herman Kahn, housing crisis, IFF: identification friend or foe, indoor plumbing, Isaac Newton, Jacquard loom, John von Neumann, machine readable, mandelbrot fractal, Menlo Park, Murray Gell-Mann, Neal Stephenson, Norbert Wiener, Norman Macrae, packet switching, pattern recognition, Paul Erdős, Paul Samuelson, phenotype, planetary scale, RAND corporation, random walk, Richard Feynman, SETI@home, social graph, speech recognition, The Theory of the Leisure Class by Thorstein Veblen, Thorstein Veblen, Turing complete, Turing machine, Von Neumann architecture

Hedi Selberg transferred her expertise to the Princeton Plasma Physics Laboratory, and Ralph Slutz became director of computing at the National Center for Atmospheric Research, in Boulder, Colorado. Richard Melville and Hewitt Crane went to the Stanford Research Institute, developing, among other things, the ERMA system for electronic clearing of machine-readable checks between banks. Dick Snyder returned to RCA, working on magnetic-core memory but unable to persuade RCA, as Zworykin had managed to with television, to take the lead. Morris Rubinoff returned to the University of Pennsylvania, and for an interval to Philco, where he supervised the design of the Philco 2000, the first fully transistorized computer, with asynchronous arithmetic, a feature that had been developed at IAS.


pages: 496 words: 162,951

We Were Soldiers Once...and Young: Ia Drang - the Battle That Changed the War in Vietnam by Harold G. Moore, Joseph L. Galloway

back-to-the-land, Berlin Wall, colonial rule, cuban missile crisis, defense in depth, Donald Davies, drop ship, friendly fire, machine readable, South China Sea

It also focuses on interrogation reports and "knowledgeability briefs" concerning 35 North Vietnamese prisoners--officers, NCOs, and line soldiers--most of whom were captured by the 1st Cavalry Division (Airmobile) during October and November 1965. In the matter of dates of death, homes of record, birthdates, and, in some cases, places of death, three books, one document, and eyewitness accounts were all utilized. The basic reference was the Casualty Information System, 1961-1981 (machine-readable record), Records of the Adjutant General's Office, Record Group 407, National Archives Building. Next, the book Vietnam Veterans Memorial: Directory of Names, published by the Vietnam Veterans Memorial Fund, Inc., Washington, D.C. (May 1991), was most helpful in crosschecking ranks, birth and death dates, and homes of record.


Frommer's San Diego 2011 by Mark Hiss

airport security, California gold rush, car-free, Charles Lindbergh, Day of the Dead, desegregation, Donald Trump, East Village, El Camino Real, gentrification, glass ceiling, machine readable, New Journalism, Norman Mailer, Skype, South of Market, San Francisco, sustainable-tourism, transcontinental railway, urban renewal, white picket fence, Works Progress Administration

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if the valid passport was issued before October 26, 2005, and includes a machine-readable zone; or if the valid passport was issued between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to http://travel.state.gov/visa. Canadian citizens may enter the United States without visas, but will need to show passports and proof of residence.


pages: 606 words: 157,120

To Save Everything, Click Here: The Folly of Technological Solutionism by Evgeny Morozov

"World Economic Forum" Davos, 3D printing, algorithmic bias, algorithmic trading, Amazon Mechanical Turk, An Inconvenient Truth, Andrew Keen, augmented reality, Automated Insights, behavioural economics, Berlin Wall, big data - Walmart - Pop Tarts, Buckminster Fuller, call centre, carbon footprint, Cass Sunstein, choice architecture, citizen journalism, classic study, cloud computing, cognitive bias, creative destruction, crowdsourcing, data acquisition, Dava Sobel, digital divide, disintermediation, Donald Shoup, driverless car, East Village, en.wikipedia.org, Evgeny Morozov, Fall of the Berlin Wall, Filter Bubble, Firefox, Francis Fukuyama: the end of history, frictionless, future of journalism, game design, gamification, Gary Taubes, Google Glasses, Ian Bogost, illegal immigration, income inequality, invention of the printing press, Jane Jacobs, Jean Tirole, Jeff Bezos, jimmy wales, Julian Assange, Kevin Kelly, Kickstarter, license plate recognition, lifelogging, lolcat, lone genius, Louis Pasteur, machine readable, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, moral panic, Narrative Science, Nelson Mandela, Nicholas Carr, packet switching, PageRank, Parag Khanna, Paul Graham, peer-to-peer, Peter Singer: altruism, Peter Thiel, pets.com, placebo effect, pre–internet, public intellectual, Ray Kurzweil, recommendation engine, Richard Thaler, Ronald Coase, Rosa Parks, self-driving car, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Skype, Slavoj Žižek, smart meter, social graph, social web, stakhanovite, Steve Jobs, Steven Levy, Stuxnet, surveillance capitalism, systems thinking, technoutopianism, TED Talk, the built environment, The Chicago School, The Death and Life of Great American Cities, the medium is the message, The Nature of the Firm, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, transaction costs, Twitter Arab Spring, urban decay, urban planning, urban sprawl, Vannevar Bush, warehouse robotics, WikiLeaks, work culture , Yochai Benkler

For all we know, since the Nazis had an enviable train system, they’d be all for making their train data universally accessible. As Yu and Robinson argue, “A government can provide ‘open data’ on politically neutral topics even as it remains deeply opaque and unaccountable. The Hungarian cities of Budapest and Szeged, for example, both provide online, machine-readable transit schedules, allowing Google Maps to route users on local trips.” Isn’t such data both open and governmental? It surely is. But it may not make Hungary any more democratic. In fact, while the country has been nudging ever closer to authoritarian rule, it might have also emerged as one of the successes of “open government.”


pages: 719 words: 181,090

Site Reliability Engineering: How Google Runs Production Systems by Betsy Beyer, Chris Jones, Jennifer Petoff, Niall Richard Murphy

"Margaret Hamilton" Apollo, Abraham Maslow, Air France Flight 447, anti-pattern, barriers to entry, business intelligence, business logic, business process, Checklist Manifesto, cloud computing, cognitive load, combinatorial explosion, continuous integration, correlation does not imply causation, crowdsourcing, database schema, defense in depth, DevOps, en.wikipedia.org, exponential backoff, fail fast, fault tolerance, Flash crash, George Santayana, Google Chrome, Google Earth, if you see hoof prints, think horses—not zebras, information asymmetry, job automation, job satisfaction, Kubernetes, linear programming, load shedding, loose coupling, machine readable, meta-analysis, microservices, minimum viable product, MVC pattern, no silver bullet, OSI model, performance metric, platform as a service, proprietary trading, reproducible builds, revision control, risk tolerance, side project, six sigma, the long tail, the scientific method, Toyota Production System, trickle-down economics, warehouse automation, web application, zero day

The config ultimately acts as a configuration layer that allows all the other components to be wired together. It’s designed to be human-readable and configurable. Auxon Configuration Language Engine acts based upon the information it receives from the Intent Config. This component formulates a machine-readable request (a protocol buffer that can be understood by the Auxon Solver. It applies light sanity checking to the configuration, and is designed to act as the gateway between the human-configurable intent definition and the machine-parseable optimization request. Auxon Solver is the brain of the tool.


Frommer's San Francisco 2012 by Matthew Poole, Erika Lenkert, Kristin Luna

airport security, Albert Einstein, Bay Area Rapid Transit, Blue Bottle Coffee, California gold rush, car-free, centre right, Chuck Templeton: OpenTable:, El Camino Real, gentrification, glass ceiling, Golden Gate Park, Haight Ashbury, high-speed rail, Loma Prieta earthquake, machine readable, Mason jar, Maui Hawaii, McDonald's hot coffee lawsuit, off-the-grid, place-making, Port of Oakland, post-work, San Francisco homelessness, sensible shoes, Silicon Valley, South of Market, San Francisco, Torches of Freedom, transcontinental railway, urban renewal, Works Progress Administration, young professional

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if the valid passport was issued before October 26, 2005, and includes a machine-readable zone; or if the valid passport was issued between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to http://travel.state.gov/visa. Canadian citizens may enter the United States without visas, but will need to show passports and proof of residence.


pages: 612 words: 187,431

The Art of UNIX Programming by Eric S. Raymond

A Pattern Language, Albert Einstein, Apple Newton, barriers to entry, bioinformatics, Boeing 747, Clayton Christensen, combinatorial explosion, commoditize, Compatible Time-Sharing System, correlation coefficient, David Brooks, Debian, Dennis Ritchie, domain-specific language, don't repeat yourself, Donald Knuth, end-to-end encryption, Everything should be made as simple as possible, facts on the ground, finite state, Free Software Foundation, general-purpose programming language, George Santayana, history of Unix, Innovator's Dilemma, job automation, Ken Thompson, Larry Wall, level 1 cache, machine readable, macro virus, Multics, MVC pattern, Neal Stephenson, no silver bullet, OSI model, pattern recognition, Paul Graham, peer-to-peer, premature optimization, pre–internet, publish or perish, revision control, RFC: Request For Comment, Richard Stallman, Robert Metcalfe, Steven Levy, the Cathedral and the Bazaar, transaction costs, Turing complete, Valgrind, wage slave, web application

To resolve this conflict, notice that it's the server's job to use the registry data, but the task of carefully error-checking that data could be handed off to another program to be run by human editors each time the registry is modified. One Unix solution would be a separate auditing program that analyzes either a machine-readable specification of the ruleset format or the source of the server code to determine the set of properties it uses, parses the Freeciv registry to determine the set of properties it provides, and prepares a difference report.[62] The aggregate of all Freeciv data files is functionally similar to a Windows registry, and even uses a syntax resembling the textual portions of registries.


pages: 661 words: 185,701

The Future of Money: How the Digital Revolution Is Transforming Currencies and Finance by Eswar S. Prasad

access to a mobile phone, Adam Neumann (WeWork), Airbnb, algorithmic trading, altcoin, bank run, barriers to entry, Bear Stearns, Ben Bernanke: helicopter money, Bernie Madoff, Big Tech, bitcoin, Bitcoin Ponzi scheme, Bletchley Park, blockchain, Bretton Woods, business intelligence, buy and hold, capital controls, carbon footprint, cashless society, central bank independence, cloud computing, coronavirus, COVID-19, Credit Default Swap, cross-border payments, cryptocurrency, deglobalization, democratizing finance, disintermediation, distributed ledger, diversified portfolio, Dogecoin, Donald Trump, Elon Musk, Ethereum, ethereum blockchain, eurozone crisis, fault tolerance, fiat currency, financial engineering, financial independence, financial innovation, financial intermediation, Flash crash, floating exchange rates, full employment, gamification, gig economy, Glass-Steagall Act, global reserve currency, index fund, inflation targeting, informal economy, information asymmetry, initial coin offering, Internet Archive, Jeff Bezos, Kenneth Rogoff, Kickstarter, light touch regulation, liquidity trap, litecoin, lockdown, loose coupling, low interest rates, Lyft, M-Pesa, machine readable, Mark Zuckerberg, Masayoshi Son, mobile money, Money creation, money market fund, money: store of value / unit of account / medium of exchange, Network effects, new economy, offshore financial centre, open economy, opioid epidemic / opioid crisis, PalmPilot, passive investing, payday loans, peer-to-peer, peer-to-peer lending, Peter Thiel, Ponzi scheme, price anchoring, profit motive, QR code, quantitative easing, quantum cryptography, RAND corporation, random walk, Real Time Gross Settlement, regulatory arbitrage, rent-seeking, reserve currency, ride hailing / ride sharing, risk tolerance, risk/return, Robinhood: mobile stock trading app, robo advisor, Ross Ulbricht, Salesforce, Satoshi Nakamoto, seigniorage, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, smart contracts, SoftBank, special drawing rights, the payments system, too big to fail, transaction costs, uber lyft, unbanked and underbanked, underbanked, Vision Fund, Vitalik Buterin, Wayback Machine, WeWork, wikimedia commons, Y Combinator, zero-sum game

Alipay’s success in resolving the lack of trust between transacting parties resulted in its rapid and tremendous growth, which soon led to its adoption even on other platforms outside the Alibaba ecosystem. Alipay has played a key role in innovations such as the QR code–based payment technology that has put the means of payment in the hands of the customer (in the form of a mobile phone) and requires the merchant only to have a QR reader (QR code stands for “Quick Response code,” a machine-readable matrix bar code). This allows merchants to process payments even if they are off-line or lack a stable internet or mobile phone connection. QR readers are also markedly cheaper to set up and maintain than the point-of-sale processors associated with debit and credit cards. Alipay’s success has inspired competition.


pages: 743 words: 201,651

Free Speech: Ten Principles for a Connected World by Timothy Garton Ash

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Aaron Swartz, activist lawyer, Affordable Care Act / Obamacare, Andrew Keen, Apple II, Ayatollah Khomeini, battle of ideas, Berlin Wall, bitcoin, British Empire, Cass Sunstein, Chelsea Manning, citizen journalism, Citizen Lab, Clapham omnibus, colonial rule, critical race theory, crowdsourcing, data science, David Attenborough, digital divide, digital rights, don't be evil, Donald Davies, Douglas Engelbart, dual-use technology, Edward Snowden, Etonian, European colonialism, eurozone crisis, Evgeny Morozov, failed state, Fall of the Berlin Wall, Ferguson, Missouri, Filter Bubble, financial independence, Firefox, Galaxy Zoo, George Santayana, global village, Great Leap Forward, index card, Internet Archive, invention of movable type, invention of writing, Jaron Lanier, jimmy wales, John Markoff, John Perry Barlow, Julian Assange, Laura Poitras, machine readable, machine translation, Mark Zuckerberg, Marshall McLuhan, Mary Meeker, mass immigration, megacity, mutually assured destruction, national security letter, Nelson Mandela, Netflix Prize, Nicholas Carr, obamacare, Open Library, Parler "social media", Peace of Westphalia, Peter Thiel, power law, pre–internet, profit motive, public intellectual, RAND corporation, Ray Kurzweil, Ronald Reagan, semantic web, Sheryl Sandberg, Silicon Valley, Simon Singh, Snapchat, social graph, Stephen Fry, Stephen Hawking, Steve Jobs, Steve Wozniak, Streisand effect, technological determinism, TED Talk, The Death and Life of Great American Cities, The Wisdom of Crowds, Tipper Gore, trolley problem, Turing test, We are Anonymous. We are Legion, WikiLeaks, World Values Survey, Yochai Benkler, Yom Kippur War, yottabyte

As your supermarket food packet is supposed to tell you what’s in it, so the metadata tag should tell you who originated, first published and subsequently changed the story you’re reading online, and the journalistic code of practice (if any) the originating or republishing platform adheres to. In 2012, the New York Times introduced rNews, a new standard for embedding machine-readable publishing metadata into HTML documents’, and similar schema.org tags have been developed with the backing of major internet companies.33 Then there is the idea of a more general sort of kitemarking, so that you know what kind of speech store you are visiting. Is it an organic foods delicatessen, a supermarket, a corner store or an unauthorised street vendor’s stall?


pages: 894 words: 190,485

Write Great Code, Volume 1 by Randall Hyde

AltaVista, business process, Donald Knuth, John von Neumann, level 1 cache, locality of reference, machine readable, Von Neumann architecture, Y2K

Character Representation Although computers are famous for their “number-crunching” capabilities, the truth is that most computer systems process character data far more often than numbers. Given the importance of character manipulation in modern software, a thorough understanding of character and string data is necessary if you’re going to write great code. The term character refers to a human or machine-readable symbol that is typically a nonnumeric entity. In general, a character is any symbol that you can type on a keyboard or display on a video display. Note that in addition to alphabetic characters, character data includes punctuation symbols, numeric digits, spaces, tabs, carriage returns (the enter key), other control characters, and other special symbols.


pages: 1,085 words: 219,144

Solr in Action by Trey Grainger, Timothy Potter

business intelligence, cloud computing, commoditize, conceptual framework, crowdsourcing, data acquisition, data science, en.wikipedia.org, failed state, fault tolerance, finite state, full text search, functional programming, glass ceiling, information retrieval, machine readable, natural language processing, openstreetmap, performance metric, premature optimization, recommendation engine, web application

The only difference between the Term and the Raw query parsers is that the Raw query parser searches for the exact token in the Solr index, but the Term query parser searches for the readable version of the term. In certain kinds of fields, such as numeric fields that internally store values in a trie structure for greater search efficiency, the Term query parser will accept the readable version of the number (1.5), whereas the Raw query parser will accept the machine-readable version (the internal representation of the field in the index). The number 1 in an integer field may be represented by a trie structure in the Solr index with a token such as `#8;#0;#0;#0;#1;. The following queries would both return a document containing the integer value 1. {!term f=myintfield}1 {!


pages: 388 words: 211,314

Frommer's Washington State by Karl Samson

airport security, British Empire, California gold rush, centre right, company town, flying shuttle, Frank Gehry, glass ceiling, global village, Great Leap Forward, land bank, machine readable, place-making, sustainable-tourism, Tacoma Narrows Bridge, transcontinental railway, white picket fence

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if the valid passport was issued before October 26, 2005, and includes a machine-readable zone; or if the valid passport was issued between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to http://travel.state.gov/visa. Canadian citizens may enter the United States without visas, but will need to show passports and proof of residence.


pages: 968 words: 224,513

The Art of Assembly Language by Randall Hyde

Donald Knuth, Free Software Foundation, machine readable, P = NP, p-value, sorting algorithm, Von Neumann architecture, Y2K

This generally produces more accurate results and requires far less silicon than having a separate coprocessor that supports decimal arithmetic. 2.14 Characters Perhaps the most important data type on a personal computer is the character data type. The term character refers to a human or machine-readable symbol that is typically a nonnumeric entity. In general, the term character refers to any symbol that you can normally type on a keyboard (including some symbols that may require multiple key presses to produce) or display on a video display. Many beginners often confuse the terms character and alphabetic character.


pages: 420 words: 219,075

Frommer's New Mexico by Lesley S. King

Albert Einstein, clean water, company town, Day of the Dead, El Camino Real, machine readable, off-the-grid, place-making, post-work, quantum cryptography, Ronald Reagan, SpaceShipOne, sustainable-tourism, trade route, Virgin Galactic, X Prize

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if the valid passport was issued before October 26, 2005, and includes a machine-readable zone; or if the valid passport was issued between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to www.travel.state.gov/visa. Canadian citizens may enter the United States without visas, but will need to show passports and proof of residence.


pages: 678 words: 216,204

The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler

affirmative action, AOL-Time Warner, barriers to entry, bioinformatics, Brownian motion, business logic, call centre, Cass Sunstein, centre right, clean water, commoditize, commons-based peer production, dark matter, desegregation, digital divide, East Village, Eben Moglen, fear of failure, Firefox, Free Software Foundation, game design, George Gilder, hiring and firing, Howard Rheingold, informal economy, information asymmetry, information security, invention of radio, Isaac Newton, iterative process, Jean Tirole, jimmy wales, John Markoff, John Perry Barlow, Kenneth Arrow, Lewis Mumford, longitudinal study, machine readable, Mahbub ul Haq, market bubble, market clearing, Marshall McLuhan, Mitch Kapor, New Journalism, optical character recognition, pattern recognition, peer-to-peer, power law, precautionary principle, pre–internet, price discrimination, profit maximization, profit motive, public intellectual, radical decentralization, random walk, Recombinant DNA, recommendation engine, regulatory arbitrage, rent-seeking, RFID, Richard Stallman, Ronald Coase, scientific management, search costs, Search for Extraterrestrial Intelligence, SETI@home, shareholder value, Silicon Valley, Skype, slashdot, social software, software patent, spectrum auction, subscription business, tacit knowledge, technological determinism, technoutopianism, The Fortune at the Bottom of the Pyramid, the long tail, The Nature of the Firm, the strength of weak ties, Timothy McVeigh, transaction costs, vertical integration, Vilfredo Pareto, work culture , Yochai Benkler

The person or small group starts by developing a part of this project, up to a point where the whole utility--if it is simple enough--or some important part of it, is functional, though it might have much room for improvement. At this point, the person makes the program freely available to others, with its source code--instructions in a human-readable language that explain how the software does whatever it does when compiled into a machine-readable language. When others begin [pg 67] to use it, they may find bugs, or related utilities that they want to add (e.g., the photo-retouching software only increases size and sharpness, and one of its users wants it to allow changing colors as well). The person who has found the bug or is interested in how to add functions to the software may or may not be the best person in the world to actually write the software fix.


Seeking SRE: Conversations About Running Production Systems at Scale by David N. Blank-Edelman

Affordable Care Act / Obamacare, algorithmic trading, AlphaGo, Amazon Web Services, backpropagation, Black Lives Matter, Bletchley Park, bounce rate, business continuity plan, business logic, business process, cloud computing, cognitive bias, cognitive dissonance, cognitive load, commoditize, continuous integration, Conway's law, crowdsourcing, dark matter, data science, database schema, Debian, deep learning, DeepMind, defense in depth, DevOps, digital rights, domain-specific language, emotional labour, en.wikipedia.org, exponential backoff, fail fast, fallacies of distributed computing, fault tolerance, fear of failure, friendly fire, game design, Grace Hopper, imposter syndrome, information retrieval, Infrastructure as a Service, Internet of things, invisible hand, iterative process, Kaizen: continuous improvement, Kanban, Kubernetes, loose coupling, Lyft, machine readable, Marc Andreessen, Maslow's hierarchy, microaggression, microservices, minimum viable product, MVC pattern, performance metric, platform as a service, pull request, RAND corporation, remote working, Richard Feynman, risk tolerance, Ruby on Rails, Salesforce, scientific management, search engine result page, self-driving car, sentiment analysis, Silicon Valley, single page application, Snapchat, software as a service, software is eating the world, source of truth, systems thinking, the long tail, the scientific method, Toyota Production System, traumatic brain injury, value engineering, vertical integration, web application, WebSocket, zero day

At our size, it is possible for ProdEng to review all incidents company-wide and identify issues that occur across teams or that might be solved by a cross-team effort. Postmortem documentation follows a specific format guided by a template in the internal wiki. We prioritize ease of use for humans over machine readability, but do also extract some automated reports. A weekly meeting is the forum for discussing recent incidents, resolutions, and future improvements. The meetings are attended by at least one representative for each incident on the agenda, ProdEng, and anyone else who wants to join. The majority of attendees are engineers directly involved in the development of the affected services.


pages: 389 words: 210,632

Frommer's Oregon by Karl Samson

airport security, Burning Man, carbon footprint, Ford Model T, Frank Gehry, glass ceiling, haute cuisine, indoor plumbing, machine readable, sustainable-tourism, transcontinental railway, upwardly mobile, urban renewal, urban sprawl, white picket fence, Works Progress Administration

Citizens of these nations also need to present a round-trip air or cruise ticket upon arrival. E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. If your passport doesn’t have this feature, you can still travel without a visa if it is a valid passport issued before October 26, 2005, and includes a machine-readable zone, or between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to http://travel.state.gov/ visa. Canadian citizens may enter the United States without visas; they will need to show passports (if traveling by air) and proof of residence, however.


pages: 496 words: 174,084

Masterminds of Programming: Conversations With the Creators of Major Programming Languages by Federico Biancuzzi, Shane Warden

Benevolent Dictator For Life (BDFL), business intelligence, business logic, business process, cellular automata, cloud computing, cognitive load, commoditize, complexity theory, conceptual framework, continuous integration, data acquisition, Dennis Ritchie, domain-specific language, Douglas Hofstadter, Fellow of the Royal Society, finite state, Firefox, follow your passion, Frank Gehry, functional programming, general-purpose programming language, Guido van Rossum, higher-order functions, history of Unix, HyperCard, industrial research laboratory, information retrieval, information security, iterative process, Ivan Sutherland, John von Neumann, Ken Thompson, Larry Ellison, Larry Wall, linear programming, loose coupling, machine readable, machine translation, Mars Rover, millennium bug, Multics, NP-complete, Paul Graham, performance metric, Perl 6, QWERTY keyboard, RAND corporation, randomized controlled trial, Renaissance Technologies, Ruby on Rails, Sapir-Whorf hypothesis, seminal paper, Silicon Valley, slashdot, software as a service, software patent, sorting algorithm, SQL injection, Steve Jobs, traveling salesman, Turing complete, type inference, Valgrind, Von Neumann architecture, web application

The stuff we know how to do is giving guesses as to what the completions might be and show you what the parameters are, and it can show you other references if it’s good, and find the definitions. It’s harder of course to find a function you don’t know the name of that does something, I mean you’re sure somewhere in this mess is a function that formats numbers in a machine-readable way and puts commas in or something like that, right? But how do you remember the name? How do you find the names of these functions? And so when people write these libraries, they try naming conventions, informal naming conventions and things like that. But a lot of that stuff just doesn’t scale very well.


The Art of Scalability: Scalable Web Architecture, Processes, and Organizations for the Modern Enterprise by Martin L. Abbott, Michael T. Fisher

always be closing, anti-pattern, barriers to entry, Bernie Madoff, business climate, business continuity plan, business intelligence, business logic, business process, call centre, cloud computing, combinatorial explosion, commoditize, Computer Numeric Control, conceptual framework, database schema, discounted cash flows, Dunning–Kruger effect, en.wikipedia.org, fault tolerance, finite state, friendly fire, functional programming, hiring and firing, Infrastructure as a Service, inventory management, machine readable, new economy, OSI model, packet switching, performance metric, platform as a service, Ponzi scheme, power law, RFC: Request For Comment, risk tolerance, Rubik’s Cube, Search for Extraterrestrial Intelligence, SETI@home, shareholder value, Silicon Valley, six sigma, software as a service, the scientific method, transaction costs, Vilfredo Pareto, web application, Y2K

D IFFERENT U SES FOR G RID C OMPUTING Build Steps There are many different types of compilers and many different processes that source code goes through to become code that can be executed by a machine. At a high level, there are either compiled languages or interpreted languages. Forget about just in time (JIT) compilers and bytecode interpreters; compiled languages are ones that the code written by the engineers is reduced to machine readable code ahead of time using a compiler. Interpreted languages use an interpreter to read the code from the source file and execute it at runtime. Here are the rudimentary steps that are followed by most compilation processes and the corresponding input/output: • In Source code 1. Preprocessing.


pages: 976 words: 235,576

The Meritocracy Trap: How America's Foundational Myth Feeds Inequality, Dismantles the Middle Class, and Devours the Elite by Daniel Markovits

8-hour work day, activist fund / activist shareholder / activist investor, affirmative action, algorithmic management, Amazon Robotics, Anton Chekhov, asset-backed security, assortative mating, basic income, Bernie Sanders, big-box store, business cycle, capital asset pricing model, Capital in the Twenty-First Century by Thomas Piketty, Carl Icahn, carried interest, collateralized debt obligation, collective bargaining, compensation consultant, computer age, corporate governance, corporate raider, crony capitalism, David Brooks, deskilling, Detroit bankruptcy, disruptive innovation, Donald Trump, Edward Glaeser, Emanuel Derman, equity premium, European colonialism, everywhere but in the productivity statistics, fear of failure, financial engineering, financial innovation, financial intermediation, fixed income, Ford paid five dollars a day, Frederick Winslow Taylor, fulfillment center, full employment, future of work, gender pay gap, gentrification, George Akerlof, Gini coefficient, glass ceiling, Glass-Steagall Act, Greenspan put, helicopter parent, Herbert Marcuse, high net worth, hiring and firing, income inequality, industrial robot, interchangeable parts, invention of agriculture, Jaron Lanier, Jeff Bezos, job automation, job satisfaction, John Maynard Keynes: Economic Possibilities for our Grandchildren, junk bonds, Kevin Roose, Kiva Systems, knowledge economy, knowledge worker, Kodak vs Instagram, labor-force participation, Larry Ellison, longitudinal study, low interest rates, low skilled workers, machine readable, manufacturing employment, Mark Zuckerberg, Martin Wolf, mass incarceration, medical residency, meritocracy, minimum wage unemployment, Myron Scholes, Nate Silver, New Economic Geography, new economy, offshore financial centre, opioid epidemic / opioid crisis, Paul Samuelson, payday loans, plutocrats, Plutonomy: Buying Luxury, Explaining Global Imbalances, precariat, purchasing power parity, rent-seeking, Richard Florida, Robert Gordon, Robert Shiller, Robert Solow, Ronald Reagan, Rutger Bregman, savings glut, school choice, shareholder value, Silicon Valley, Simon Kuznets, six sigma, Skype, stakhanovite, stem cell, Stephen Fry, Steve Jobs, stock buybacks, supply-chain management, telemarketer, The Bell Curve by Richard Herrnstein and Charles Murray, The Theory of the Leisure Class by Thorstein Veblen, Thomas Davenport, Thorstein Veblen, too big to fail, total factor productivity, transaction costs, traveling salesman, universal basic income, unpaid internship, Vanguard fund, War on Poverty, warehouse robotics, Winter of Discontent, women in the workforce, work culture , working poor, Yochai Benkler, young professional, zero-sum game

(S.D.N.Y. 2012) (“To further ensure that loans would proceed as quickly as possible to closing, Countrywide revamped the compensation structure of those involved in loan origination, basing performance bonuses solely on volume.”). the model of an assembly line: Rajan, Fault Lines, 128 (“But as investment banks put together gigantic packages of mortgages, the judgment calls became less and less important in credit assessments: after all, there was no way to code the borrower’s capacity to hold a job in an objective, machine-readable way. Indeed, recording judgment calls in a way that could not be supported by hard facts might have opened the mortgage lender to lawsuits alleging discrimination. All that seemed to matter to the investment banks and the rating agencies were the numerical credit score of the borrower and the amount of the loan relative to house value.


The Rough Guide to New York City by Martin Dunford

Anton Chekhov, Berlin Wall, Bonfire of the Vanities, Buckminster Fuller, buttonwood tree, car-free, Charles Lindbergh, Chuck Templeton: OpenTable:, clean water, colonial exploitation, colonial rule, congestion pricing, Cornelius Vanderbilt, David Sedaris, desegregation, Donald Trump, East Village, Edward Thorp, Elisha Otis, Exxon Valdez, Frank Gehry, General Motors Futurama, gentrification, glass ceiling, haute cuisine, illegal immigration, Jane Jacobs, Lewis Mumford, machine readable, market bubble, Michael Milken, Multics, Norman Mailer, paper trading, post-work, rent stabilization, retail therapy, Saturday Night Live, subprime mortgage crisis, sustainable-tourism, The Death and Life of Great American Cities, the High Line, transcontinental railway, Triangle Shirtwaist Factory, upwardly mobile, urban decay, urban planning, urban renewal, white flight, Yogi Berra, young professional

Be warned, some converters may not be able to handle certain high-wattage items, especially those with heated elements. Entry requirements Under the Visa Waiver Program, citizens of Australia, Ireland, New Zealand, and the UK do not require visas for visits to the US of ninety days or less. You will, however, need to present a machine-readable passport and a completed visa waiver form to Immigration upon arrival; the latter will be provided by your travel agent or by the airline. Canadians now require a passport to cross the border, but can travel in the US for an unlimited amount of time without a visa. For visa information, visit Wwww.travel.state.gov.


Rough Guide to San Francisco and the Bay Area by Nick Edwards, Mark Ellwood

1960s counterculture, airport security, back-to-the-land, Bay Area Rapid Transit, Blue Bottle Coffee, British Empire, Burning Man, California gold rush, carbon footprint, City Beautiful movement, Day of the Dead, El Camino Real, Electric Kool-Aid Acid Test, Fillmore Auditorium, San Francisco, gentrification, glass ceiling, Golden Gate Park, Haight Ashbury, haute cuisine, Joan Didion, Kickstarter, Loma Prieta earthquake, machine readable, Menlo Park, messenger bag, Nelson Mandela, period drama, pez dispenser, Port of Oakland, rent control, retail therapy, Ronald Reagan, Rosa Parks, San Francisco homelessness, Sand Hill Road, Silicon Valley, South of Market, San Francisco, Steve Jobs, Steve Wozniak, strikebreaker, transcontinental railway, unpaid internship, upwardly mobile, urban decay, urban planning, urban renewal, white picket fence, Works Progress Administration, young professional

Although regulations have been continually tightening up since 9/11, citizens of 27 countries, including the UK, Ireland, Australia, New Zealand, and most Western European countries, visiting the United States for a period of less than ninety days can still enter the country on the Visa Waiver Scheme. The requisite visa waiver form (I-94W) is provided by the airline during check-in or on the plane, and presented to an immigration official on arrival. However, all passports accompanying an I-94W must now be machine readable and any issued after October 2006 must include a digital chip containing biometric data (these are now automatically issued by most countries but check.) Anybody whose passport does not meet these requirements will require some sort of visa for even a short stay in America, as will anybody planning to stay over three months: check wwww.dhs .gov for updates and the list of Visa Waiver Scheme countries.


The Rough Guide to New York City by Rough Guides

3D printing, Airbnb, Bear Stearns, Berlin Wall, Bernie Madoff, bike sharing, Blue Bottle Coffee, Bonfire of the Vanities, Broken windows theory, Buckminster Fuller, buttonwood tree, car-free, centre right, Chuck Templeton: OpenTable:, clean water, collateralized debt obligation, colonial rule, congestion pricing, Cornelius Vanderbilt, crack epidemic, David Sedaris, Donald Trump, Downton Abbey, East Village, Edward Thorp, Elisha Otis, Exxon Valdez, Frank Gehry, General Motors Futurama, gentrification, glass ceiling, greed is good, haute couture, haute cuisine, Howard Zinn, illegal immigration, index fund, it's over 9,000, Jane Jacobs, junk bonds, Kickstarter, Lewis Mumford, Lyft, machine readable, Nelson Mandela, Norman Mailer, paper trading, Ponzi scheme, post-work, pre–internet, rent stabilization, ride hailing / ride sharing, Saturday Night Live, Scaled Composites, starchitect, subprime mortgage crisis, sustainable-tourism, The Death and Life of Great American Cities, the High Line, transcontinental railway, Triangle Shirtwaist Factory, uber lyft, upwardly mobile, urban decay, urban planning, urban renewal, white flight, Works Progress Administration, Yogi Berra, young professional

Once given, authorizations are valid for multiple entries into the US for around two years – it’s recommended that you submit an ESTA application as soon as you begin making travel plans (in most cases the ESTA will be granted immediately, but it can sometimes take up to 72 hours to get a response). You’ll need to present a machine-readable passport to Immigration upon arrival. Note that ESTA currently only applies to visitors arriving by air or cruise ship: crossing the land border from Canada or Mexico, those qualifying for the Visa Waiver Program do not need to apply for ESTA – instead you must fill in an I-94W form, though this may change in future.


Data Mining: Concepts and Techniques: Concepts and Techniques by Jiawei Han, Micheline Kamber, Jian Pei

backpropagation, bioinformatics, business intelligence, business process, Claude Shannon: information theory, cloud computing, computer vision, correlation coefficient, cyber-physical system, database schema, discrete time, disinformation, distributed generation, finite state, industrial research laboratory, information retrieval, information security, iterative process, knowledge worker, linked data, machine readable, natural language processing, Netflix Prize, Occam's razor, pattern recognition, performance metric, phenotype, power law, random walk, recommendation engine, RFID, search costs, semantic web, seminal paper, sentiment analysis, sparse data, speech recognition, statistical model, stochastic process, supply-chain management, text mining, thinkpad, Thomas Bayes, web application

Here, we illustrate classic problems in machine learning that are highly related to data mining. ■ Supervised learning is basically a synonym for classification. The supervision in the learning comes from the labeled examples in the training data set. For example, in the postal code recognition problem, a set of handwritten postal code images and their corresponding machine-readable translations are used as the training examples, which supervise the learning of the classification model. ■ Unsupervised learning is essentially a synonym for clustering. The learning process is unsupervised since the input examples are not class labeled. Typically, we may use clustering to discover classes within the data.


Coastal California by Lonely Planet

1960s counterculture, airport security, Albert Einstein, Asilomar, back-to-the-land, Bay Area Rapid Transit, Berlin Wall, bike sharing, Blue Bottle Coffee, buy and hold, California gold rush, call centre, car-free, carbon footprint, centre right, Chuck Templeton: OpenTable:, company town, Day of the Dead, Donner party, East Village, El Camino Real, Electric Kool-Aid Acid Test, electricity market, Frank Gehry, gentrification, global village, Golden Gate Park, Haight Ashbury, haute cuisine, illegal immigration, Joan Didion, Khyber Pass, Kickstarter, Loma Prieta earthquake, low cost airline, machine readable, Mason jar, McMansion, military-industrial complex, Neil Armstrong, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, off-the-grid, rolling blackouts, Ronald Reagan, Silicon Valley, South of Market, San Francisco, stealth mode startup, Steve Wozniak, trade route, transcontinental railway, Upton Sinclair, urban sprawl, white picket fence, women in the workforce, working poor, Works Progress Administration, young professional, Zipcar

Under the US Department of Homeland Security (DHS) registration program, US-VISIT (www.dhs.gov/us-visit), almost all visitors (excluding, for now, many Canadian, some Mexican citizens and also children under age 14) will be digitally photographed and have their electronic (inkless) fingerprints scanned upon arrival; the process typically takes just a minute. For Mexico land-border crossings, turn to Click here. For US customs for all international arrivals, Click here. For visa requirements, Click here. Passport »Under the Western Hemisphere Travel Initiative (WHTI), all travelers must have a valid machine-readable (MRP) passport when entering the USA by air, land or sea. »The only exceptions are for most US citizens and some Canadian and Mexican citizens traveling by land who can present other WHTI-compliant documents (eg pre-approved ‘trusted traveler’ cards). For details, check www.getyouhome.gov. »All foreign passports must meet current US standards and be valid for at least six months longer than your intended stay. »MRP passports issued or renewed after October 26, 2006 must be e-passports (ie have a digital photo and integrated chip with biometric data).


pages: 1,302 words: 289,469

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto

business logic, call centre, cloud computing, commoditize, database schema, defense in depth, easy for humans, difficult for computers, Firefox, information retrieval, information security, lateral thinking, machine readable, MITM: man-in-the-middle, MVC pattern, optical character recognition, Ruby on Rails, SQL injection, Turing test, Wayback Machine, web application

If this process is not carried out safely, attackers may be able to submit malicious input to interfere with the database and potentially read and write sensitive data. These attacks are described in Chapter 9, along with detailed explanations of the SQL language and how it can be used. XML Extensible Markup Language (XML) is a specification for encoding data in a machine-readable form. Like any markup language, the XML format separates a document into content (which is data) and markup (which annotates the data). Markup is primarily represented using tags, which may be start tags, end tags, or empty-element tags: <tagname> </tagname> ctagname /> Start and end tags are paired into elements and may encapsulate document content or child elements: <pet>ginger</pet> <petsxdog>spot</dogxcat>paws</catx/pets> Tags may include attributes, which are name/value pairs: <data version="2.1 "xpets> . . .


USA Travel Guide by Lonely, Planet

1960s counterculture, active transport: walking or cycling, Affordable Care Act / Obamacare, Albert Einstein, Apollo 11, Apollo 13, Asilomar, Bay Area Rapid Transit, Bear Stearns, Berlin Wall, Big bang: deregulation of the City of London, big-box store, bike sharing, Biosphere 2, Bretton Woods, British Empire, Burning Man, California gold rush, call centre, car-free, carbon footprint, centre right, Charles Lindbergh, Chuck Templeton: OpenTable:, congestion pricing, Cornelius Vanderbilt, cotton gin, cuban missile crisis, Day of the Dead, desegregation, Donald Trump, Donner party, Dr. Strangelove, East Village, edge city, El Camino Real, fake news, Fall of the Berlin Wall, feminist movement, Ford Model T, Frank Gehry, gentleman farmer, gentrification, glass ceiling, global village, Golden Gate Park, Guggenheim Bilbao, Haight Ashbury, haute couture, haute cuisine, Hernando de Soto, Howard Zinn, illegal immigration, immigration reform, information trail, interchangeable parts, intermodal, jitney, Ken Thompson, Kickstarter, license plate recognition, machine readable, Mars Rover, Mason jar, mass immigration, Maui Hawaii, McMansion, Menlo Park, military-industrial complex, Monroe Doctrine, Neil Armstrong, new economy, New Urbanism, obamacare, off grid, off-the-grid, Quicken Loans, Ralph Nader, Ralph Waldo Emerson, retail therapy, RFID, ride hailing / ride sharing, Ronald Reagan, Rosa Parks, Saturday Night Live, Silicon Valley, South of Market, San Francisco, starchitect, stealth mode startup, stem cell, supervolcano, the built environment, The Chicago School, the High Line, the payments system, three-martini lunch, trade route, transcontinental railway, union organizing, Upton Sinclair, upwardly mobile, urban decay, urban planning, urban renewal, urban sprawl, Virgin Galactic, walkable city, white flight, working poor, Works Progress Administration, young professional, Zipcar

Your passport must be valid for at least six months longer than your intended stay in the USA. Also, if your passport does not meet current US standards, you’ll be turned back at the border. If your passport was issued before October 26, 2005, it must be ‘machine readable’ (with two lines of letters, numbers and <<< at the bottom); if it was issued between October 26, 2005, and October 25, 2006, it must be machine readable and include a digital photo; and if it was issued on or after October 26, 2006, it must be an e-Passport with a digital photo and an integrated RFID chip containing biometric data. Air Airports The USA has more than 375 domestic airports, but only a baker’s dozen are the main international gateways.


Hawaii by Jeff Campbell

airport security, big-box store, California gold rush, carbon footprint, centre right, Charles Lindbergh, commoditize, company town, creative destruction, Drosophila, Easter island, G4S, haute couture, land reform, lateral thinking, low-wage service sector, machine readable, Maui Hawaii, off-the-grid, Peter Pan Syndrome, polynesian navigation, risk/return, sustainable-tourism, upwardly mobile, urban sprawl, wage slave, white picket fence

There are 35 countries currently participating; they are Andorra, Australia, Austria, Belgium, Brunei, Czech Republic, Denmark, Estonia, Finland, France, Germany, Hungary, Iceland, Ireland, Italy, Japan, South Korea, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Monaco, the Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore, Slovakia, Slovenia, Spain, Sweden, Switzerland and the UK. Under this program you must have a return ticket (or onward ticket to any foreign destination) that is nonrefundable in the USA. If your passport was issued/renewed after October 26, 2006, you need an ‘e-passport’ with digital chip; otherwise, you need a machine-readable passport. Visitors who don’t qualify for the Visa Waiver Program need a visa. Basic requirements are a valid passport, recent photo, travel details and often proof of financial stability. Students and adult males also must fill out supplemental travel documents. Those planning to travel through other countries before arriving in the USA are better off applying for their US visa in their home country rather than while on the road.


Hawaii Travel Guide by Lonely Planet

Airbnb, back-to-the-land, big-box store, bike sharing, British Empire, California gold rush, call centre, car-free, carbon footprint, Charles Lindbergh, company town, Easter island, Food sovereignty, haute cuisine, high-speed rail, James Watt: steam engine, Kula ring, land reform, Larry Ellison, machine readable, Maui Hawaii, off-the-grid, Peter Pan Syndrome, polynesian navigation, Silicon Valley, tech billionaire

Upon arrival in the USA, most foreign citizens (excluding for now, many Canadians, some Mexicans, all children under age 14 and seniors over age 79) must register with the Department of Homeland Security (DHS; www.dhs.gov), which entails having electronic (inkless) fingerprints and a digital photo taken. PASSPORTS A machine-readable passport (MRP) is required for all foreign citizens to enter the USA. Your passport must be valid for six months beyond your expected dates of stay in the USA. If your passport was issued/renewed after October 26, 2006, you need an 'e-passport' with a digital photo and an integrated chip containing biometric data.


pages: 675 words: 344,555

Frommer's Hawaii 2009 by Jeanette Foster

airport security, California gold rush, Charles Lindbergh, Easter island, glass ceiling, gravity well, haute couture, haute cuisine, indoor plumbing, machine readable, Maui Hawaii, off-the-grid, place-making, polynesian navigation, retail therapy, South China Sea, sustainable-tourism, urban renewal, urban sprawl, white picket fence, Yogi Berra

E-Passports contain computer chips capable of storing biometric information, such as the required digital photograph of the holder. (You can identify an e-Passport by the symbol on the bottom center cover of your passport.) If your passport doesn’t have this feature, you can still travel without a visa if it is a valid passport issued before October 26, 2005, and includes a machine-readable zone, or between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to www.travel.state.gov/visa. Citizens of all other countries must have (1) a valid passport that expires at least 6 months later than the scheduled end of their visit to the U.S., and (2) a tourist visa, which may be obtained without charge from any U.S. consulate.


Eastern USA by Lonely Planet

1960s counterculture, active transport: walking or cycling, Affordable Care Act / Obamacare, Albert Einstein, Apollo 11, Bear Stearns, Berlin Wall, bike sharing, Bretton Woods, British Empire, car-free, carbon footprint, centre right, Charles Lindbergh, collective bargaining, congestion pricing, Cornelius Vanderbilt, cotton gin, cuban missile crisis, Day of the Dead, desegregation, Donald Trump, East Village, fake news, Fall of the Berlin Wall, Ford Model T, Frank Gehry, gentleman farmer, gentrification, glass ceiling, Guggenheim Bilbao, haute cuisine, Hernando de Soto, illegal immigration, immigration reform, information trail, interchangeable parts, jitney, Ken Thompson, Kickstarter, license plate recognition, machine readable, Mason jar, mass immigration, McMansion, megacity, Menlo Park, Neil Armstrong, new economy, New Urbanism, obamacare, Quicken Loans, Ralph Waldo Emerson, Ronald Reagan, Rosa Parks, Saturday Night Live, Silicon Valley, Skype, the built environment, the High Line, the payments system, three-martini lunch, transcontinental railway, union organizing, Upton Sinclair, upwardly mobile, urban decay, urban planning, urban renewal, urban sprawl, walkable city, white flight, Works Progress Administration, young professional

The US State Department (www.travel.state.gov/visa) has the latest information or check with a US consulate in your home country. Visa Waiver Program & ESTA Under the US visa-waiver program, visas are not required for citizens of 36 countries – including most EU members, Japan, Australia, New Zealand and the UK – for visits of up to 90 days (no extensions allowed), as long as you can present a machine-readable passport and are approved under the Electronic System for Travel Authorization (ESTA; www.cbp.gov/esta). Note you must register at least 72 hours before arrival and there’s a $14 fee for processing and authorization. In essence, ESTA requires that you register specific information online (name, address, passport info, etc) prior to entering the US.


Caribbean Islands by Lonely Planet

Bartolomé de las Casas, big-box store, British Empire, buttonwood tree, call centre, car-free, carbon footprint, clean water, colonial rule, cuban missile crisis, discovery of the americas, Donald Trump, glass ceiling, haute cuisine, income inequality, intermodal, jitney, Kickstarter, machine readable, microcredit, off-the-grid, offshore financial centre, place-making, retail therapy, rolling blackouts, Ronald Reagan, Rubik’s Cube, Search for Extraterrestrial Intelligence, sustainable-tourism, urban planning, urban sprawl, white picket fence

Dial-A-Ride ( 776-1277) helps with transportation needs on the island. On St John, Concordia Eco-Tents (www.maho.org) provides well-regarded accessible lodging. Visas Visitors from most Western countries do not need a visa to enter the USVI if they are staying less than 90 days. This holds true as long as you can present a machine-readable passport and are approved under the Electronic System for Travel Authorization (ESTA; www.cbp.gov/esta) . Note that you must register for ESTA at least 72 hours before arrival, and there’s a US$14 fee for processing and authorization. If you do need a visa, contact your local embassy. The US State Department (www.travel.state.gov) has the latest information on admission requirements.


Frommer's California 2009 by Matthew Poole, Harry Basch, Mark Hiss, Erika Lenkert

airport security, Asilomar, Bay Area Rapid Transit, California gold rush, call centre, car-free, Charles Lindbergh, clean water, Columbine, Donald Trump, Donner party, East Village, El Camino Real, European colonialism, Frank Gehry, gentleman farmer, gentrification, Golden Gate Park, Haight Ashbury, high-speed rail, housing crisis, indoor plumbing, Joan Didion, machine readable, Mason jar, mass immigration, Maui Hawaii, post-work, retail therapy, rolling blackouts, Saturday Night Live, Silicon Valley, Skype, South of Market, San Francisco, sustainable-tourism, transcontinental railway, urban sprawl, white picket fence, Works Progress Administration, Y Combinator

E-P assports contain computer chips capable of storing biometric information, such as the r equired digital photograph of the holder. (You can identify an e-Passport by the symbol on the bottom center cover of y our passport.) If your passport doesn’t hav e this featur e, y ou can still travel without a visa if it is a v alid passport issued before October 26, 2005, and includes a machine-readable zone, or if it was issued between October 26, 2005, and October 25, 2006, and includes a digital photograph. For more information, go to www.travel.state. gov/visa. Citizens of all other countries must have (1) a v alid passpor t that expir es at least 6 months later than the scheduled end of their visit to the U.S., and (2) a tourist visa, which may be obtained without charge from any U.S. consulate.


Programming Python by Mark Lutz

Benevolent Dictator For Life (BDFL), Build a better mousetrap, business logic, business process, cloud computing, Firefox, general-purpose programming language, Google Chrome, Guido van Rossum, iterative process, linear programming, loose coupling, machine readable, MVC pattern, natural language processing, off grid, slashdot, sorting algorithm, web application

"pp 4e" <pp4e@learning-python.com>, "lu,tz" <lutz@learning-python.com>, lutz@rmi.net Finally, if you are running this live, you will also find the mail save file on your machine, containing the one message we asked to be saved in the prior session; it’s simply the raw text of saved emails, with separator lines. This is both human and machine-readable—in principle, another script could load saved mail from this file into a Python list by calling the string object’s split method on the file’s text with the separator line as a delimiter. As shown in this book, it shows up in file C:\temp\savemail.txt, but you can configure this as you like in the mailconfig module