Archive for ‘Technology’

November 17, 2012

Anachronism

old ipod

An anachronism [uh-nak-ruh-niz-uhm] is a chronological inconsistency in some arrangement, especially a juxtaposition of person(s), events, objects, or customs from different periods of time. Often the item misplaced in time is an object, but it may be a verbal expression, a technology, a philosophical idea, a musical style, a material, a custom, or anything else associated with a particular period in time so that it is incorrect to place it outside its proper temporal domain.

The intentional use of older, often obsolete cultural artifacts may be regarded as anachronistic. For example, it could be considered anachronistic for a modern-day person to wear a top hat, write with a quill, or carry on a conversation in Latin. Such choices may reflect an eccentricity, or an aesthetic preference.

read more »

November 13, 2012

Out-of-place Artifact

Anachronism

Out-of-place artifact (OOPArt) is a term coined by American naturalist and cryptozoologist Ivan T. Sanderson for an object of historical, archaeological, or paleontological interest found in a very unusual or seemingly impossible context that could challenge conventional historical chronology.

The term ‘out-of-place artifact’ is rarely used by mainstream historians or scientists. Its use is largely confined to cryptozoologists (who study big foot, the loch ness monster, and other cryptids), proponents of ancient astronaut theories, Young Earth creationists, and paranormal enthusiasts.

read more »

November 13, 2012

Uncanny Valley

uncanny

The uncanny valley is a hypothesis regarding the field of robotics. The theory holds that when robots and other facsimiles of humans look and act almost like actual humans, it causes a response of revulsion among human observers.

The ‘valley’ in question is a dip in a proposed graph of the positivity of human reaction as a function of a robot’s lifelikeness. People are not as affected in an emotional way by an object if it is easy to tell it is not human. After a certain point, they start to feel emotionally about it, but feel bad emotions because it is so nonhuman. As it gets closer to looking human, they start to feel more positive emotions towards it.

read more »

Tags:
November 12, 2012

DeltaWing

Don Panoz

The DeltaWing is a racing car designed by Ben Bowlby that debuted at the 2012 24 Hours of Le Mans.

The entry will run under the Project 56 name, composed of Ben Bowlby’s DeltaWing Racing Cars (design), Dan Gurney’s All American Racers (constructor), Duncan Dayton’s Highcroft Racing (racing team) and International Motor Sports Association owner Don Panoz (advisor). Nissan’s NISMO division is also assisting in the development of the car.

read more »

Tags: ,
November 12, 2012

Quantum Decoherence

quantum classical boundary

In quantum mechanics, quantum decoherence is the loss of coherence in a quantum superposition. Physical system—such as an electron—exists partly in all its particular, theoretically possible states (or, configuration of its properties) simultaneously; but, when measured, it gives a result corresponding to only one of the possible configurations. The act of observation collapses the multi-state wave function into a single-state particle from the perspective of the observer; and justifies the framework and intuition of classical physics as an acceptable approximation.

Decoherence is the mechanism by which the classical limit emerges out of a quantum starting point and it determines the location of the quantum-classical boundary. It occurs when a system interacts with its environment in a thermodynamically irreversible way. This prevents different elements in the quantum superposition of the system+environment’s wavefunction from interfering with each other. Decoherence has been a subject of active research since the 1980s.

read more »

November 10, 2012

Fair Use

wfud

steal like an artist

Fair use is a limitation and exception to the exclusive right granted by copyright law to the author of a creative work. Examples of fair use include commentary, search engines, criticism, news reporting, research, teaching, library archiving, and scholarship.

It provides for the legal, unlicensed citation or incorporation of copyrighted material in another author’s work under a four-factor balancing test (Purpose and character; Nature of the copied work; Amount and substantiality; and Effect upon work’s value). Along with Public Domain, Fair use is one of the ‘Traditional Safety Valves’ (techniques that balance the public’s interest in open access with the property interest of copyright owners)

read more »

Tags:
November 9, 2012

Design that Matters

design that matters

solar ear

Founded in 2001 by a team of MIT students, Design that Matters (DtM), is a nonprofit design company that partners with social entrepreneurs to design products that address basic needs in developing countries. DtM’s core competencies include ethnography, design, and engineering. DtM manages a collaborative design process through which hundreds of students and professional volunteers contribute to the design of new product and services for the poor in developing countries. DtM has completed projects in in healthcare, education, microfinance, and renewable energy.

DtM partners include the East Meets West Foundation, Solar Ear, World Education, the Center for Integration of Medicine and Innovative Technology’s Global Health Initiative (CIMIT GHI), the Centre for Mass Education in Science (CMES) in Bangladesh and the Mann Deshi Mahila Sahakari Bank in India.

read more »

Tags:
November 8, 2012

Naïve Physics

Newton

Naïve physics or folk physics is the untrained human perception of basic physical phenomena. In the field of artificial intelligence the study of naïve physics is a part of the effort to formalize the common knowledge of human beings. Many ideas of folk physics are simplifications, misunderstandings, or misperceptions of well understood phenomena, incapable of giving useful predictions of detailed experiments, or simply are contradicted by more thorough observations.

They may sometimes be true, be true in certain limited cases, be true as a good first approximation to a more complex effect, or predict the same effect but misunderstand the underlying mechanism. Naïve physics can also be defined an intuitive understanding all humans have about objects in the physical world. Cognitive psychologists are delving deeper into these phenomena with promising results. Psychological studies indicate that certain notions of the physical world are innate in all of us.

read more »

November 8, 2012

Patent Thicket

patent war

A patent thicket is ‘a dense web of overlapping intellectual property rights that a company must hack its way through in order to actually commercialize new technology,’ or, in other words, ‘an overlapping set of patent rights’ which require innovators to reach licensing deals for multiple patents from multiple sources.’ The expression may come from the ‘SCM Corp. v. Xerox Corp’ patent litigation case in the 1970s, wherein SCM’s central charge had been that Xerox constructed a ‘patent thicket’ to prevent competition. Patent thickets are used to defend against competitors designing around a single patent.

It has been suggested by some that this is particularly true in fields such as software or pharmaceuticals, but Sir Robin Jacob has pointed out that ‘every patentee of a major invention is likely to come up with improvements and alleged improvements to his invention’ and that ‘it is in the nature of the patent system itself that [patent thickets] should happen and it has always happened.’ Patent thickets are also sometimes called ‘patent floods,’ or ‘patent clusters.’

November 8, 2012

Submarine Patent

 

David Kappos

A submarine patent is a patent whose issuance and publication are intentionally delayed by the applicant for a long time, such as several years. This strategy requires a patent system where, first, patent applications are not published, and, second, patent term is measured from grant date, not from priority/filing date. In the United States, patent applications filed before November 2000 were not published and remained secret until they were granted. Analogous to a submarine, therefore, submarine patents could stay ‘under water’ for long periods until they ’emerged’ and surprised the relevant market. Persons or companies making use of submarine patents are sometimes referred to as patent pirates.

Submarine patent practice was possible previously under the United States patent law, but is no longer practical since the U.S. signed the TRIPS agreement of the WTO: since 1995, patent terms (20 years in the U.S.) are measured from the original filing or priority date, and not the date of issuance. A few potential submarine patents may result from pre-1995 filings that have yet to be granted and may remain unpublished until issuance. Submarine patents are considered by some, including the US Federal Courts, as a procedural laches (a delay in enforcing one’s rights, which may cause the rights to be lost).

November 8, 2012

Antisec

antisec

The Anti Security Movement (also written as antisec and anti-sec) is a movement opposed to the computer security industry. Antisec is against full disclosure of information relating to but not limited to: software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets, and distribution points of that information. The general thought behind this is that the computer security industry uses full disclosure to profit and develop scare-tactics to convince people into buying their firewalls, anti-virus software, and auditing services. As recently as 2009, attacks against security communities such as ‘Astalavista’ and ‘milw0rm,’ as well as the popular image-host ‘ImageShack,’ have given the movement worldwide media attention.

The ‘anti-security movement” as it is understood today was coined a document which was initially an index on the anti.security.is website: ‘The purpose of this movement is to encourage a new policy of anti-disclosure among the computer and network security communities. The goal is not to ultimately discourage the publication of all security-related news and developments, but rather, to stop the disclosure of all unknown or non-public exploits and vulnerabilities. In essence, this would put a stop to the publication of all private materials that could allow script kiddies from compromising systems via unknown methods.’

November 8, 2012

Grey Hat

L0pht

Goatse Security

A grey hat in the hacking community refers to a skilled hacker whose activities fall somewhere between white hat (lawful) and black hat (unlawful) hackers on a variety of spectra.

They usually do not hack for personal gain or have malicious intentions, but may be prepared to technically commit crimes during the course of their technological exploits in order to achieve better security. Whereas white hat hackers will tend to advise companies of security exploits quietly, grey hat hackers are prone to ‘advise the hacker community as well as the vendors and then watch the fallout.’

read more »