Tuesday, December 31, 2013

Communique

Better storyboard graphics prototype:


ƒ(Us)™ containing Persons on the left, potential future Persons on the right.

This the work of an expert visualization designer, I hope to introduce you to at some point.

© 2013 Buzz Hill


Saturday, December 28, 2013

iBank, 80's version

Bitcoin enables the Persons of ƒ(Us)™?

A Person has one share and only one share of FunctionOfUs. As such, each has the same as each other Person in the entity’s proceeds over time. Two factors change that value. One - economic synergism in the size of Us (hopefully growing) and Two - the amount of incremental Bitcoin value in the Digital Wallets Us holds divided by the current membership population.

© 2013 Buzz Hill

Thursday, December 26, 2013

Lock


The firewall provided by ƒ(Us)™ to Person (as defined):
"Unification of financial and online identity, without sacrificing anonymity"

Google the above with the quotes and discover the source of the idea.

The use within ƒ(Us)™ is the isolation of personal data, while preserving buyer/seller transaction ownership.

© 2013 Buzz Hill

Wednesday, December 25, 2013

Brain Press

First of all, Happy Birthday Jesus.

In Level 6 of the Dissolution game in Lumosity, I am noticing that I have not been paying attention to the puzzle piece outside shape. Maybe I can speed up my play using some strategy that includes it?

I'll bet that 'can't put it down' aspect of the games is by design. I hope the luminosity folks can keep the pace in company's mission.

© 2013 Buzz Hill

Tuesday, December 24, 2013

Public Scrutiny


If the eavesdropping is so pervasive, then surely large scale criminal activity is a part of the record. Think about this for a moment, why don’t leaks of certain large private firms happen. Is it true there is nothing worth unauthorized disclosure to the public?

The state of the art may belong to certain private parties now that government oversight the fallen behind. How much of a mix of design and obsolescence is probably of less importance than who is competing with the referees (government) and why.

© 2013 Buzz Hill

Saturday, December 21, 2013

Leads

A lot of bad news about the internet. Seem some nefarious parties have gone high tech.

The good news is you do not have to turn it off. The good guys have gone "techie" too.

Did you here the one about RSA's BSafe back door?

Public key encryption has been around for quite awhile. I may be a little more digging is in order.

If my understanding is correct, public key in used in highly robust encryption applications and has proven itself. Keeping the private keys private is the challenge.

© 2013 Buzz Hill

Monday, December 16, 2013

Grandma

Code named “Grandma”, the venture takes care of older folks who have special needs.

The first product is a free smartphone app the will alert appropriate parties if an older person falls. It takes  advantage of the accelerometer sensor in the smartphone to detect a fall and send alert messages.

© 2013 Buzz Hill

Friday, December 13, 2013

Engaged But Private

Lets say your personal device is an iPhone.

Because it linked it to you even while you are not using it, the iPhone causes your unique identity to be stored anonymously at one place at a particular time. Further, your privacy is protected from those who should not know.

© 2013 Buzz Hill

Wednesday, December 11, 2013

The Connected Person

Your device could automatically know when it is not close to you and take appropriate action.

• Alert sound when leaving a perimeter.
• Outgoing alert message.
• Alway from owner device state.

Does the current protocol support ADEQUATE uniqueness and security?

© 2013 Buzz Hill

Tuesday, December 10, 2013

Chrome Speak

https://www.google.com/intl/en/chrome/demos/speech.html
The following paragraph is one I wrote in TextEdit. The one following it is the Google’s Chrome output at me speaking it. Notice the error in the last word.

Checking my ability to speak with Google’s Web Speech API Demonstration. I would like to achieve a certain level a satisfaction with my daily progress. Aphasia is still my biggest obstacle but, surprisingly, the progress I have made is palpable.

Checking my ability to speak with Google's web Speech API demonstration. I would like to achieve a certain level of satisfaction with my daily progress. Aphasia is still my biggest obstacle but surprising me the progress I have a is powerful.

This took several tries. Looked like the Google technology was extraordinarily capable. And just a day into my exposure to it.

© 2013 Buzz Hill

Sunday, December 8, 2013

Siri Secret

What would make voice exercises and as much fun as luminosity.com does for non verbal brain training? I talk ‘funny’ since the stroke - strangely rather than humorous. Practice, practice, practice. With whom?

Somebody suggested to Siri not too long ago. Just now, I googled "web voice recognition". After launching Chrome, I visited the voice recognition demonstration site the Google. I am quite sure this path is am pursing is the worth my while!

I am quite surprised at the accuracy of the Google speech recognition especially with my voice. Look at its output with me reading the last sentence, "I'm surprised app for accuracy of the Google speech recognition especially with my voice".

Great things could happen with the tools I have, could have and I could make. Fun!

Click below:
https://www.google.com/intl/en/chrome/demos/speech.html

© 2013 Buzz Hill

Friday, December 6, 2013

Deja Vu Too

Ok, so I watched the "most trusted man in America" tonight. What can I say?

Had get Netflix again because said person said the Jehane Noujaim movie, "The Square" would be on, but only in selected markets. On the strength of what Jon Stewart stated - not knowing whether or not the Rose City was one of those markets - I ended up watching Portlandia on Netflix.

Now on to the task of seeing the movie and what it says about hope for Egypt ...

© 2013 Buzz Hill

Thursday, December 5, 2013

Best Private, Never Hacked?

http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/

For the 'Man in the Middle' security breach, Bitcoin is immune?

For Us, maybe there is no back door? By ƒ(Us)™ definition, one is not required? From a philosophical point of view, external agendas (to that of Persons) are not, by design, contained in Us.

But there are bound to be borderline cases that belong inside and outside the FunctionOfUs domain.  What are they and how will they be treated?

The big three in mobile (Apple, Facebook and Google) "have a horse in this race".

© 2013 Buzz Hill

Monday, December 2, 2013

Recovery of the Technology Kind

So, here it is. I am out of the woods, so-to-speak. I will continue testing but it seems I am no longer at the mercy of what I've been calling the Genieo infection.

Furthermore, I am running 10.9 (Mavericks) on the MacBook Pro I purchased in 2011.

© 2013 Buzz Hill