robertogreco — This is how I read

robertogreco — This is how I read

James Bridle tells us to “Stop Lying About What You Do” and in doing so, he describes how I read.

I don’t read like I used to—although that’s not necessarily a bad thing. I rarely finish books. I’ve always had a habit of abandoning novels 50-100 pages before the end. I don’t know why, I’ve always done that. I think I’m doing it more and I don’t mind because I think my critical senses have improved and by eradicating book guilt I’ve reached a point where I am happy to cast things aside. I read 5, 10 books at once. I read them on paper and electronically as the mood takes me.

I read with continuous partial attention and I don’t care that I am frequently interrupting my own reading. I despise the discourse that says we are all shallow, that we are all flighty, distracted, not paying attention. I am paying attention, but I am paying attention to everything, and even if my knowledge is fragmented and hard to synthesise it is wider, and it plays in a vaster sphere, than any knowledge that has gone before.

About a year later, he repeats:

I read books, but I don’t finish them. Let’s stop pretending. My reading and the wobbly tower of ideas built alongside and atop it is not a street, a line, it’s a topology, a crystal growing in space, layering the insides of the seizure and projecting into it. It is counterproductive to suggest otherwise.

There is nothing more to add.

Science Fiction-Media in Transition

Science Fiction-Media in Transition

Butler
: I don’t have access to this kind of thing on computer but, oddly enough, what you’re talking about sounds very much like the way I start looking for ideas when I’m not working on anything. Or when I’m just letting myself drift, relax.

I generally have four or five books open around the house—I live alone; I can do this—and they are not books on the same subject. They don’t relate to each other in any particular way, and the ideas they present bounce off one another. And I like this effect.

I also listen to audio-books, and I’ll go out for my morning walk with tapes from two very different audio-books, and let those ideas bounce off each other, simmer, reproduce in some odd way, so that I come up with ideas that I might not have come up with if I had simply stuck to one book until I was done with it and then gone and picked up another.

So, I guess, in that way, I’m using a kind of primitive hypertext.

The current state of machine intelligence 2.0 – O’Reilly Media

The current state of machine intelligence 2.0 – O’Reilly Media

A year ago today, I published my original attempt at mapping the machine intelligence ecosystem. So much has happened since.

I spent the last 12 months geeking out on every company and nibble of information I can find, chatting with hundreds of academics, entrepreneurs, and investors about machine intelligence. This year, given the explosion of activity, my focus is on highlighting areas of innovation, rather than on trying to be comprehensive.

Despite the noisy hype, which sometimes distracts, machine intelligence is already being used in several valuable ways. Machine intelligence already helps us get the important business information we need more quickly, monitors critical systems, feeds our population more efficiently, reduces the cost of health care, detects disease earlier, and so on.

The two biggest changes I’ve noted since I did this analysis last year are
(1) the emergence of autonomous systems in both the physical and virtual world
and (2) startups shifting away from building broad technology platforms to focusing on solving specific business problems.

Hypertext Transfer Protocol (HTTP) Status Code Registry

Hypertext Transfer Protocol (HTTP) Status Code Registry

Registry included below

HTTP Status Codes

Registration Procedure(s)
IETF Review
Reference
[RFC7231]
Note
1xx: Informational - Request received, continuing process
2xx: Success - The action was successfully received, understood, and accepted
3xx: Redirection - Further action must be taken in order to complete the request
4xx: Client Error - The request contains bad syntax or cannot be fulfilled
5xx: Server Error - The server failed to fulfill an apparently valid request
Available Formats

CSV
Value Description Reference
100 Continue [RFC7231, Section 6.2.1]
101 Switching Protocols [RFC7231, Section 6.2.2]
102 Processing [RFC2518]
103-199 Unassigned
200 OK [RFC7231, Section 6.3.1]
201 Created [RFC7231, Section 6.3.2]
202 Accepted [RFC7231, Section 6.3.3]
203 Non-Authoritative Information [RFC7231, Section 6.3.4]
204 No Content [RFC7231, Section 6.3.5]
205 Reset Content [RFC7231, Section 6.3.6]
206 Partial Content [RFC7233, Section 4.1]
207 Multi-Status [RFC4918]
208 Already Reported [RFC5842]
209-225 Unassigned
226 IM Used [RFC3229]
227-299 Unassigned
300 Multiple Choices [RFC7231, Section 6.4.1]
301 Moved Permanently [RFC7231, Section 6.4.2]
302 Found [RFC7231, Section 6.4.3]
303 See Other [RFC7231, Section 6.4.4]
304 Not Modified [RFC7232, Section 4.1]
305 Use Proxy [RFC7231, Section 6.4.5]
306 (Unused) [RFC7231, Section 6.4.6]
307 Temporary Redirect [RFC7231, Section 6.4.7]
308 Permanent Redirect [RFC7538]
309-399 Unassigned
400 Bad Request [RFC7231, Section 6.5.1]
401 Unauthorized [RFC7235, Section 3.1]
402 Payment Required [RFC7231, Section 6.5.2]
403 Forbidden [RFC7231, Section 6.5.3]
404 Not Found [RFC7231, Section 6.5.4]
405 Method Not Allowed [RFC7231, Section 6.5.5]
406 Not Acceptable [RFC7231, Section 6.5.6]
407 Proxy Authentication Required [RFC7235, Section 3.2]
408 Request Timeout [RFC7231, Section 6.5.7]
409 Conflict [RFC7231, Section 6.5.8]
410 Gone [RFC7231, Section 6.5.9]
411 Length Required [RFC7231, Section 6.5.10]
412 Precondition Failed [RFC7232, Section 4.2]
413 Payload Too Large [RFC7231, Section 6.5.11]
414 URI Too Long [RFC7231, Section 6.5.12]
415 Unsupported Media Type [RFC7231, Section 6.5.13][RFC7694, Section 3]
416 Range Not Satisfiable [RFC7233, Section 4.4]
417 Expectation Failed [RFC7231, Section 6.5.14]
418-420 Unassigned
421 Misdirected Request [RFC7540, Section 9.1.2]
422 Unprocessable Entity [RFC4918]
423 Locked [RFC4918]
424 Failed Dependency [RFC4918]
425 Unassigned
426 Upgrade Required [RFC7231, Section 6.5.15]
427 Unassigned
428 Precondition Required [RFC6585]
429 Too Many Requests [RFC6585]
430 Unassigned
431 Request Header Fields Too Large [RFC6585]
432-450 Unassigned
451 Unavailable For Legal Reasons [RFC7725]
452-499 Unassigned
500 Internal Server Error [RFC7231, Section 6.6.1]
501 Not Implemented [RFC7231, Section 6.6.2]
502 Bad Gateway [RFC7231, Section 6.6.3]
503 Service Unavailable [RFC7231, Section 6.6.4]
504 Gateway Timeout [RFC7231, Section 6.6.5]
505 HTTP Version Not Supported [RFC7231, Section 6.6.6]
506 Variant Also Negotiates [RFC2295]
507 Insufficient Storage [RFC4918]
508 Loop Detected [RFC5842]
509 Unassigned
510 Not Extended [RFC2774]
511 Network Authentication Required [RFC6585]
512-599 Unassigned

The Shape of Things — Welcome to Thington — Medium

The Shape of Things — Welcome to Thington — Medium

In particular I want to talk about the relationship we’re starting to build between physical network-connected objects and some kind of software or service layer that sits alongside them, normally interacted with via a mobile phone.

I think we all forget how quickly things can change, but I think it’s fair to say that the era of the modern smart-phone starts with the iPhone, and it’s really important to remember that only launched a little under nine years ago. This by the way, is the very first advert for the iPhone which essentially replaced single use telephones with general purpose computers connected to the phone network.

Three years after the iPhone launched — so about six years ago now — in addition to all of the desktop and laptop computers we were buying, we were also buying 150 million smart phones a year.

Five years later — 2016 — and it’s projected that 1.6 billion smartphones will be sold. In one single year, one smart phone will be bought for every five people on the planet.

But what happens next? A world of connected objects.

 

A novel approach to war | ASU Now: Access, Excellence, Impact

A novel approach to war | ASU Now: Access, Excellence, Impact

Fiction is a way to explore future worlds, what-if’s. Though Singer is an author of multiple bestselling books on war, this is his first novel. It is no mere flight of the imagination, however: The book has nearly 400 footnotes.

“We (he and co-author August Cole) grew up reading Tom Clancy, Michael Crichton, and we wanted to re-create that experience for people, that sort of fun summer read,” he said. And as for those footnotes? “We’re defense wonks; we set out to write a very different type of book.”

Fiction allows us to explore how our attitudes might change and to wrestle with issues.

“Will 3-D printing do to the defense industry what the iPod did to the music industry, totally disrupt it?” Singer asked. “… What would a state-on-state war look like in the 21st century?”

And fiction also helps with information dissemination: People in power are more likely to read a novel than a white paper or policy report.