Submitted by brad on Mon, 2007-04-02 17:41.
The human voice is a pretty versatile instrument, and many skilled vocalists have been able to do convincing imitations of other sounds, and we’ve all heard “human beat box” artists work with a microphone to do great sounds.
That got me thinking, could we train a choir to work together to sound like anything, starting with violins, and perhaps even a piano or more?
The idea would be to get some vocalists to make lots of sounds, both pure tones and more complex ones, and break them apart with spectrum analysis. Do the same for the target sound — try to break it up into components that might be made by human vocal cords with appropriate spectrum analysis.
Then find a way to easily add the human sounds together to sound like the instrument. Each singer might focus on one of the harmonics or other tonal qualities of the instrument. Do it first in the computer, and then see if the people can do it together, without being distracted. Then work on doing the attack and decay and other artifacts of the start and end of notes.
If it all worked, it would be a fun gag for a choir to suddenly sound like a piano or violin playing a popular piece. Purer tones like a flute might be harder than complex tones. Percussion is obviously possible though it might need some amplification. Indeed, amplification to adjust the levels properly might help a lot but would be slightly more artificial than hearing this without any electronics. Who knows, perhaps a choir could even sound like an orchestra playing the opening to Beethoven’s 5th, something everybody knows well.
Submitted by brad on Sat, 2007-03-31 14:42.
My father was famously a preacher turned agnostic. We used to argue all the time about the difference between an agnostic and an athiest. I felt the difference was inconsequential, he felt it was important. And I’ve had the same argument with other proclaimed agnostics. I found an amusing way to sum up my view of it in one answer.
What is the difference between an atheist and an agnostic?
The difference is the atheist says she’s an atheist, while the agnostic says she’s an agnostic. read more »
Submitted by brad on Thu, 2007-03-29 22:32.
If you’ve looked around, you probably noticed a high-def DVD player, be it HD-DVD or Blu-Ray, is expensive. Expect to pay $500 or so unless you get one bundled with a game console where they are subsidized.
Now they won’t follow this suggestion, but the reality is they didn’t need to make the move to these new DVD formats. Regular old DVD can actually handle pretty decent HDTV movies. Not as good as the new formats, but a lot better than plain DVD. I’ve seen videos with the latest codecs that pack a quite nice HD picture into 2.5 to 3 gigabytes for an hour. I’ve even seen it in less, down to 1.5 gigabytes (actually less that SD DVDs) at 720p 24 fps, though you do notice some problems. But it’s still way better than a standard DVD. Even so, a dual layer DVD can bring about 9 gb, and a double sided dual layer DVD gives you 18gb if you are willing to flip the disk over to get at special features or the 2nd half of a very long movie. Or of course just do 2-disk sets.
Now you might feel that the DVD industry would not want to make a new slew of regular DVD players with the fancier chips in them able to do these mp4 codecs when something clearly better is around the corner. And if they did do this, it would delay adoption of whatever high def DVD format they are backing in the format wars. But in fact, these disks could have been readily playable already, with no change, for the millions who watch DVDs on laptops and media center PCs. More than will have HD DVD or Blu-Ray for some time to come, even with the boost the Playstation 3 gives to Blu-Ray. read more »
Submitted by brad on Sun, 2007-03-25 13:56.
One of my current peeves is just how much time we spend maintaining and upgrading computer operating systems, even as ordinary users. The workload for this is unacceptably high, though it’s not as though people are unaware of the problem.
Right now I’m updating one system to the beta of the new Ubuntu Feisty Fawn. (Ubuntu is the Linux distro I currently recommend.) They have done some work on building a single upgrader, which is good, but I was shocked to see an old problem resurface. In a 2 hour upgrade process, it asked me questions it didn’t need to ask me, and worse, it asked them at different times in the process. read more »
Submitted by brad on Fri, 2007-03-23 15:00.
Videophones are still an early adopter thing, but I was imagining an interesting application for them — reunions. Recently a theatre company I was in had a reunion far away, and I couldn’t come, but I wanted somebody to bring in a laptop so we could run a SIP or Skype videophone there. It would not have given me a true sense of participation, but individuals I wanted to catch up on could have come to the video phone and chatted.
Most conferencing applications assume there is going to be one big meeting with everybody talking together. That’s useful, but I can see a use for something that facilitates a lot of parallel one-on-one or small group conversations, for something like a reunion. In fact, one might be able to do a decent reunion entirely on the internet, or mostly on it. read more »
Submitted by brad on Thu, 2007-03-22 01:34.
This year’s theme for Burning Man is “the Green Man.” It represents a lot of things. For many it just is an inspiration for art centered on nature or the environment. Others are taking it as a signal to try to be better environmentally. That’s going to be a very tough road for a festival centered on building a temporary city far from everything and pyrotechnic art.
So I wrote up some thoughts on the challenges involved. The toughest problem is that transporting an entire city to the desert and then taking it back is a great personal and artistic endeavour, but not one that can be considered green. All efforts to reduce the pollution at the event are dwarfed by the fuel burned to get there. So what can be done?
Read about the problems of having a green man.
Submitted by brad on Sat, 2007-03-17 19:33.
When I watch SF TV shows, I often try to imagine a backstory that might make the story even better and SF like. My current favourite show is Battlestar Galactica, which is one of those shows where a deep mystery is slowly revealed to the audience.
So based on my own thoughts, and other ideas inspired from newsgroups, I’ve jotted down a backstory to explain the results you see in the show. Of course, much of it probably won’t end up being true, but there are hints that some of it might.
In my Battlestar Galactica back-story I explain why
- Why everybody — even the so-called humans — is a Cylon
- Who the Final 5 are and what they are doing
- Why all this has happened before and is happening again
- How the Cylons were made, and where they got their biotech
Of course, ignore this if you don’t watch the show. It’s pure fanfic/speculation.
The show remains one of the great SF TV shows, though it has been bogging down of late. This timeline may be a plea to return the show to some good hard SF roots. Posthumanism and strife between humans and AIs are hot themes in modern SF, and BSG is most interesting if it’s set in our future with things to say about the relationship between man, machine and artificial biological intelligence.
Update: I have updated the article based on the season finale, which confirmed a number of my speculations though of course not all of them.
Submitted by brad on Fri, 2007-03-16 19:00.
Apparently freeconference.com is now sending notes to its customers (one of whom forwarded an example to me) because Sprint, Cingular, Qwest and some others finally got around to blocking calls to their numbers. They pitch it as the big companies trying to block their free service so the giants can sell expensive services, and are trying to whip up support by suggesting this is akin to a network neutrality violation.
In fact, it’s an example of the big guys actually doing something right, and fixing a loophole caused by bizarre legacy telco regulation. The number you called for freeconference, and many other services, were served by telcos in rural areas such as Iowa. The phone regulations are set up so that when you make a long distance call on the PSTN, the long distance company pays the remote local phone company to complete the call. Usually that fee is about half a cent per minute in cities, and even free for cell phones. (Frankly, it should always be zero, and this should be paid for as part of my local phone fee, but that’s another story.) In Iowa, however, in order to, in theory, help pay the costs of being a phone company that has to send the call out to a lonely Iowa farmhouse, the rural telcos get to charge as much as 6 cents or more per minute to complete the call. read more »
Submitted by brad on Fri, 2007-03-16 14:24.
It’s nice to have a headset on your desk telephone, for handsfree conversations. A number of phones have a headset jack, either of the submini plug used by cell phones, or using a phone handset jack. Many companies buy headset units that plug into the handset line to provide a headset, some of them are even wireless.
But bluetooth headsets today are cheap, standardized and have a competitive market. And they are of course wireless. Many people already have them for their cell phone. I have seen a very small number of desk phones support having a bluetooth headset, and that shouldn’t be al that expensive, but it’s rare and only on high-end phones.
Here’s the idea: Put bluetooth headset support into the PBX. Bluetooth headsets can’t dial, they can effectively only go on-hook and off-hook with a single button. You would associate (in the PBX) your bluetooth headset with your desk phone. A bluetooth master would be not too far from your desk, and tied into the PBX, or into a PC that talks to the PBX. When your BT headset was in range of this master, it would be tied to ith with Bluetooth. (You would have to do an actual bluetooth pairing in advance. In addition, many people have bluetooth headsets normally linked to their cell phone, and call attempts from the headset go to the cell phone. The system would have to switch that over to the PBX.) read more »
Submitted by brad on Tue, 2007-03-13 18:35.
When I watch the boundless energy of young children, and their parents’ frustration over it, I wonder how high-tech will alter how children are raised in the next few decades. Of course already TV, and now computers play a large role, and it seems very few toys don’t talk or move on their own.
But I’ve also realized that children, both from a sense of play and due to youthful simplicity, will tolerate some technologies far before adults will. For example, making an AI to pass the Turing Test for children may be much, much simpler than making one that can fool an adult. As such, we may start to see simple AIs meant for interacting with, occupying the minds of and educating children long before we find them usable as adults.
Another technology that young children might well tolerate sooner is virtual reality. We might hate the cartoonish graphics and un-natural interfaces of today’s VRs but children don’t know the interfaces aren’t natural — they will learn any interface — and they love cartoon worlds. read more »
Submitted by brad on Mon, 2007-03-12 19:08.
I've ranted before about just how hard it has become to configure and administer computers. And there are services where you can hire sysadmins to help you, primarily aimed at novice users.
But we advanced users often need help today, too. Mostly when we run into problems we go to message boards, or do web searches and find advice on what to do. And once we get good on a package we can generally fix problems with it in no time.
I would love a service where I can trade my skill with some packages for help from others on other packages. There are some packages I know well, and could probably install for you or fix for you in a jiffy. Somebody else can do the same favour for me. In both cases we would explain what we did so the other person learned.
All of this would take place remotely, with VNC or ssh. Of course, this opens up a big question about trust. A reputation system would be a big start, but might not be enough. Of course you would want a complete log of all files changed, and how they were changed -- this service might apply more to just editing scripts and not compiling new binaries. Best of all, you could arrange to have a virtualized version of your machine around for the helper to use. After examining the differences you could apply to them to your real machine. Though in the end, you still need reputations so that people wanting to hack machines would not get into the system. They might have to be vetted as much as any outside consultant you would hire for money.
There seems a real efficiency to be had if this could be made to work. How often have you pounded for hours on something that a person skilled with the particular software could fix in minutes? How often could you do the same for others? Indeed, in many cases the person helping you might well be one of the developers of a system, who also would be learning about user problems. (Admittedly those developers would quickly earn enough credit to not have to maintain any other part of their system.)
The real tool would be truly secure operating systems where you can trust a stranger to work on one component.
Submitted by brad on Sun, 2007-03-11 19:51.
Lots of people love model airplanes, and I bet they would love to simulate dogfights. They can't fire actual projectiles, as that would be dangerous, expensive, unworkable due to the weight and actually damage planes.
It should be possible to set up a system for dogfights using light, however. One way would be to have planes mount lasers that send out a coded pulse with a bit of dispersion, and have the other planes mount receivers with diffusers to pick up light from a lot of directions. It might be better to go in reverse, the way many shooting games do -- the planes broadcast a coded pulse from some bright LED in a specific colour and the "gun" is just a narrow sight that tries to pick up these pulses. When the gun gets one, it sends it down to the coordinator on the ground, and that tells the target plane it's been hit (possibly forcing it to leave the airspace after some number of hits, or impair the flying controls, etc.)
Of course you need authenticated equipment. If people provide their own it's too easy to cheat, and one could also just make a gun that has no barrel instead of a wide one, or have one on the ground. So some honour might be required here.
It would of course be hard to do, with no cockpit view. Some larger model planes can carry small video cameras for a more realistic dogfight of that sort, but I suspect people could figure something out. The gun could have sensors for the pulses that are wider than the actual "direct hit" sensor, allowing them to tell you when you're getting close, and even showing a screen on a laptop that is not a camera view from the plane but at least a view of how close you are to the target.
Submitted by brad on Thu, 2007-03-08 20:34.
I wrote earlier about the bluetooth vibrator watch. I pushed this in part to promote the idea that phones should (almost) never ring. That ringing is rude to others and violates your own privacy, too.
Sony, Citizen and some others are now releasing bluetooth watches that go beyond this. Your watch should become a very small control station for your larger PDA/phone. Of course digital watches have a small screen, and there are also some nice analog watches where the background of the watch is secretly a screen. This should become cheaper with time.
As before, when a call comes in, your watch should gently vibrate or even just tingle your skin with a small charge. On the screen should be the caller-ID, and the buttons should be marked with choices, such as rejecting the call or accepting it. (These features will be in some of the upcoming bluetooth watches) If you accept it, the caller would hear you saying that you are getting out your real headset/handset and will talk to them in a few seconds. If you were in a meeting, they might be told it will be more than a few seconds, as you must excuse yourself from the room.
Your watch of course knows if it is on your wrist in many ways, including temperature, so the phone can know to actually ring if you’ve taken the watch off — for example when going to bed, if you want it to ring when you’re in bed, that is.
As the screens increase in resolution, they could also show things like the subject of emails and pages. No more pulling out the blackberry or cell phone — just a subtle glance at your watch when it tingles. Be nice if you can set your presence on your watch so that all calls go to voice mail, too.
Most flip phones have a 2nd small screen on them so you can see the time and caller-id when the phone is closed. This would not be needed if you use a watch like this, so the cost of the phone can be reduced to make up for the more expensive watch.
Your watch could also bind to your desk phone at the office. And the phone would also know if you are in the office or not.
Imagine a world of peace where you’re never hearing phones going off, and you aren’t seeing people constantly pulling out phones and blackberries to check calls and messages. Imagine a world where people no longer wear cell phones on their belts, either.
The watch could have a small headset in it too, but that would add bulk, and I think it’s better to pull out a dedicated one.
The only real downside to this — you would probably have to charge your watch once a week. This might not easily fit in with the smaller ladies’ watch designs. It should be possible in any larger design. E-ink technology, which takes no power to run a display, could also make a great material for the background of your watch dial, or even display a tolerable virtual watch dial for the many who prefer an analog set of hands. It might be necessary to design a protocol even lower power than bluetooth to give the watches even better battery life, and of course a standard charging interface found in hotels and offices would be great.
I think once this happens it will be hard to imagine how we tolerated it any other way. Yes, people get fun and status from their ringtones, but I think we can handle sacrificing that.
The watch could also be a mini-screen for a few other PDA and phone functions. For example, if you use a bluetooth earpiece, you can keep your phone in your pocket or purse, which is really nice, but sometimes you want a bit of display, for example to assist with voice command mode.
(Of course if you know about Voxable, you know I believe phone calls should simply not happen at all at the wrong times, but that’s a different leap.)
Submitted by brad on Thu, 2007-03-08 14:31.
I have written several times before about Peerflix — Now that I’ve started applying some tags as well as categories to my items you can now see all the Peerflix stories using that link — and the issues behind doing a P2P media trading/loaning system. Unlike my own ideas in this area, Peerflix took a selling approach. You sold and bought DVDs, initially for their own internal currency. It was 3 “Peerbux” for new releases, 2 for older ones, and 1 for bargain bin disks.
That system, however, was failing. You would often be stuck for months or more with an unpopular disk. Getting box sets was difficult. So in December they moved to pricing videos in real dollars. I found that interesting because it makes them, in a way, much closer to a specialty eBay. There are still a lot of differences from eBay — only unboxed disks are traded, they provide insurance for broken disks and most importantly, they set the price on disks.
One can trade DVDs on eBay fairy efficiently but it requires a lot of brain effort because you must put time into figuring good bid and ask prices for items of inconsequential price. Peerflix agreed that this is probably a poor idea, so they decided to set the prices. I don’t know how they set their initial prices, but it may have been by looking at eBay data or similar information. read more »
Submitted by brad on Mon, 2007-03-05 15:18.
Hey photo editing programs — I’m looking at you, Photoshop — a lot of you allow people to place text into graphic images, usually as a text layer. Most graphics with text on the web are made this way. Then we export the image as a jpeg or png/gif, flatting the layers so our artful text is displayed. This is how all the buttons with words are made, as well as the title banner graphics on most web sites.
So photo editors, when you render and flatten the layers, take the visible text (you know what it is) and include it in a tag inside the file, such as the EXIF information. Possibly as the caption if there isn’t already one. Let us disable this, including on just a single layer, but providing it would be a good default.
Then all the web spiders/search engines would be able to find that text. Web page editors could offer that text as a possible “alt” text for the graphic. And the blind would be able to have their web-page readers read to them the text embedded in graphics.
Submitted by brad on Mon, 2007-03-05 14:49.
From the shameless narcissism department: I was surprised to see myself and the EFF picked by PC World today at #12 on their 50 most important people on the web list. I’m really there as a proxy for the EFF, I suspect, but it’s great to see our work recognized. I’m pleased to say the EFF is going like gangbusters right now with so many cases under our wing, and many thousands of new members in the last year, thanks in part to the AT&T lawsuit and others. Of course every year we must repeat our fundraising efforts all over again — the vast majority of EFF money comes from individual members and donors, not from corporations much at all, and only to a small degree from foundation grants.
It’s also good to see fellow EFF board members Larry Lessig, Brewster Kahle and Dave Farber on the list, along with many other EFF friends and associates, and my Bittorrent compatriot Bram Cohen appears at #3. Of course, this and $4 will get you a cup of coffee.
Submitted by brad on Sun, 2007-03-04 19:50.
Most of us, when we travel, put appointments we will have while on the road into our calendars. And we usually enter them in local time. ie. if I have a 1pm appointment in New York, I set it for 1pm not 10am in my Pacific home time zone. While some calendar programs let you specify the time zone for an event, most people don't, and many people also don't change the time zone when they cross a border, at least not right away. (I presume that some cell phone PDAs pick up the new time from the cell network and import it into the PDA, if the network provides that.) Many PDAs don't really even let you set the time zone, just the time.
Here's an idea that's simple for the user. Most people put their flights into their calendars. In fact, most of the airline web sites now let you download your flight details right into your calendar. Those flight details include flight times and the airport codes.
So the calendar software should notice the flight, look up the destination airport code, and trigger a time zone change during the flight. This would also let the flight duration look correct in the calendar view window, though it would mean some "days" would be longer than others, and hours would repeat or be missing in the display.
You could also manually enter magic entries like "TZ to PST" or similar which the calendar could understand as a command to change the zone at that time.
Of course, I could go on many long rants about the things lacking from current calendar software, and perhaps at some point I will, but this one struck me as interesting because, in the downloaded case, the UI for the user is close to invisible, and I always like that.
It becomes important when we start importing our "presence" from our calendar, or get alerts from our devices about events, we don't want these things to trigger in the wrong time zone.
Submitted by brad on Sat, 2007-03-03 23:07.
I have written before how future technology affects our privacy decisions today. DNA collection is definitely one of these areas. As you may know, law enforcement in the USA is now collecting DNA from people convicted of crimes, and even those arrested in a number of jurisdictions — with no ability to expunge the data if not found guilty. You may feel this doesn’t affect you, as you have not been arrested.
As DNA technology grows, bioinformatics software is becoming able to determine that a sample of DNA is a “near match” for somebody in a database. For example, they might determine that a person in the database is not the source of the DNA being studied, but is a relative of that person.
In a recent case, a DNA search turned up not the perpetrator, but his brother. They investigated the male relatives of the brother and found and convicted the man in question. read more »
Submitted by brad on Thu, 2007-03-01 23:46.
I was discussing his Zphone encrypting telephone system with Phil Zimmermann today. In his system, phone calls are encrypted with opportunistic, certificateless cryptography, which I applaud because it allows zero user interface and not centralization. It is vulnerable to “man in the middle” attacks if the MITM can be present in all communications.
His defence against MITM is to allow the users of the system to do a spoken authentication protocol at any time in their series of conversations. While it’s good to do it on the first call, his system works even when done later. In their conversation, they can, using spoken voice, read off a signature of the crypto secrets that are securing their conversation. The signatures must match — if they don’t, a man-in-the-middle is possibly interfering.
I brought up an attack he had thought of and called the Rich Little attack, involving impersonation with a combination of a good voice impersonation actor and hypothetical computerized speech modification that turns a good impersonator into a near perfect one. Phil believes that trying to substitute voice in a challenge that can come at any time, in any form, in any conversation is woefully impractical.
A small amount of thought made me produce this attack: Two impersonators. Early on in a series of conversations, the spy agency trying to break in brings in two impersonators who have listened to Alice and Bob respectively (we are hearing their calls) and learned their mannerisms. A digital audio processor helps convert the tones of their voice. That’s even easier on an 8khz channel. read more »
Submitted by brad on Wed, 2007-02-28 01:58.
As you may know, if you buy a cell phone today, you have to sign up for a 1 or 2 year contract, and you get a serious discount on the phone, often as much as $200. The stores that sell the phones get paid this subsidy when they sell to you, if you buy from a carrier you just get a discount. The subsidy phones are locked so you can’t go and take them to another carrier, though typically you can get them unlocked for a modest fee either by the carrier or unlock shops.
The phones are locked in a different way, in that this subsidy pretty much makes everybody buy their phone through a carrier. Since you are going to sign up with a carrier for a year or two anyway, you would be stupid not to. And except for prepaid, signing up even without a subsidy phone still requires a contract, you just don’t get anything for it.
Because of this, it is carriers that shop for phones, not consumers. The carriers tell the handset makers what to provide, and quite often, what not to provide. Subsidy phones tend to come with features disabled, such as bluetooth access for your laptop to sync the address book or connect to the internet. A number of PDA phones are sold with 802.11 access in them in Europe, but this feature is removed for the U.S. market. The carriers don’t want you using 802.11 to bypass their per minute fees, or they want to regulate your data use.
This method of selling phones is the biggest crippler of the cell phone industry. If consumers bought phones directly, there would be more competition and more features. But less control by the carriers.
That’s the only reason I can think of why they don’t do what seems obvious to me. If you walk up to a carrier and say you will sign the 2 year contract, but want to bring your own phone, they should be very happy to hear that and give you the subsidy. They can give it to you as a $10 discount for 20 months instead of $200 all at once and it would actually be cheaper for them.
This would allow a much better resale market in used phones, and allow new and innovative phones — even open source homebuilt phones. Competition and free markets means innovation.
They could even exercise some control if they truly needed to. They need not let you just bring in any phone, they could still specify which ones are approved. I think that would be stupid, but they could do it. However, this would still not let them so easily control what applications you could get on the phone. For example, one reason they disabled bluetooth features (other than headset) on many phones is they wanted you to pay their fees to download your apps and photos over the network, not just sync them up to your computer for free. An open phone market would deprive them of that revenue.
So frankly, if they are so worried about just these revenue issues, then give me less subsidy. Figure out what you’re losing by letting me have my choice of phone, and take it out of the subsidy. I can still put in my choice of phone today if I am willing to pay the extra $200, but of course few want to do that, so there’s no market for such phones. This would improve that.
There must be some number which makes this work, and the innovation generated would benefit the carriers in the long run. In Asia, subsidies have largely gone away, and there is word this trend may be moving to Europe, where at least carriers are happy to have 802.11 in their phones. Let’s hope.