How Google does it

If you came on US Patent #7508978 you might stifle a yawn. Certainly you’d never suspect that it might be a design for radically changing our communications environment. Here’s what the Abstract says:

Detection of grooves in scanned images

A system and method locate a central groove in a document such as a book, magazine, or catalog. In one implementation, scores are generated for points in a three-dimensional image that defines a surface of the document. The scores quantify a likelihood that a particular point is in the groove. The groove is then detected based on the scores. For example, lines may be fitted through the points and a value calculated for the lines based on the scores. The line corresponding to the highest calculated value may be selected as the line that defines the groove.

Eh? And yet it turns out that this is the basis for Google’s amazingly efficient book-scanning technology.
In a lovely blog post, Maureen Clements explains how:

Turns out, Google created some seriously nifty infrared camera technology that detects the three-dimensional shape and angle of book pages when the book is placed in the scanner. This information is transmitted to the OCR software, which adjusts for the distortions and allows the OCR software to read text more accurately. No more broken bindings, no more inefficient glass plates. Google has finally figured out a way to digitize books en masse. For all those who’ve pondered “How’d They Do That?” you finally have an answer.

LATER: How the Internet Archive scans books. As you can see from the movie, it’s pretty labour-intensive, despite the robotics.

The Two Cultures: fifty years on

This morning’s Observer column.

…Over the years, Snow’s meme has been subjected to criticism and abuse, but the idea of mutually uncomprehending cultures still seems relevant to understanding why important segments of our society are struggling to come to terms with a networked world. In our case, the gap is not between the humanities and the sciences but those who are obsessed with lock-down and control, on the one hand, and those who celebrate openness and unfettered creativity on the other. The odd thing is that one finds arts and scientific types on both sides of this divide….

Google extends its flu-monitoring service to Mexico

One of the most intriguing revelations of the last year was the news that Google could use aggregated search data to track — and perhaps predict — outbreaks of influenza. The graph shows results for the US. CDC data come from surveying a sample population of doctors, but the results take time to collate, whereas Google’s data are nearly instantaneous. So even if the search-derived data were only a day or two ahead of the official stats they could be useful to public health authorities in some circumstances.

Now the NYT is reporting that Google has extended the service to Mexico. One reading of the data is that the outbreak has peaked there. But that might simply be a reflection of the fact that an awful lot of Mexicans don’t have internet access.

Interesting video here.

I — and others — have written about this before: see, e.g. here, here and here.

On this day…

… in 1945, the Soviet Union announced the fall of Berlin and the Allies announced the surrender of Nazi troops in Italy and parts of Austria.

40 years on

Today, the Open University has added a new album to its iTunesU site to mark the fact that the packet-switched network, like the OU itself, is 40 years old this year. The album is a compilation of interviews we’ve done over the years with various Internet pioneers like Vint Cerf, Don Davies and Ray Tomlinson (the inventor of email). The whole shebang is headed by an overview interview with me. Sufferers from insomnia can find it here.

US begins to get its act together on cyberattack

A panel of experts deliberating under the auspices of the National Science Foundation has come up with a report which is highly critical of the US’s approach to the threat of cyberattack and has issued this list of recommendations:

1. The United States should establish a public national policy regarding cyberattack for all sectors of government, including but not necessarily limited to the Departments of Defense, State, Homeland Security, Treasury, and Commerce; the intelligence community; and law enforcement. The senior leadership of these organizations should be involved in formulating this national policy.
2. The U.S. government should conduct a broad, unclassified national debate and discussion about cyberattack policy, ensuring that all parties—particularly Congress, the professional military, and the intelligence agencies—are involved in discussions and are familiar with the issues.
3. The U.S. government should work to find common ground with other nations regarding cyberattack. Such common ground should include better mutual understanding regarding various national views of cyberattack, as well as measures to promote transparency and confidence building.
4. The U.S. government should have a clear, transparent, and inclusive decision- making structure in place to decide how, when, and why a cyberattack will be conducted.
5. The U.S. government should provide a periodic accounting of cyberattacks undertaken by the U.S. armed forces, federal law enforcement agencies, intelligence agencies, and any other agencies with authorities to conduct such attacks in sufficient detail to provide decision makers with a more comprehensive understanding of these activities. Such a periodic accounting should be made available both to senior decision makers in the executive branch and to the appropriate congressional leaders and committees.
6. U.S. policy makers should judge the policy, legal, and ethical significance of launching a cyberattack largely on the basis of both its likely direct effects and its indirect effects.
7. U.S. policy makers should apply the moral and ethical principles underlying the law of armed conflict to cyberattack even in situations that fall short of actual armed conflict.
8. The United States should maintain and acquire effective cyberattack capabilities. Advances in capabilities should be continually factored into policy development, and a comprehensive budget accounting for research, development, testing, and evaluation relevant to cyberattack should be available to appropriate decision makers in the executive and legislative branches.
9. The U.S. government should ensure that there are sufficient levels of personnel trained in all dimensions of cyberattack, and that the senior leaders of government have more than a nodding acquaintance with such issues.
10. The U.S. government should consider the establishment of a government-based institutional structure through which selected private sector entities can seek immediate relief if they are the victims of cyberattack.
11. The U.S. government should conduct high-level wargaming exercises to understand the dynamics and potential consequences of cyberconflict.
12. Foundations and government research funders should support academic and think- tank inquiry into cyberconflict, just as they have supported similar work on issues related to nuclear, biological, and chemical weapons.

According to the NYT report,

The United States has no clear military policy about how the nation might respond to a cyberattack on its communications, financial or power networks, a panel of scientists and policy advisers warned Wednesday, and the country needs to clarify both its offensive capabilities and how it would respond to such attacks.

The NYT report also suggests that the US doesn’t rule out the use of nukes in retaliation to a cyberattack, but then goes on to quote Pentagon officials as saying that this is nothing new. The US, it seems, never rules out anything. This is apparently to keep potential aggressors guessing.**

Text of the Executive Summary of the NSF report (pdf) from here.

** Footnote: this didn’t deter Osama bin Laden & Co, though.

Coming soon — an Android NetBook?

From Technology Review.

Skytone, a Chinese manufacturer, has started showing off the first netbook to run Android, an operating system developed by Google that currently runs on just a single device, the G1mobile phone. Using Android makes sense for Skytone because its netbook is minimal (even by netbook standards): it supports 128 megabits of RAM and only up to 4 gigabytes of storage on a flash-based, solid-state disk. And importantly, its central processing unit is an ARM11 chip–the same model found inside the iPhone.

The Eye of the Needle

I’ve often thought that, in the obnoxiousness stakes, Andrew Lloyd-Webber ranks just below Jeffrey Archer, the so-called ‘novelist’, in that the same joke can apply to either:

First man: Why did you take an instant dislike to Jeffrey Archer/Andrew Lloyd-Webber?

Second man: I found that it saved time.

Now comes a lovely blog post by Sean French

In today’s Mail on Sunday Andrew Lloyd-Webber compares the tax-raising Labour Party to Somali pirates.

Thirty years ago I was, in a way, an employee of Lloyd-Webber. In my gap year I worked as a stagehand at London’s Palace Theatre where Jesus Christ Superstar was then in its sixth year. I used to collect the ointment jar from Mary Magdalene and prepare the incense for the orgy scene in the temple. I estimate that I sat through the musical about 150 times.

I will make no comment about the effect of that experience on me and my feelings towards Lloyd-Webber, except to say that it would give me great pleasure if circumstances arose so that he was able to experience Somalian piracy at first hand.

Me too. Strange: until now I’ve felt quite hostile towards those pirates.