Wednesday, August 09, 2017

Dissenting Speech and Sexist Culture in the Tech Industry...

Last Friday, a Google software engineer named James Damore sent out a memo to other employees within the company where he argued that the gender gap exists in the tech industry, not because women face bias and discrimination in the workplace, but because of inherent psychological differences between men and women.

His 10-page missive titled "Google's Ideological Echo Chamber" makes a lot of contentious statements - that women are more neurotic and less stress-tolerant than men; that women are less likely to pursue status than men; that women are less interested in the “systematizing” work of programming; and more.

He was fired three days later.

At issue, though, is not only the extent to which sexism pervades in the culture of Google and Silicon Valley more generally, but also the company's decision to fire Mr. Damore.  Supporters of women in tech applauded the move (and several female employees at Google had threatened to quit if no action were taken), but others have criticized the firing as silencing an employee for speaking their mind.  As Nick Wingfield of the New York Times described it, to critics this has become "a potent symbol of the tech industry's intolerance of ideological diversity".

First of all, I strongly recommend that you actually read the memo for yourself.  Have an opinion that's actually an informed opinion.  That said, my own thoughts on reading it are that Damore makes an unbelievable amount of wrong-headed assumptions that are based on no facts whatsoever.  Take these whoppers as only a few examples...

  • Women, on average, have more openness directed towards feelings and aesthetics rather than ideas. Women generally also have a stronger interest in people rather than things, relative to men.
  • These two differences in part explain why women relatively prefer jobs in social or artistic areas.
  • Women, on average, have more neuroticism (higher anxiety, lower stress tolerance). This may contribute to the lower number of women in high stress jobs.
  • Men are more motivated by status. Status is the primary metric that men are judged on, pushing many men into higher paying, less satisfying jobs for the status that they entail.

It's rather mind-blowing that such pearls of wisdom were conceived of by a college-educated man in 2017, and not for the purpose of an essay on 19th century Victorian England.  And arguing this is all the result of biology makes it that much more absurd.  The inference here is that women are not even capable of succeeding in tech.  How anyone can convincingly defend the content of Damore's message is beyond me.

Moving on, the issue over how Google handled the situation is more complicated.  Ideological diversity should indeed be valued, but it also has its limits.  In response to those who cite the First Amendment, let's remember that Damore's speech was not presented in a public space, but as an employee of a business in a private space, so the First Amendment doesn't legally apply.  Perhaps it would be constructive to think of alternative ways by which Google could have handled the situation differently.  Is there any middle ground between firing Damore versus keeping him on the payroll indefinitely?  Of course there is, not only in the form of required diversity training but with punitive or probationary measures as well.  They could have gotten creative, but they obviously didn't see the need.  To what extent that in itself is a problem, we can all have our own reasonable opinions.

However, I am reminded of the story of Al Campanis, who as general manager of the Los Angeles Dodgers in 1987, was interviewed on television by Ted Koppel on the 40th anniversary of Jackie Robinson breaking baseball's color barrier.  The interview went like this...

KOPPEL:  Why is it that there are no black managers, no black general managers, no black owners?... Is there still that much prejudice in baseball today?

CAMPANIS: No, I don't believe it's prejudice. I truly believe that they may not have some of the necessities to be, let's say, a field manager, or perhaps a general manager.

KOPPEL: Do you really believe that?

CAMPANIS: Well, I don't say that all of them, but they certainly are short.  How many quarterbacks do you have? How many pitchers do you have that are black?

KOPPEL: Yeah, but I mean, I gotta tell you, that sounds like the same kind of garbage we were hearing 40 years ago about players...

CAMPANIS: No, it's not -- it's not garbage, Mr. Koppel, because I played on a college team, and the center fielder was black, and the backfield at NYU, with a fullback who was black, never knew the difference, whether he was black or white, we were teammates. So, it just might just be -- why are black men, or black people, not good swimmers? Because they don't have the buoyancy.

KOPPEL: Oh, I don't -- I don't -- it may just be that they don't have access to all the country clubs and the pools. But I'll tell you what, let's take a break, and we'll continue our discussion in a moment.

The Dodgers fired Campanis the next day.  But in perhaps an instructive twist, after the Dodgers responded by creating an assistant for minority affairs, that new assistant, Harry Edwards, hired Campanis back.  When asked why, he responded that we need the Al Campanis' of the world in order to know how those with prejudices were thinking.


Friday, July 28, 2017

The Bitcoin Fork as the Currency's Great Existential Moment...

On August 1st, the world's favorite cryptocurrency, Bitcoin, is likely to split into two.  This is a seminal moment that we get to see play out right before our eyes, and no one is quite sure what to expect.

Here's an explanation... right now, despite 1 Bitcoin being worth about $2700, they are hardly ever being used in actual transactions.  The Bitcoin system's infrastructure can only handle 6 transactions per second (as opposed to Visa being able to handle 1600 transactions per second).  It's slow to the point of being virtually unusable in real-life retail situations.

To fix this problem, there are two prevailing ideas.  The first idea, supported by both the organization and community that manages Bitcoin's underlying software, is called the "soft fork" (also know more formally as SegWit, BIP 148, and UASF).  Without getting overly technical, the soft fork would take the Signature or "Witness" data in each transaction and move it towards the end of a transaction block in a separate structure from the data of the transaction itself.

The pros of the soft fork are that it would make transactions much faster (thanks to the blocks being structured more efficiently), transaction fees would go down, and a Lightning Network would be created that allows micropayments (like you paying for coffee at Starbucks) to be processed instantaneously without any fee.  The largest con of the soft fork is that it is widely seen as only a temporary fix, and that a hard fork will still be necessary in the future. So basically they're just kicking the can down the road to a time when it'll be even more problematic.

Speaking of which, the second idea, supported primarily by Bitcoin miners, is called the "hard fork" (also known as SegWit 2x, MASF, BIP 91, and UAHF).  This hard fork would also re-structure the "Witness" data, but would go a big step further and additionally increase the actual block size from 1MB to 2MB.

The pros of the hard fork are that it would also make transactions much faster, and would do so on a more permanent, or at least long-term, basis.  But the pros and cons of the hard fork start to blur because of the fact that the hard fork will not be backwards-compatible.  Both the hardware and software required for mining needs to be replaced - and since not every miner will have the resources to do so, this will lead to many getting out of the market and thus higher mining rewards with less competition.  That's a big con for some but a big pro for others.

And to clarify the terminology, after the split next week, the soft fork will be called Bitcoin Core and will use the ticker BTC, while the hard fork will be called Bitcoin Cash and use the ticker BCC.

What's an investor to do?  The first priority is to safeguard your money.  Many of the biggest exchanges have gone on record saying that they will not support Bitcoin Cash.  That should certainly be a significant consideration.  Also, in the immediate term, some advisors like Mohit Mamoria are recommending that investors "not make any transactions a few days before and after August 1, 2017.  Because of the fork, you might lose your Bitcoins into the thin air.  After all, Bitcoins are nothing but records of transactions.  If your transaction doesn’t get recorded by either of the chains, they will be gone forever.  Poof."

Speaking with one Bitcoin trader, Keith E,. who is a member of the Rational Investor Community, his plan is to keep 15% of his capital in Bitcoin, and on an exchange that supports the fork.  He withdrew 50% of his capital in Bitcoin recently at $2814, and placed the rest in Altcoins.  His reasoning...

"I have concerns on how this will play out.  As a trader, when in doubt, get out.  If you are a crypto trader, the only reason to keep all your assets in Bitcoin [right now] is greed.  Bulls and bears make money; pigs gets slaughtered.

"Also, the only reason charts fail on technical trading is when there is a huge fundamental driver.  I don't think it gets more fundamental than a hard fork in Bitcoin."

Perhaps the most interesting aspect of this fork is the decision-making processes that led to this existential moment.  The Bitcoin system was specifically designed with an open architecture to make forks like this, not only possible, but encouraged.  Let there be as many variants or offshoots as people want to create - the ideology goes - and what survives will be based on whichever of those variants people actually choose to adopt.  This is the rough consensus model of governance in action, which has served the larger tech community so well in the past.  However, the stakes are a bit different when rough consensus is applied to technical standards-setting versus when it is applied to the financial sector.  Waiting on the sidelines to see how things ultimately shake out lends itself to a different sense of urgency and time horizon.


Friday, July 21, 2017

Threading the Needle with E-Textiles...

Here at the WiTNY Summer Guild, I just had a chance to sit in on an e-textile workshop.  E-textiles are fabrics that have embedded electronic circuitry, and are being manufactured more and more to include sensors that can regulate temperature, change the color of the garment, display lighting, and more.

The E-Textile Lounge is a great place to start exploring some of the possibilities, and to immerse yourself in a starter project.  Personally, I'm a fan of this easy-to-DIY Virtual Reality Glove...

In a broader context, e-textiles are also being used to help teach basic Computer Science principles and the logic of circuitry, and some scholarship has begun on the best ways to incorporate e-textiles into curriculum at both the college and K-12 levels.

So what I produced at this workshop was the following children's decorative bracelet.  When you snap the two ends together, an LED light is triggered, and the thread itself is the conductor.  Try not to be too overwhelmed with its amazingness.

Seriously though, I found that the actual skill of sewing was more of a challenge than the electronic component itself.  And therein may lie the lesson... that the high-tech push into a traditional space like fabric and garments may actually exacerbate the demand for old-world skills like sewing and even, despite my best efforts, threading a needle.

A video tutorial by my pal, Diane Levitt...


Thursday, April 06, 2017

The Rise of of Bot-based Collective Blocklists on Twitter...

Yes, it's a mouthful, but there is an emerging trend known as Bot-based Collective Blocklists that might already be influencing your social media feeds.

Here's the idea.  In networked publics such as Twitter, harassment campaigns are often launched by groups to intimidate, insult, and threaten specific targeted users.  From the perspective of democratic discourse, such harassment campaigns can cause a severe chilling effect on speech in these spaces, and typically it is up to the targeted individual to block their harassers one account at a time - which can be an overwhelming task, if not completely impractical.

As described by R. Stuart Geiger, one solution that has emerged to counter these harassment campaigns is known as collective blocklists.  Basically, instead of each individual having to block their many harassers, a community of such individuals can add their harassers' information to a blocklist that is then shared with, and can subscribed to by, the entire community.  It's a crowdsourced mechanism for curating the blocklist and, using the Twitter API, free services like will incorporate that blocklist into the filters for each member of the community's individual Twitter account.

On the surface, this may seem like a great idea, however it's a bit more complicated.  Some blockbot software curates its list of harassers by a single person, others use community-curated blocklists, and still others use algorithmically-generated blocklists.  And here's where it's problematic.  The algorithms used to block people are predictive and situated within a particular socio-technical context.

When filtering and gatekeeping is automated by software agents running predictive models in such a bottom-up manner, it lends itself to numerous potential pitfalls.  Any exclusive community is made capable of blocking any individual user types for any reason - and this would be structurally embedded in the source code itself.  As a consequence, voices may be silenced in networked publics solely for the reason that a community's algorithm predicted that their voices would not be well-received.  This is what Geiger refers to as "automated discrimination".

Yes, these bot-based collective blocklists can provide an immensely valuable public service by blocking harassment campaigns, but they could just as easily be used (and misused) to silence contrarian viewpoints and, in turn, further transform our social media feeds into mere echo chambers that reinforce social and political biases.

It's quite the double-edged sword, which is fine, but needs to be recognized as such.


Wednesday, March 22, 2017

Designing Democratic Spaces Online Without Allowing Trolls To Take Over...

Jennifer Forestal wrote an interesting article in the most recent issue of the American Political Science Review titled, "The Architecture of Political Spaces: Trolls, Digital Media, and Deweyan Democracy".  In it, she highlights the importance of how website architectures can either invite or prevent different types of political activities by creating different types of spaces.

So if the challenge is to create online spaces that encourage democratic discourse, then the problem is trolling. As an example, Forestal describes how, in August 2014, Jezebel - a site dedicated to "what contemporary women want to talk about" - had its comment section overwhelmed with images of violent pornography posted by anonymous users.

In Forestal's assessment, this was made possible by the open architectural design (through code) of the site's commenting platform, Kinja, which allowed anyone to create an account and comment anonymously as often as they wished.  Also, by granting each commenter the power to be moderator of any ensuing discussions, each discussion thread was effectively treated as a unique and exclusive event run by the thread's founder, rather than conceiving of all of the threads on the site together as part of a single collective, or community, enterprise.  Thus, trolls were able to proliferate.

Ultimately, Kinja was changed so that comments were divided into "pending" vs. "approved" categories - expanding its boundaries of approved commenters to include users of the website with "a long history of demonstrated good work".

Here's the thing... this redesign of Kinja's architecture kept the conversation "open", however it added a layer of editorial control.  Some might say it created an elite class of gatekeepers - done intentionally and by design.  Think of it as having created a Superdelegate system - a mechanism for the party establishment to check the impulses of the rank-and-file.

Without placing any value-judgments, the big idea here is something that myself and others have written about extensively - that software architectures absolutely structure people's behavior in cyberspace.

Forestal recommends that, in order to avoid trolls, online democratic communities need to be designed as "small" spaces, with stable members, and yet still be "flexible" enough to be responsive to change so as to prevent gated communities that discourage new experiences and encounters.  But this is not the most revealing conclusion; in fact, it's been the holy grail that designers have been pursuing for years but no one has quite figured out how to pull off.  The main contribution of Forestal's piece, then, is to frame this familiar challenge in a better theoretical context.


Thursday, March 16, 2017

How to turn your Raspberry Pi into a Web Server...

Many "first" Raspberry Pi projects are actually overly ambitious and complicated for beginners.  Well, here's one that is quick, easy, and free.  Assuming you've already set up your Raspberry Pi, just follow these steps to turn your Pi into a fully functional Web Server and host your own website.

(You will be entering these commands in the Terminal window.)

1. Install updates.

sudo apt-get update && sudo apt-get upgrade

2.  Install the Apache Web Server and PHP

sudo apt-get install apache2 php5 libapache2-mod-php5

3.  Then restart the server with:

sudo service apache2 restart

That's pretty much it. You can view the default web page by entering your Pi's local IP address in the browser (something like

Once you set up port forwarding on your router, you can then view your web page with the IP address that the rest of the world will use to reach your site. To determine this, just Google "WhatsMyIP".

In the future, you'll use this as the Pi's directory for your website:  /var/www/html

One final, but very important, thing....  In order to make any changes to your "html" directory, you'll need to change its permissions.  Open the Terminal, navigate to the "www" directory, and enter this command to change the owner from "root" to "pi" (or your username):

sudo chown pi: html

You can check out my Raspberry Pi-powered website at:

If publishing websites was hard, the Internet wouldn't be what it is.


Thursday, March 02, 2017

Review - Binary Bullets: The Ethics of Cyberwarfare

The following is my book review of Binary Bullets: The Ethics of Cyberwarfare. This review is scheduled to be published in the forthcoming issue of Perspectives on Politics.

In a volume of rich ambition and tackling an important area of rapidly growing geopolitical significance, Allhoff, Henschke, Strawser, and their contributors have overwhelmingly succeeded in presenting a current and comprehensive analysis of the ethics of cyberwarfare and introduced numerous theoretical and conceptual models for analysis that will guide the field for years to come.

Allhoff, Henschke, and Strawser begin by raising the definitional problem that often plagues studies of cyberwarfare – to what extent is cyberwarfare even warfare at all?  The editors immediately address this by defining cyberwar as “an act of violence conducted by, or targeted at, information communication technologies intended to compel our opponent to fulfill our will” (p. 3). Throughout the volume, to its credit, the problem of definition is acknowledged repeatedly, although the editors do an excellent job of making sure that we do not get lost in it.

The first section takes a norms-based approach and constructs its ethical basis more on what’s already occurring in cases of cyberwarfare and in the realm of international law than how ethics normatively ought to be going forward. George R. Lucas Jr. argues convincingly that a soft-law approach (“best practices”) is more likely to be accepted than formal legislation because norms emerge from practice rather than through stipulative laws and regulations that are imposed externally. Especially at the international level where cyberwarfare is carried out by nation-states, the limitations of international law seem particularly pronounced in the borderless cyber realm, and thus there is not much practical alternative.  In contrast to this soft-law approach, however, Michael N. Schmitt and Liis Vihul examine international legal norms arguing that new treaties or customary law norms to govern cyberconflicts will find a range of opposition, thus evolving existing international law is “the more likely near-term prospect” (p. 52).  Randall R. Dipert then segues nicely into the next section by arguing that just-war theory should apply if the effects of cyberwarfare do rise to the level of harm produced in traditional warfare. Perhaps Dipert’s most interesting idea is his reexamination of what constitutes “arms”. If weaponized malware like Stuxnet is based on algorithms, and algorithms are really just ideas, then can we really consider ideas to be, literally, weapons, perhaps even to be bought and traded as military commodities, since they can demonstrably be used for harm?

Interestingly, while the Tallinn Manual is harshly critiqued by multiple authors here and called “a spectacular failure”, those who are bold enough to explicitly propose ethical guidelines for cyberwarfare tend not to veer far from Tallinn’s principles – namely, that cyberattacks shouldn’t be directed against civilians, should only be directed at military targets in a way that minimizes collateral damage, the principle of equivalent harm, etc.

The second section takes a just-war approach. Can just war theory accommodate developments in cyberwarfare, or do these new ways of fighting render its application obsolete? David Whetham draws the analogy to soldiers spreading out over an enemy’s territory to plunder and destroy everything in their path, though is careful to state that cyberwar is not real war at all. Ryan Jenkins follows by arguing that cyberwar can be Ideal War where states can direct their force discriminately against military targets, minimizing non-combatant and collateral damage, and proportionally. Brian Orend then presents a thoughtful and important discussion on the ethical considerations informing “what justice and law should require of good-faith actors in the aftermath of cyberwar” (p. 116). He raises critical issues that often go overlooked, and to his credit, offers a constructive way forward.

The third section explores the ethos of cyberwarfare.  Perhaps the most intriguing chapter in the volume is Matthew Beard’s The Code of the Cyberwarrior. He draws a comparison to less formal military codes of honor – “the warrior code” – akin to “what it is to be a Marine”. Cyberwarriors require a self-policing and similar code to help cultivate morally good conduct and develop a normative identity. Beard’s arguments stand out for focusing more on individual ethics of the cyberwarrior, rather than those of the nation-state, and correspondingly for ethics being enforced through peer-based social pressures rather than international law or other legal norms. The reader is left wanting to know more about the cultural anthropology of the cyberwarrior, and about that of hackers and hacktivists for that matter, but Beard maintains the distinction between these different types of cyberoperatives.

This focus on the individuals involved in cyberwarfare is coupled nicely with the chapters by David Danks and Joseph H. Danks who call for “bringing humans back in the loop” (p. 178) in formulating our ethical understanding in such a highly technical field, as well as that by Daphna Canetti, Michael L. Gross, and Israel Waismel-Manor whose analysis suggests the very real psychological harm that cyberwarfare can cause among its participants. These contributions serve as valuable reminders that, in all matters of cyberspace, it is still real people who are involved – carrying out the operations and feeling their effects.

Finally, the volume closes with a look at cyberespionage, the role of deception, and privacy. Heather M. Roff is the first to question whether cyberoperations geared towards deception of the enemy fall on the side of “permissible ruses” or are impermissible acts of perfidy, eroding the levels of trust between enemies that would undermine peace negotiations and contribute to greater international instability. Seumas Miller then presents a new term - “covert political cyberaction” – that addresses acts that are not quite cyberwar and not quite cybercrime, but rather are the “dirty” actions that tend to be harmful and unlawful but pursued to achieve a greater good. Michael Skerker adds the case of cyberespionage and, specifically, the ethics involved in government-sponsored data collection. He argues that the collection of metadata through automated keyword searches and data mining techniques poses a legitimate threat to “the autonomy of inhabitants of liberal states” (p. 251), and proposes a moral standard to determine when such “coercive state actions” are justified.

Many of the authors cite the same few examples – Estonia 2007, Israel-Syria 2007, Russia-Georgia 2008, Stuxnet, etc.) – and these all focus on nation-state behavior which, understandably, is part of how cyberwarfare is commonly defined.  But what of rogue actors, cyberterrorists, hacktivists, etc. Would the recent case of Russian operatives hacking into the Democratic National Committee’s email system to publicly reveal private political communications in the weeks leading up to an election be considered cyberwarfare? If so, how applicable are the prescribed ethical principles in the absence (or redefinition) of “civilian targets” or “collateral damage”? If not, is that an indication that conceiving of cyberwarfare in strictly military terms between nation-state actors is too limiting and thereby less relevant?

Binary Bullets is a thorough and comprehensive presentation of many of the ethical challenges raised by the prospect of cyberwarfare and should be read by anyone not only interested in ethical philosophy but also in international law, military strategy, and the politics of technology. The volume’s breadth of content and perspectives is sure to greatly expand one’s understanding of both evolving ethical considerations in technological spaces and of cyberwarfare itself.


Friday, February 10, 2017

President Trump and the Demise of Net Neutrailty...

Regardless of which political echo chamber you prefer, your social media news feed is likely overtaken with stories and opinions related to President Trump's first few weeks in office. But barely noticed has been, perhaps, the single most consequential and important public policy development of all... the end of the Internet as we know it.

I speak, of course, of Net Neutrality. Readers of The Nerfherder are well aware that I've been trying to raise awareness about this issue for 15 years (!) now.

Here's what you need to know.  The Internet that you've known your entire life has always been neutral. We've had Net Neutrality all this time. It's known as the First Amendment of the Internet, and it's a legal principle that states that all data must be treated equally in terms of how it's routed across the Internet's infrastructure. Whether you're trying to reach Google's website, or a college student's humble little blog, you're going to get there, and in a way that's the same regardless of how well capitalized the destination site happens to be.

That's all about to change, and with hardly anyone saying boo about it.

The telecoms have long wanted to do away with this system. They've lobbied heavily to be able to create an "EZ-Pass toll lane" for Internet traffic, whereby companies and individuals would have to pay untold fortunes in order to have people reach their websites faster, and every other website would be relegated to the sidelines. Scholars have long pointed out the immediate economic impact this would have on startups, entrepreneurship, and innovation - not to mention how it would greatly impair the ability of individuals to express their free speech in a manner where people might actually be able to view what they post.

If you don't have the resources of Google or Microsoft to pay off the telecoms, good luck to you.

During the transition period, President-elect Trump signaled his policy preference against Net Neutrality by naming Jeff Eisenach and Mark Jamison to oversee hiring and policy at the FCC (the agency that sets Net Neutrality policy). These men have histories of lobbying on behalf of the large telecoms and favoring more mergers within the telecom sector (reducing competition).

Then, once in office, President Trump appointed Ajit Pai as the new Chairman of the FCC. In just his first two weeks in office, as reported by the New York Times, Pai has aggressively been assaulting various Net Neutrality rules - stopping nine companies from providing discounted high-speed internet service to low-income individuals, not allowing a scheduled vote to take place that would have overhauled the pay-TV settop box market, and, perhaps most importantly, closed an investigation into whether AT&T, Verizon, and T-Mobile violated the law by giving preferential treatment to some websites and web services over others. This is the definition of violating Net Neutrality, and the FCC Chairman signaled this week that when telecoms do so, there will be no consequences.

Somehow, some way, this issue has become very partisan over the last decade. It shouldn't be.  Republicans ought to support an Internet which values free speech over censorship, which values entrepreneurship and innovation, and encourages a thriving competitive free market. As soon as you get rid of Net Neutrality, the small handful of giant telecoms will have the ability to decide what Internet content people will likely see and which web services people will likely use.

Unfortunately, the telecoms have lobbied for 20 years and have contributed millions of dollars to members of Congress (from both parties) in order to frame the issue as one where "government shouldn't regulate the Internet". But here's the problem... regardless of which side of the debate you support, regulation is the end result. If you are against Net Neutrality, the giant telecoms will regulate how websites operate and what content people will be able to access; meanwhile, if you are pro-neutrality, you're regulating the telcoms and giving a structural advantage to the websites. Either way, you're advocating for the selection of certain winners and losers. I would argue that the "free market" isn't necessarily being served by either, so the question is would you rather have a free marketplace for the telecoms or for cyberspace? Where is competition most likely to occur?

During the presidential transition period, I gave an interview urging people not to be alarmists, though when asked if Net Neutrality was under threat and should supporters be worried, I replied absolutely. The actions of the new FCC Chairman have now made it likely that the end of the Internet as we know it is only weeks away.


Tuesday, January 31, 2017

I just got my Raspberry Pi. Now what?

I recently bought the Raspberry Pi 3 Model B. When it showed up at my doorstep I had no idea how to get started. Most online tutorials jumped straight into beginner projects, but you need to set up and configure the Pi before you can do anything with it. So here goes.

The Raspberry Pi literally comes as just a motherboard, so most likely you'll want to get it as part of a Raspberry Pi "kit" that includes a charger, cables, protective case, and SD Card. Don't spend more than $50 total.

It will look like this...

Now, before we can do anything with the Pi, we have to give it an operating system. For Windows users, download the free Win32DiskImager, and unzip it to your computer. Then, download Raspbian which is the official operating system for Raspberry Pi, and unzip that to your computer as well.

The next step is to open that Disk Imager program, click the blue folder icon, go find your Raspbian image file, and click to "Write" it to your SD card (which you should've put in your computer's SD card reader).

Believe it or not, you're almost finished. The only remaining task is to put that SD card into your Raspberry Pi and turn the Pi on.

Here is definitely something important to be aware of, though.  The first time you break out your Raspberry Pi and want to install your Raspbian operating system, you MUST connect your Pi to a monitor, mouse, and keyboard.  You'll only need to do this the first time you use it, but it's an unavoidable step.  You can't use a laptop either.  Without realizing this, after getting my Pi in the mail, I then had to wait a few days, bring the Pi into my office at work, take over a colleague's USB mouse and keyboard for an hour, and finally (and this was the real challenge) I had to find a monitor that not only used an HDMI cable but also had the right adapter for that HDMI cable (the adapter with the cord didn't work for some still-unknown reason).

But here's the good news... even though hooking the Pi up to a mouse, keyboard and monitor the first time can be a pain, once they're all connected and you simply power it on, the operating system automatically loads, and just like that you have a new pocket-sized computer.

You're totally finished and ready to experiment with all of those beginner Raspberry Pi projects that you see all over the Web.

One last thing, which is optional but highly recommended.  As of now, your Pi is 100% ready to use, but you still need it connected to a keyboard, mouse, and monitor whenever you want to do something with it.  Why not make it "headless"?

To make your Pi headless, you just need to set up some type of Remote Desktop program so that your laptop or main computer can take control of your Pi when you want it to and give you an interface.

I recommend the VNC Viewer.  While your Pi is still hooked up to a monitor, boot it up. What's nice is that the VNC Server software is already built in to Raspbian, so all you need to do is click on Menu > Preferences > Raspberry Pi Configuration > Interfaces, and then click to Enable VNC.  You should also double-click on the VNC Server icon on the top-right of the desktop screen and take note of your IP address. Reboot your Pi. You can now disconnect the mouse, keyboard, and monitor.

Your Pi is headless, so when you want to control it from your laptop or main computer, download and install the VNC Viewer software linked to above, then simply click to Create New Connection and enter your Raspberry Pi's IP address.  It will display a nice Raspbian interface for your Pi so you'll never need to connect those external pieces of hardware again.

You're off to the races!  My first few projects... 1) Turn the Pi into a Web server, 2) turn it into a Minecraft gaming server, 3) turn it into a RetroPi gaming console, and 4) turn it into a Kodi device for use with my TV.


The Privacy Paradox Podcast...

This morning I heard about The Privacy Paradox on NPR radio. It's an "interactive podcast", which as best as I can tell means that after each new podcast episode is released, the listener is directed to complete a series of challenges, and then the next podcast episode will review the listeners' collective results.

In this case, there will be 5 challenges that you can complete with the goal of "taking back your digital identity".  The challenges include finding out what your phone is tracking about you, discovering how algorithms learn about and then sell your identity, reclaiming your privacy, and more.

I don't know if this is already the case, but the thought occurs to me that for a podcast to truly be interactive, rather than having pre-determined content, users' results could help decide what the next round of content ought to be.  For instance, the podcast's guest speakers could be selected based on the privacy findings of the users' first challenge on smartphone surveillance.

Another intriguing aspect of this project is the Privacy Personality Quiz to see if you are a Shrugger, Realist, or Believer.

For the record, I was notified that I'm a Realist.

This seems like a useful project that also seems like it could be both entertaining and fun.  Who wants to join me and then have a discussion?  You can choose whether it would be private or public, of course.


Friday, January 27, 2017

How to Install Minecraft Mods...

When you're ready to step your game up to the next level in Minecraft, it may be time to experiment with "mods".  Mods are not part of the official Minecraft game, but are instead created by other players.  They can make it possible to build unique items, interact with new kinds of creatures like dinosaurs, and even change the game's graphics to 3D. Basically, anything is possible through mods, including changing the basic rules of the Minecraft game itself.

Go explore what's out there at,, and  Here are the steps for installing new mods...

1.  Download and install Minecraft Forge.  This is an API that lets you install mods for Minecraft.  Go to the Minecraft Forge downloads page, click on the most version of Minecraft you have (for example, 1.11.2), and on the next page click "Installer-win".

2.  Run the installer file that you just downloaded.  Make sure that "Install Client" is selected and click "OK".

3.  Now start up Minecraft.  You should notice that in the bottom-left corner, in the drop-down "Profile" menu, you will see a new profile labelled "forge".  Select it and click to "Play".  After a little bit of updating, the Minecraft Game Menu will appear and display a new button labelled "Mods".

4.  At this point, Forge is successfully installed and you are ready to play mods.  However you still need to go get a few.  You can find some you like from  For this example, I'm going to get the JurassiCraft Mod to play in a world with dinosaurs.

5. First download the LLibrary jar file (this won't be necessary for all, or even most, mods, but it is required for JurassiCraft), then download the JurassiCraft jar file (the file links are towards the bottom of these two pages).  Save them both into your Minecraft "mods" folder.

  • If you don't know where your "mods" folder is, do the following...
  • Start Minecraft as if you were about to play a new game (in other words, open the "launcher").
  • In the bottom-left corner, underneath your profile name, click the button labelled "Edit Profile".
  • Take a look  in the field labelled "Game Directory". That is the location of your saves folder. Write it down or remember it. For this example, you can see that my folder is located in "C:\Users\RobbieD\AppData\Roaming\.minecraft".

6. You're finished! When you launch Minecraft and click your new "Mods" button, you should see your new mod (ex. - "JurassiCraft") appear on the left. Play a new game with this mod and you'll have lots of new non-standard features to the game.  Like dinosaurs.


Monday, January 23, 2017

How to Install Minecraft Maps...

When you want to play Minecraft but are ready to branch out beyond the game-generated landscapes, it's time to explore other maps. One of the reasons Minecraft has endless possibilities is because whenever someone creates their world, they can then share it and let the rest of us download it for ourselves. This is called a Minecraft Map.

There are thousands of maps that you can download, install, and play - for free. To get a sense of what types of maps are out there, go explore

Here is the process:

1. Find a map that you want and download it. For this tutorial, I am going to download the map titled, "Escaping!", which is one of the most popular "puzzle" maps. Click where it says "Download Maps". In the pop-up window that will appear, click to Save the zip file.

2. You will need to unzip those new files into your Minecraft "saves" folder, so first you need to locate it on your hard drive. To locate your "saves" folder do the following...
  • Start Minecraft as if you were about to play a new game (in other words, open the "launcher").
  • In the bottom-left corner, underneath your profile name, click the button labelled "Edit Profile".
  • Take a look  in the field labelled "Game Directory". That is the location of your saves folder. Write it down or remember it. For this example, you can see that my folder is located in "C:\Users\RobbieD\AppData\Roaming\.minecraft".

3. Now that you know the location of your "saves" folder, go to Windows Explorer, open your "Downloads" folder, and double-click the map you downloaded earlier called "Escaping_v1.1" (or something close to that).

4. From the top menu in Windows Explorer, click "Extract", then "Extract All". Then "Browse" to find your "saves" folder, and click "Extract".

That should be it!  Just restart Minecraft, start a new Singleplayer game, and "Escaping!" (or whatever Map you chose) will display in the list of worlds for you to play. And best of all, you can repeat these same steps for hundreds of different Maps.


Saturday, December 31, 2016

Best Internet Politics Quick-Reads of 2016...

Make yourself more interesting at your New Year's Eve party with these...


Tuesday, November 08, 2016

Election Day Data: Twitter Sentiment

Academics and researchers will be looking this Election Day for any data that might indicate to what extent social media can help predict electoral outcomes. Towards this end, I've created my own software that analyzes Twitter sentiment for each presidential candidate.

Here's how it works. Written in Python, it uses the Twitter Streaming API to collect thousands of live tweets per minute about either Hillary Clinton or Donald Trump. The software then pipes all of those tweets through IBM's Artificial Intelligence engine (the Alchemy API) to determine, for each tweet, if the sentiment is Positive, Negative, or Neutral about that candidate.

Take this data only for what it is and avoid reading too much into it. For instance, it may say more about Twitter users than about the political candidates; it also may say more about the quality of IBM's language analysis algorithms than about actual sentiment; and more weaknesses abound.

That said, here's the data...

Of people tweeting about Hillary Clinton on this morning of Election Day, the sentiment is:

  • 19.5% Positive
  • 42.3% Negative
  • 38.3% Neutral
 Notably, that is a wider spread between her positives and negatives than she's had in the past (and not a promising one).


Election Day Data: The Betting Markets

To save some data for posterity, here is what the political betting markets have had to say about today's presidential election.

As of this morning (Election Day)...

(if you're wondering why these numbers add up to more than 100, remember these are betting markets, not percentages.)

For comparison, public polling currently shows Clinton leading Trump by only a 45.5% - 42.2% margin.

Also, here is a a chart illustrating how the betting markets have fluctuated for the two candidates over the past 90 days leading up to the election...

More to come.


Wednesday, September 21, 2016

What Ted Cruz Doesn't Understand About 'Controlling the Internet'...

Senator Ted Cruz is once again threatening a shutdown of the United States government - this time for the reason that the U.S. shouldn't "give foreign governments greater control over the Internet".

What is he talking about?

On October 1st, the Internet Corporation for Assigned Names and Numbers (ICANN), is scheduled to be turned over to an international consortium group for management. Cruz has made bold statements about how this is a national security issue that will lead to widespread censorship and enable countries like Russia and China to make decisions about what can and cannot be posted online.

This is completely ridiculous, and here's why. ICANN doesn't manage the Internet. All ICANN does is manage the Internet's domain name system. When you want to buy a domain name like "", they simply keep track of the fact that now you are the owner of that domain name. They have no effect whatsoever on how the Internet functions beyond maintaining a list linking IP addresses to domain names.

Cruz has Internet experts and computer scientists scratching their heads in bewilderment as to how little he understands the technical dimensions of this issue. Even Tim Berners-Lee, the creator of the World Wide Web itself, wrote an op-ed today stating, in no uncertain terms, just how wrong he is.

Here's the bottom line - ICANN and the domain name system play no role in Internet censorship. When the Internet is censored, it is accomplished by national firewalls (See Russia, China, etc.), through ISPs, and, as Cory Doctorow points out, massive armies of trolls for hire and other astroturfers, as well as copyright abuse.

So where is Cruz even getting these ideas? My guess is that he's reading headlines about how "Internet Governance" is about to shift out of U.S. control. What he doesn't realize is that the phrase "Internet Governance" has a special meaning in academia, referring solely to governance of the domain name system. It appears nobody informed him of this, and he made a common assumption based on the phrasing, which happens to be completely wrong.


Tuesday, September 20, 2016

Do Algorithms Have a 'White Guy' Problem?

Algorithms are coming to dominate many aspects of our lives and most people are completely unaware of it. They are being used to determine which job applicants actually get called for an interview, which people are awarded a mortgage or business loan, which stores will open in a community, which news headlines and opinions we're likely to see on social media, and much more.

The question that has made headlines recently is whether these algorithms are biased and discriminatory. Some like ProPublica's Julie Angwin and Microsoft's Kate Crawford have argued that algorithms and Artificial Intelligence have a "white guy problem" - meaning that, since algorithms learn by being fed certain data, and they build models of the world based on that data, the people doing the feeding are tremendously important because as they make selections informed by their own biases, the resulting software comes to incorporate those same biases.

They cite these recent examples:
  • "Predictive policing" in places like New York is used to forecast where crime is most likely to occur and directs police to focus on  those neighborhoods. Crawford states that, 
At the very least, this software risks perpetuating an already vicious cycle, in which the police increase their presence in the same places they are already policing (or overpolicing), thus ensuring that more arrests come from those areas. In the United States, this could result in more surveillance in traditionally poorer, nonwhite neighborhoods, while wealthy, whiter neighborhoods are scrutinized even less. Predictive programs are only as good as the data they are trained on, and that data has a complex history. 

From my own anecdotal perspective, I remember once when my wife and I were sitting next to each other on the couch - both using Facebook on our laptops - and she was shown ads for diaper coupons while I was shown ads for getting a second job; nevermind that I'm the stay-at-home parent and she's the one who works full-time. How's that for gender stereotypes being ingrained in an algorithm?

While these biases clearly exist, it's more difficult to prescribe realistic remedies. Some ideas thrown out there include making the algorithms more transparent and accountable - the idea of "algorithmic auditing". Also, since algorithms reflect the values of its creators, there's the idea that we must address not only the people who design them, but also the people who sit on the company boards, and which ethical perspectives are to be included.

It seems to me that the real danger isn't that algorithms are being used in the areas that they are, but that they are being used in ways that overlook the merits of the individual in favor of larger group associations. For instance, credit scores (long determined by algorithms) are based on whether each individual pays their bills on time, their individual history, their individual access to more credit as needed, etc. While still flawed, at least these credit scores are based on what you do as a person, so you have some level of control over your score.

By contrast, these other algorithms in the news recently are more problematic because a person's "scores" are completely dependent on what neighborhood you live in and what racial/ethnic/religious group you were born into. In other words, unlike credit scores, these algorithms are explicitly designed and programmed to make judgments about you based on group stereotypes rather than on the actions you take and decisions you make as an individual.

All of us would like to be defined by what we do as individuals, not by what other people "similarly situated" to us do. There should be universal condemnation of a system in which an upstanding and responsible person can't get a mortgage or business loan solely because their neighbor defaulted on theirs.

The good news is that since algorithms are programmed by people, people can program them differently. If values like meritocracy and individualism are important then they can become the constitutionally defining principles of algorithms going forward. Right now, though, they are a problem, reinforcing the worst stereotypes and acting as an obstacle to individual advancement. As Alistair Croll has famously said, "this is our generation's civil right's issue, and we don't know it".


Sunday, July 31, 2016

Do the Political Party Conventions Matter? Not according to the Betting Markets...

Think what you will about the party conventions that just wrapped up, but one thing worth pointing out is that, despite the so-called boost in polling that candidates receive coming out of their convention, temporary as it may be, this boost doesn't really exist if you look at a different metric than polls - the political betting markets.

Political betting markets have often proved to be a better predictor of electoral outcomes than public opinion polls, particularly the further away the analysis is done from Election Day.  So with the Republican and now Democratic conventions just completed, this is what the betting markets have had to say regarding who will win the presidential election...

Click image to enlarge

This is a 30-day snapshot with the conventions occurring during the second half of the chart.  Do you notice those drastic swings for and against Hillary Clinton and Donald Trump?  If not, you're not alone.  There is virtually no discernible change for either candidate.

For the record, as of July 31st, the betting markets favor Hillary Clinton winning the presidency over Donald Trump by a 68 to 35 margin (these are not percentages but rather how many cents it would cost per dollar to "Buy Yes" for each candidate).

So do the conventions matter?  According to the betting markets, not in the slightest.


Thursday, July 28, 2016

Basic Minecraft Programming Examples...

In the last post we reviewed how to set up Python for Minecraft.  Once you have it up and running, jump right in and try these two simple scripts that not only demonstrate what Python-for-Minecraft programs look like, but are also both really useful when you're actually playing.

Example 1:  Teleport to your starting location (or any location)

As most Minecrcaft newbies and veterans alike can tell you, sometimes you just want to go back to your "home base" (wherever in your world that might be) without needing to hike all the way there or even needing to figure out where it is.  Wouldn't it be helpful to have an easy way to teleport there whenever you wanted?

As soon as you start a new game, click on "F3" to see lots of in-game details display on the screen.  Pay particular attention to the three "Block" numbers (or XYZ numbers).  Then try this...

from mcpi.minecraft import Minecraft
mc = Minecraft.create()

# Replace these numbers with your three starting "Block" numbers

x = 20
y = 80
z = 16

mc.player.setTilePos(x, y, z)

Example 2:  Instantly build a shelter

Most players have to spend their first day gathering materials to build a shelter before nightfall.  But you can try this instead whenever you want to instantly build yourself a cobblestone shelter right next to your present location.  You can even build it in the sky!

# Get player's location and build a hollow cuboid

from mcpi.minecraft import Minecraft
mc = Minecraft.create()
pos = mc.player.getPos()

x = pos.x
y = pos.y
z = pos.z
width = 10
height = 5
length = 6
blockType = 4
air = 0

mc.setBlocks(x, y, z, x + width, y + height, z + length, blockType)
mc.setBlocks(x+1, y+1, z+1, x + width-1, y + height-1, z + length-1, air)

The result...


Wednesday, July 13, 2016

How to Set Up Python for Minecraft...

Most of the online tutorials on this topic seem weak, so here is my step-by-step beginner's tutorial on how to set up your Windows PC so that you can start writing Python programs for Minecraft.

Step #1:  Download and install Python (use any version after 3.5.0).  During installation, make sure to check the box to "Add Python to Path".

Step #2:  Download and install the Minecraft Python API and Spigot.  Go to this link and download the file: "Minecraft".  Extract all of the files, then double-click the file: "Install_API".

Step #3:  Run the Spigot Server.  Open the "Minecraft Tools" folder (that you extracted in Step #2), then double-click the file: "Start_Server".  Without closing the Spigot window, open Minecraft and choose "Multiplayer", then "Add Server".  In the server address box, type "localhost", then "Done".  Double-click the server name listed and your game should start.
  • If you have a compatibility issue when you double-click the server name, exit back to the Minecraft launcher and create a new profile. Edit the settings for that profile by selecting an older version release (for example, 1.9.4) 
You're now totally set up.  In the future, when you want to write the code for your programs, use IDLE (a text editor installed when you installed Python).  In order to execute your finished programs, make sure to run the Spigot server and Minecraft, and simply click "F5" within IDLE.

Some actual programming examples are coming soon.