[FRIAM] old parody

2013-05-01 Thread Gillian Densmore
I found a old start me up parody for winders95: (now replace winders95
with winders8)

http://www.youtube.com/watch?v=DOwQKWiRJAA

Some FRIAMERS might like it especially because theres rumous balmore and
friends might be encouraging happy winders 7 users to upgrade to 8.

Is it a bad time to chant something like: I heart my Android/Google
Overlord?
When is android coming to the desktop? or is that Real Soon Now?

FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

[FRIAM] Picture of the Internet

2013-05-01 Thread glen e p ropella
This Is the Most Detailed Picture of the Internet Ever (and Making it
Was Very Illegal)

http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever

The resultant map isn't perfect, but it is beautiful. Based on the
parameter's of the researcher's study, the map is already on its way to
becoming obsolete, since it shows only devices with IPv4 addresses. (The
latest standard is IPv6, but IPv4 is still pretty common.) The map is
further limited to Linux-based computers with a certain amount of
processing power. And finally, because of the parameters of the hack, it
shows some amount of bias towards naive users who don't put passwords on
their computers.

-- 
glen e. p. ropella  http://tempusdictum.com  971-255-2847


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Steve Smith
Very Interesting in many dimensions (technical/social/...) here's what I 
believe to be the original paper.


   http://internetcensus2012.bitbucket.org/paper.html


This Is the Most Detailed Picture of the Internet Ever (and Making it
Was Very Illegal)

http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever

The resultant map isn't perfect, but it is beautiful. Based on the
parameter's of the researcher's study, the map is already on its way to
becoming obsolete, since it shows only devices with IPv4 addresses. (The
latest standard is IPv6, but IPv4 is still pretty common.) The map is
further limited to Linux-based computers with a certain amount of
processing power. And finally, because of the parameters of the hack, it
shows some amount of bias towards naive users who don't put passwords on
their computers.




FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Alfredo Covaleda Vélez
Me parece increíble que 420.000 usuarios de Linux sean tan descuidados y no
le presten el mínimo de atención a la más básica medida de seguridad como
es tener un password  para ingresar al perfil. También es interesante ver
el nivel de acceso de Linux en todo el mundo.


2013/5/1 glen e p ropella g...@tempusdictum.com

 This Is the Most Detailed Picture of the Internet Ever (and Making it
 Was Very Illegal)


 http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever

 The resultant map isn't perfect, but it is beautiful. Based on the
 parameter's of the researcher's study, the map is already on its way to
 becoming obsolete, since it shows only devices with IPv4 addresses. (The
 latest standard is IPv6, but IPv4 is still pretty common.) The map is
 further limited to Linux-based computers with a certain amount of
 processing power. And finally, because of the parameters of the hack, it
 shows some amount of bias towards naive users who don't put passwords on
 their computers.

 --
 glen e. p. ropella  http://tempusdictum.com  971-255-2847

 
 FRIAM Applied Complexity Group listserv
 Meets Fridays 9a-11:30 at cafe at St. John's College
 to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Steve Smith

On 5/1/13 12:22 PM, Alfredo Covaleda Vélez wrote:
Me parece increíble que 420.000 usuarios de Linux sean tan descuidados 
y no le presten el mínimo de atención a la más básica medida de 
seguridad como es tener un password  para ingresar al perfil. También 
es interesante ver el nivel de acceso de Linux en todo el mundo.


   /I can not believe 420,000 Linux users are so careless and do not
   pay the least attention to the most basic security measure is to
   have a password to enter the profile. It is also interesting to see
   the level of access of Linux worldwide.
   /

I have read the paper (but only once through) and it appears that most 
if not all of the machines in question are in fact embedded computers 
running inside of printers, webcams, NAS devices, set-top internet 
devices (game consoles/Netflix boxes/etc) and even industrial control 
systems.   I do not see anywhere where real computers are excluded, I 
assume that they are (mostly) self-excluded by not having a telnet port 
open and/or having more security than no password or admin/admin or 
root/root as password.


I would call this more of an exploit than a hack (if the difference 
matters)...   and the humility shown in the work and in the paper is 
surprising.   If you read deep enough, you will discover that a 
side-effect of this work was to take very limited steps to lame another 
botnet being deployed at the same time, known as Aida. All of the 
resulting data is available online ~.6TB worth...  I'll be interested in 
subsequent analysis!


My own work in the area is 6-10 years old and while I folllowed most of  
the jargon and acronyms in the paper, I felt incredibly out of date!


- Steve

This researcher/engineer
//

FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Steve Smith

On 5/1/13 9:54 AM, glen e p ropella wrote:

This Is the Most Detailed Picture of the Internet Ever (and Making it
Was Very Illegal)

http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever

The resultant map isn't perfect, but it is beautiful. Based on the
parameter's of the researcher's study, the map is already on its way to
becoming obsolete, since it shows only devices with IPv4 addresses. (The
latest standard is IPv6, but IPv4 is still pretty common.) The map is
further limited to Linux-based computers with a certain amount of
processing power. And finally, because of the parameters of the hack, it
shows some amount of bias towards naive users who don't put passwords on
their computers.


at least one of his maps seems to conflict with the XKCD gripe:
http://xkcd.com/1138/
about heat maps and normalization.

But (s)he also references XKCD as the source of his Hilbert Map.

I *told* you that XKCD is becoming an important source of reference 
information!






FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] Picture of the Internet

2013-05-01 Thread glen e p ropella

I can't help but wonder why we don't extend the virus (or infection)
metaphor all the way out.  The way viruses interact with our bodies is
pretty !@#@$@ complex.  I don't know of any naturally occurring viruses
that are (purely) beneficial.  But there are many that are, in some
sense, neutral.  It's reasonable to think there exist beneficial
viruses, analogous to probiotic gut flora.  Toss that into the hat with
endogenous retroviruses and a somewhat rebellious attitude I hear from
some people about purposefully exposing themselves to dirty contexts and
refusing to use hand sanitizers in order to keep their immune system in
good shape, and you begin to see a stark difference between the metaphor
as used in computer networks versus the real thing.  (Sheesh, is that a
run-on sentence?)

I know a few radically open advocates here in Portland who refuse to
secure their wifi access points/routers with passwords, allowing their
neighbors and passers by to access a demilitarized zone on their
network.  This results in a donation of bandwidth to the public.  But
despite their technical efforts and skills with their internal
firewalls, it still puts their network at risk.  I would think we might
extend the infection metaphor deeper and develop layers and
sub-systems of different sorts of immunity against botnet, worm, and
virus infections.  But some of them, perhaps running BOINC or like this
mapping botnet, could be considered healthy infections, perhaps even
crowding out bad infections (e.g. Aida) like the good bacteria in our guts.

On 05/01/2013 11:46 AM, Steve Smith wrote:
 I have read the paper (but only once through) and it appears that most
 if not all of the machines in question are in fact embedded computers
 running inside of printers, webcams, NAS devices, set-top internet
 devices (game consoles/Netflix boxes/etc) and even industrial control
 systems.   I do not see anywhere where real computers are excluded, I
 assume that they are (mostly) self-excluded by not having a telnet port
 open and/or having more security than no password or admin/admin or
 root/root as password.
 
 I would call this more of an exploit than a hack (if the difference
 matters)...   and the humility shown in the work and in the paper is
 surprising.   If you read deep enough, you will discover that a
 side-effect of this work was to take very limited steps to lame another
 botnet being deployed at the same time, known as Aida. All of the
 resulting data is available online ~.6TB worth...  I'll be interested in
 subsequent analysis!


-- 
glen e. p. ropella  http://tempusdictum.com  971-255-2847


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Steve Smith

Glen -

I can't help but wonder why we don't extend the virus (or infection)
metaphor all the way out.  The way viruses interact with our bodies is
pretty !@#@$@ complex.  I don't know of any naturally occurring viruses
that are (purely) beneficial.  But there are many that are, in some
sense, neutral.  It's reasonable to think there exist beneficial
viruses, analogous to probiotic gut flora.  Toss that into the hat with
endogenous retroviruses and a somewhat rebellious attitude I hear from
some people about purposefully exposing themselves to dirty contexts and
refusing to use hand sanitizers in order to keep their immune system in
good shape, and you begin to see a stark difference between the metaphor
as used in computer networks versus the real thing.  (Sheesh, is that a
run-on sentence?)
Stephanie Forrest at UNM (formerly CNLS/SFI) has done extensive work in 
this general area, I'm not up on why/how it is (not) implemented in the 
real world.   You might have known her during your time at SFI?


Last time I had an in-depth visit with her was maybe 2007 and I'm sure a 
great deal has happened since!  It seemed like a lot was funded by DARPA 
at the time and therefore some of that wasn't being published in the 
open (or was being delayed?)


http://www.cs.unm.edu/~immsec/research.htm


I know a few radically open advocates here in Portland who refuse to
secure their wifi access points/routers with passwords, allowing their
neighbors and passers by to access a demilitarized zone on their
network.  This results in a donation of bandwidth to the public.  But
despite their technical efforts and skills with their internal
firewalls, it still puts their network at risk.  I would think we might
extend the infection metaphor deeper and develop layers and
sub-systems of different sorts of immunity against botnet, worm, and
virus infections.  But some of them, perhaps running BOINC or like this
mapping botnet, could be considered healthy infections, perhaps even
crowding out bad infections (e.g. Aida) like the good bacteria in our guts.
I always leave my WiFi open and the doors to my house unlocked... both 
are considered an invitation to mischief.   All the mischief I have 
experienced in my life has been in *in spite of* such precautions... 
most house-door locks are easily defeated (and certainly are the easily 
broken windows throughout most houses without alarms/bars) as are car 
windows (smash and grab).


The aesthetic of leaving an open WiFi is not just bandwidth of course, 
but access...  I'm not trying to make it easy for my teenage neighbor to 
double his bitTorrent feeds, I'm trying to make it easy for his friend 
who visits to hop on a network and check his email without having to go 
through the (often elaborate) transaction of getting a password.


I use my internet as if it is being monitored (wait, it probably is, 
even if my wifi is locked down) just as I assume anyone who wants to can 
get into my vehicle on a whim...  (Don't leave valuables in plain sight, 
if you lock the door, they still get them, but you also have a window to 
replace now).   Convertible owners often don't lock their doors, who 
wants the top slashed just  so someone can riffle your glove box and 
look under the seats for the hidden valuables?


do you have WiFi? can I use it?
sure
I see your network requires a WPA Password, do you know it?
let me see.. my dad set that up... I think it was...
did he write it down
yuh... its around here somewhere..
do you remember a mnemonic?
yuh... it was something about his birthdate and his first pet and 
his grandmother's maiden name..

ok...  hmmm...
shuffle shuffle...
nevermind, I see your neighbor has an open WiFi, I'll just pop on that.
great!
no problem, thanks (for nuthin)

In Berkeley ca 2005, if I felt sluggish (I mean my internet), I would go 
check my DHCP logs on my router to see how many people were on it... it 
was often a significant fraction of the limit I had set of 30.   At the 
time I only typically had 1-3 devices of my own on it.  Within my reach 
there was usually 1 or 2 other open nets and dozens (there was a large 
apartment building right next door) of closed ones.   If any of the 
connections seemed to be using egregious amounts of bandwidth (this was  
802.11G) I would bump them off and block them if they came back too 
often (using big bandwidth).   If I was grumpy or in a hurry I would 
just shake everyone off and see how many came back quickly.


Fundamentally I never felt abused.  It was healthy to be reminded that 
my network traffic was transparent to anyone interested in looking (not 
just those with enough resources to tap the local/regional backbones).  
Don't send anything clear-text.  HTTPS and SSH are your friends.  Keep 
your *services* passworded, etc.


There are those who prefer to wear a belt *with* their suspenders and 
there are those that don't.


- Steve



On 05/01/2013 11:46 AM, Steve Smith wrote:

I have read the 

[FRIAM] MOOCy

2013-05-01 Thread glen e p ropella

You MOOCy people might be interested in this, if you haven't already
seen it:

Major Players in the MOOC Universe
http://chronicle.com/article/Major-Players-in-the-MOOC/138817/

I found it via:

https://plus.google.com/111474406259561102151/posts/97Y5hz8WtMu

-- 
glen e. p. ropella  http://tempusdictum.com  971-255-2847


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] Picture of the Internet

2013-05-01 Thread glen e p ropella
On 05/01/2013 03:06 PM, Steve Smith wrote:
 You might have known her during your time at SFI?
 
 Last time I had an in-depth visit with her was maybe 2007 and I'm sure a
 great deal has happened since!  It seemed like a lot was funded by DARPA
 at the time and therefore some of that wasn't being published in the
 open (or was being delayed?)

Yeah, I talked to her a number of times while I was there. It would be
interesting to find out she's continued to work on it, or if someone
else took it further.

 In Berkeley ca 2005, if I felt sluggish (I mean my internet),

I can imagine a more urban area being more problematic.  I've heard that
some ISPs include restrictions on wifi sharing in their terms of service
agreements:

http://w2.eff.org/Infrastructure/Wireless_cellular_radio/wireless_friendly_isp_list.html

-- 
glen e. p. ropella  http://tempusdictum.com  971-255-2847


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Steve Smith



In Berkeley ca 2005, if I felt sluggish (I mean my internet),

I can imagine a more urban area being more problematic.  I've heard that
some ISPs include restrictions on wifi sharing in their terms of service
agreements:

http://w2.eff.org/Infrastructure/Wireless_cellular_radio/wireless_friendly_isp_list.html
While the agreements tend to be a little vague and biased *against* the 
consumer (not a surprise given who writes them?), there *is* some common 
sense we use everywhere.   We don't take an all-you-can-eat salad bar 
plate and feed a family from it but we might give a child or a partner a 
morsel from our plate without guilt.   We don't help our neighbor tap 
our water main so they can shut off their own service but we might water 
an isolated corner of their lawn or a flowerbed that is close to our own 
but hard to reach from their own infrastructure.  We don't steal pencils 
and pens from our workplace to avoid buying them for our children's 
school or our own home desk but we don't panic when we leave work with 
one in our pocket.  We don't insure a car for a high-risk driver to use 
without putting them on the list of drivers but we might let them borrow 
our car now and again.


This seems like another form of tragedy around the commons?

So, how *do* legitimate Mesh Networks get created/propogated if access 
to the backbone is controlled by angry trolls at the gates?


I am sure that in Berkeley there were any number (probably much less 
than 50% of the households) who depended on the goodwill of folks like 
myself to avoid obtaining their own service.


On the other hand, my experience with PacBell suggests these folks felt 
that may have felt they had no good options.PacBell required that I 
sign a 12 month agreement to get internet... even though I told them I 
only planned to live there 11 months... they had no option so I took the 
12 month deal.  When it was time to leave, I tried to get them to waive 
the $200 early termination fee when I was shutting down 20 days before 
my 365...   they weren't having it.  So finally I told them I would keep 
the service until the year was up and they said that as soon as they 
detected that all my devices were disconnected from the service *they* 
would terminate my service (unattended service?), which they did, and 
then levied the $200 fee which I ignored which still plagues me 
everytime I try to refinance my house!   In the post subprime mortgage 
world, it seems a smudge as faint and explainable as that can move you 
from super-prime to questionable!  Students who likely move through 
apartments as frequently as on a semester basis are just SOL unless good 
samaritans (scofflaws?) like myself provide an alternative?


- Steve


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Steve Smith

On 5/1/13 6:16 PM, glen e p ropella wrote:

http://w2.eff.org/Infrastructure/Wireless_cellular_radio/wireless_friendly_isp_list.html

Per my last question of how is a mesh network to get started, 
propogate, etc.? the list above *does* address this somewhat...

You might have known her during your time at SFI?

Last time I had an in-depth visit with her was maybe 2007 and I'm sure a
great deal has happened since!  It seemed like a lot was funded by DARPA
at the time and therefore some of that wasn't being published in the
open (or was being delayed?)
Yeah, I talked to her a number of times while I was there. It would be
interesting to find out she's continued to work on it, or if someone
else took it further.

From her CV, here are the things I guess she is working on now!

   Defense Advanced Research Projects Agency ($3,200,625) \Scalable
   RADAR for Co-evolutionary
   Adversarial Environments S. Forrest (PI), J. Crandall, M. Moses, W.
   Weimer (Co-PIs).
   2010-2014.

   National Science Foundation (UNM share $ 500,000) \Collaborative
   Research: Search, Signals
   and Information Exchange in Distributed Biological Systems. M.
   Moses (PI); S. Forrest,
   D. Gordon (Co-PIs). 2010-2013.

   Air Force Oce of Scientic Research DURIP-10-054 ($58,189) \Helix
   Project Testbed: To-
   wards the Self-Regenerative Incorruptible Enterprise. 2010.

   Department of Energy (UNM share $600,000) ASIM: An integrated
   agent-based model of a
   complex network S. Hofmeyr (PI), S. Forrest (Co-PI). 2009-2012.

   National Science Foundation ($ 600,000) \Fixing real bugs in real
   programs using evolutionary
   algorithms. W. Weimer (PI), S. Forrest (Co-PI). 2009-2012.





FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Russell Standish
On Wed, May 01, 2013 at 07:00:12PM -0600, Steve Smith wrote:
 
 On the other hand, my experience with PacBell suggests these folks
 felt that may have felt they had no good options.PacBell
 required that I sign a 12 month agreement to get internet... even
 though I told them I only planned to live there 11 months... they
 had no option so I took the 12 month deal.  When it was time to
 leave, I tried to get them to waive the $200 early termination fee
 when I was shutting down 20 days before my 365...   they weren't
 having it.  So finally I told them I would keep the service until
 the year was up and they said that as soon as they detected that all
 my devices were disconnected from the service *they* would terminate
 my service (unattended service?), which they did, and then levied
 the $200 fee which I ignored which still plagues me everytime I try
 to refinance my house!   In the post subprime mortgage world, it
 seems a smudge as faint and explainable as that can move you from
 super-prime to questionable!  Students who likely move through
 apartments as frequently as on a semester basis are just SOL unless
 good samaritans (scofflaws?) like myself provide an alternative?
 

That is so daft. I can understand them not refunding the remainder of
the 12 month contract, but to levy an early termination fee when the
pro-rata refundable amount is less than the levy is crazy.

How long a period of disconnection counts as an unattended service
anyway? I regularly power down all my computers, routers, phones etc.,
when going on extended holidays (more than a few days), partly as a
green measure to prevent unnecessary usage of electricity, but also as
prevention against hackers, lightning strikes and other calamities.

If that were in Australia, you'd lodge an objection with the ACCC. And
I'd expect you'd win.

Cheers
-- 


Prof Russell Standish  Phone 0425 253119 (mobile)
Principal, High Performance Coders
Visiting Professor of Mathematics  hpco...@hpcoders.com.au
University of New South Wales  http://www.hpcoders.com.au



FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


Re: [FRIAM] MOOCy

2013-05-01 Thread Owen Densmore
Loved the graph.  Fascinating to see the interconnections.

   -- Owen


On Wed, May 1, 2013 at 4:58 PM, glen e p ropella g...@tempusdictum.comwrote:


 You MOOCy people might be interested in this, if you haven't already
 seen it:

 Major Players in the MOOC Universe
 http://chronicle.com/article/Major-Players-in-the-MOOC/138817/

 I found it via:

 https://plus.google.com/111474406259561102151/posts/97Y5hz8WtMu

 --
 glen e. p. ropella  http://tempusdictum.com  971-255-2847

 
 FRIAM Applied Complexity Group listserv
 Meets Fridays 9a-11:30 at cafe at St. John's College
 to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Re: [FRIAM] Picture of the Internet

2013-05-01 Thread Marcus G. Daniels

On 5/1/13 3:39 PM, glen e p ropella wrote:

I would think we might
extend the infection metaphor deeper and develop layers and
sub-systems of different sorts of immunity against botnet, worm, and
virus infections.  But some of them, perhaps running BOINC or like this
mapping botnet, could be considered healthy infections, perhaps even
crowding out bad infections (e.g. Aida) like the good bacteria in our guts.

What is good or bad?  If someone installs an internet webcam without a 
password, why would they expect internet users not to reach that 
webcam?   If someone installs a set-top box to a cable TV coax, do they 
seriously not expect that their viewing habits won't be recordable?


Immunity to the bad first has to determine that something can even be 
defined to be bad.   When a person shops at a mall, do they expect to be 
anonymous?  If so, I hope they wear dark glasses and a trench coat!   Or 
if they go to a favorite restaurant and the waiter asks The usual?  
should they be alarmed?What's the general immunity here?   
Choosing to be conversational or aloof is personality trait, not a 
universal.   If the waiter doesn't ask a second time, that's a choice of 
the waiter, presumably a function of the model they've inferred of their 
patron's behavior.


In so far as computing environments, or operating systems, are 
concerned, I think the goal should be to state a clear security model 
and implement it correctly.   I think these evolutionary layers are 
just a way of saying, Golly, we just don't understand what we want or 
how to implement it.


If the goal is to have a open negotiation process between all kinds of 
agents over scheduling, that's a novel use case for connected devices.  
But I'd say most people aren't interested in facilitating computational 
internet terrariums (though that would be neat). That there exist 
botnets is just to say there exist exploitable bugs, and that users have 
a poor understanding of what they expect -- that there exist careless 
and irresponsible people.


Marcus


FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com


[FRIAM] API alternative?

2013-05-01 Thread Owen Densmore
From twitter: Anyone have a better word/phrase for API -- Application
Programming Interface?  Nick, this should be great for the Village
Pragmatist.

*Jeremy Ashkenas* @jashkenas
https://twitter.com/jashkenas4hhttps://twitter.com/jashkenas/status/329730992791240704

Wanted: A better word for “API”. When talking about the interface that code
exposes to the reader/user/programmer, API works, but is jargony

FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com