Booking a reservation through Seated will give you Lyft credits

Most ride-hailing and restaurant partnerships like UberEATS were designed to deliver you food, but Lyft’s new collaboration is the other way around. The ride-hailing firm is now a reward option for Seated, a restaurant discovery app for iOS and Android that pays you for dining out. Whenever you make a reservation with Seated, you can get between $10 and $50 in Lyft credits, depending on the size of your party and your dining time.

Based on a Morgan Stanley report last year, 43 percent of people who order food for delivery see it as a replacement for restaurant meals. You’d think the increasing number of people ordering food for delivery is a good thing, but that might not be the case: third-party platforms and carriers could be taking between 20 and 40 percent of the delivery revenue. This partnership aims to entice more people to dine out and to create more loyal customers. The hope is likely to create a cycle of booking meals with restaurants in the Seated app and using Lyft rewards to go there.

Seated chief Brice Gumpel said in a statement:

"This partnership simplifies the dining out experience by removing its biggest roadblock – just getting there. People can now use their Lyft credits to cover any future rides, including those to and from the new restaurants they try on Seated."

The partners are giving away $1 million in rewards where Seated is available: Atlanta, Austin, Boston, Chicago, Washington DC, Denver, Los Angeles, Miami, New York (including Brooklyn), Philadelphia and San Francisco. New Seated customers can also get $10 in Lyft credits by making their first reservation and using the promo code LYFTxSEATED.

from Engadget

Posted in Uncategorized | Tagged , | Leave a comment

Science has a solution for that constant ringing in your ear

Apparently, around 2 million Americans can’t work because of tinnitus, and it’s also the most common service-connected disability in veterans. The condition doesn’t have a cure yet, but those suffering from it might not have to endure all the phantom ringing, clicking and hissing for life, thanks to a device developed by researchers from the University of Michigan. Their creation treats tinnitus by using precisely timed sounds and weak electrical pulses designed to persuade damaged nerves in the region of the brainstem called dorsal cochlear nucleus into working correctly again.

Team leader and U-M Medical School professor Susan Shore explained:

"When the main neurons in [the dorsal cochlear nucleus], called fusiform cells, become hyperactive and synchronize with one another, the phantom signal is transmitted into other centers where perception occurs.

If we can stop these signals, we can stop tinnitus. That is what our approach attempts to do…"

The team tested the small, box-like device on guinea pigs first before testing it on 20 tinnitus patients who used it 30 minutes every day for four weeks. It played a sound into the ears and alternated it with precisely timed, mild electrical pulses to the cheek or neck for half the patients. The other half only received sounds. They found that the loudness of the phantom sounds decreased by 12 decibels — that’s as loud as the hum of a light bulb — in some of the patients who received both sounds and electrical pulses. A couple of subjects even said their tinnitus disappeared completely. However, those who only received sounds didn’t report a change in their condition.

Due to the way their device works, it can only treat somatic tinnitus. People who have this variant can modulate the phantom ringing/hissing they hear by pressing a part of their face and forehead or clenching their jaw. Thankfully, studies say two-thirds of tinnitus patients suffer from somatic forms of the condition, making their device a promising treatment for most people. The researchers are trying to find a way to make it work just as well for nonsomatic patients, though. They’re also conducting more studies and tests to figure out how to make its effects last longer, since the testers’ symptoms came back after a couple of weeks.

Shore said:

"We’re definitely encouraged by these results, but we need to optimize the length of treatments, identify which subgroups of patients may benefit most, and determine if this approach works in patients who have nonsomatic forms of the condition that can’t be modulated by head and neck maneuvers."

Source: University of Michigan (1), (2)

from Engadget

Posted in Uncategorized | Tagged , | Leave a comment

Homeland Security Thinks DJI Is Using Its Drones to Spy on America

Screenshot: FX

Various members of the Trump administration, including the president himself, are famous for buying into crazy conspiracy theories. Now, the Los Angeles office of Homeland Security’s Immigration and Customs Enforcement (ICE) has come up with a whopper of its own. These guys think China is spying on unsuspecting Americans with DJI drones.

The New York Times just reported on an August memo from Homeland Security Investigations claiming that DJI is likely collecting sensitive data from its commercial drones in the United States and sharing it with the Chinese government. Largely citing “a reliable source within the unmanned aerial systems (UAS) industry,” the memo specifically suggests that DJI is targeting law enforcement, military, and infrastructure builders in such a way that the intelligence collected would enable China to launch cyber or even physical attacks more easily. And on top of that, the Homeland Security investigators also claim that DJI is using data gathered by drones to game markets, since they potentially gather data about farms, shipping facilities, and so forth. It all sounds pretty bonkers to be honest.


DJI flatly denied these claims and told the Times that the memo is “based on clearly false and misleading claims.” The company wasn’t reserved in its objection, either. “The allegations in the bulletin are so profoundly wrong as a factual matter that ICE should consider withdrawing it, or at least correcting its unsupportable assertions,” DJI told the paper.

But if you believe the conspiracy, you probably think that this is exactly what a Chinese government puppet company would say. Of course DJI would claim that American investigators are “profoundly wrong,” you might say. The truth could start World War III, you may think.

Then again, the ICE memo makes some pretty outlandish claims. While DJI is perhaps most famous for its consumer drones, the company amped up its commercial drone business after the Federal Aviation Administration (FAA) legalized the use of commercial drones in 2014. However, ICE and the Homeland Security investigators now claim that DJI is going after specific markets in order to sabotage and potentially mount an attack on the US. From the memo:

DJI is particularly interested in exploiting data from two critical infrastructure sectors: U.S. railroads and utilities. … DJI is inviting key customers to attend training sessions and conferences to further encourage U.S. companies to purchase and use DJI systems

Is it a conspiracy? Or is it simple marketing? You decide.

Here’s another whopper. Because random American business are buying DJI drones and using them for business purposes, the Homeland Security investigators suggest that the company is sending the data collected by these drones to the Chinese government and using them for China’s own commercial purposes. From the memo:

Furthermore, the Chinese government is likely using information acquired from DJI systems as a way to target assets they are planning to purchase. For instance, a large family-owned wine producer in California purchased DJI UAS to survey its vineyards and monitor grape production. Soon afterwards, Chinese companies began purchasing vineyards in the same area. According to the , it appeared the companies were able to use DJI data to their own benefit and profit.

Conspiracy? Or coincidence? You be the judge.

And the memo ends with what is perhaps the most Trumpian conclusion of them all. It involves the terrorists. From the memo:

SIP Los Angeles assesses with high confidence the critical infrastructure and law enforcement entities using DJI systems are collecting sensitive intelligence that the Chinese government could use to conduct physical or cyber attacks against the United States and its population. Alternatively, China could provide DJI information to terrorist organizations, hostile non-state entities, or state-sponsored groups to coordinate attacks against U.S. critical infrastructure.

Any rational person will admit that the data gathered from drones could be shared with government organizations or others. Sure, those organizations could decide to do bad things with this information, and the outcome could affect American citizens in a negative way. But you could say the same thing about cell phone data or fitness tracker data or internet browsing data. As one Gizmodo editor suggested, the difference between reality and the conspiracy-minded conclusions this memo jumps to is like the difference between saying “consumer cell phones have security vulnerabilities” and “my iPhone is listening to me and serving me Adidas ads.” The latter is possible, but there doesn’t appear to be any proof.


In this case, DJI insists that its customers “have total control over whether to upload data, such as flight plans and video, to the company’s servers,” according to The New York Times. It’s worth pointing out that DJI did face some security vulnerabilities that potentially allowed third parties to intercept some data. This led to the US Army to stop using its drones and for DJI to release a new “local data mode” that prevented data from being transmitted. It’s still a hell of a leap to suggest that DJI itself is surreptitiously intercepting data and sharing it with the Chinese government, possibly for military purposes. The idea simply sounds like a conspiracy theory, based on the information in the ICE memo.

The fact that one office of Homeland Security Investigations released a memo a few months ago doesn’t necessarily mean that anything is going to happen. There’s no indication that customs officials will halt the import of DJI drones or that the FBI will launch an investigation into the matter. Such outcomes seem unlikely since so much time has passed since the memo was first distributed. Then again, conspiracy theorists would have you believe that this was the plan all along. Nobody knows about the real investigation because the Chinese government’s keeping it secret by manipulating the microchips in our Chinese-made smartphones. That’s the real conspiracy, man. The microchips…

[New York Times]

from Gizmodo

Posted in Uncategorized | Tagged , | Leave a comment

Tensorflow Tutorial Uses Python

Around the Hackaday secret bunker, we’ve been talking quite a bit about machine learning and neural networks. There’s been a lot of renewed interest in the topic recently because of the success of TensorFlow. If you are adept at Python and remember your high school algebra, you might enjoy [Oliver Holloway’s] tutorial on getting started with Tensorflow in Python.

[Oliver] gives links on how to do the setup with notes on Python versions. Then he shows some basic setup operations. From there, he has the software “learn” how to classify random points that either fall into a circle or don’t. Granted, this is easy enough to do with traditional programming, so it isn’t a great practical example, but it is illustrative for learning purposes.

Given that it is easy to algorithmically decide which points are in the circle and which are not, it is simple to develop training data. It is also easy to look at the result and see how close it is to the actual circle. You’ll see that it takes a lot of slow learning before the result space looks like a circle and not a triangle or some other odd shape.

When we discuss neural networks, this is always the hitch. In a broad sense, there is no problem solvable with a neural network that isn’t solvable using traditional techniques. But for hard problems, it can be difficult to figure out how to apply those traditional techniques. For example, speech recognition without machine learning is possible, but using these techniques results in better speech recognition by simply training. The upside is that the neural network is effective and lower effort than trying to develop heuristics manually, while the downside is that you aren’t really in control of what the code is doing.

The question that always comes up is that of how similar to our brains are the neural networks. Most of us would say not very much, and now there is some evidence that your brain is using a mechanism closer to that of a quantum computer. One thing seems clear, though. If you build a computer that thinks like a human, it will probably have all the same flaws that human thinkers have.This  may cause a problem, despite making good Star Trek episodes.

We’ve published our own getting started guide, but you never know which one will give you that “Aha!” moment. If you want the quickest possible introduction, be prepared to spend ten minutes.

Filed under: Software Hacks

from Hack a Day

Posted in Uncategorized | Tagged , | Leave a comment

Medieval city plan generator

The Medieval city generator does just that, with the right balance of abstraction and detail to give your imagination space to put it to good use. (previously)

This application generates a random medieval city layout of a requested size. The generation method is rather arbitrary, the goal is to produce a nice looking map, not an accurate model of a city. Maybe in the future I’ll use its code as a basis for some game or maybe not.

Click one of the buttons to create a new city map of a desired size. Hover the mouse pointer over a building to see the type of the ward it belongs to. Press and hold SPACE to see all ward labels.

Toy Town is a 3d-visualizer for this generator. One day it may become a separate native application or a part of the generator, or both.

from Boing Boing

Posted in Uncategorized | Tagged , | Leave a comment

ESP8266 Home Monitor Is Stylishly Simplistic

It’s often said that “Less is More”, and we think that the chic ESP8266 environmental monitor posted by Thingiverse user [bkpsu] definitely fits the bill. Dubbed “Kube”, the device is a 3D printed white cube with an OLED display in the center, which [bkpsu] says was designed specifically for the approval of his wife. Weirdly, she didn’t like the look of bare PCBs on the wall.

Multiple Kubes allow for whole-house monitoring.

Inside, things are a little more complex. The Kube uses the NodeMCU development board, and a custom breakout that [bkpsu] designed to interface with the display and sensors. For temperature and humidity monitoring, the Kube is using the ever-popular DHT22, and [bkpsu] mentions that he has future plans for things like motion sensors and direct control of RGB LED strips. All the data collected by the Kube is piped into openHAB via MQTT.

On the very detailed Thingiverse page, [bkpsu] gives background information on his design goals for the project, tips for printing out a high-quality case, a parts list with Amazon links, and pinout information for getting it all wired up. The PCB is even available on OSH Park for those who want a Kube of their own.

Even with all the stick home monitoring and automation products on the market today, many hackers simply can’t bring themselves to buying a turn-key commercial product. But we think with the results hackers have been getting rolling their own solutions, they just might be on to something.

Filed under: green hacks, hardware, home hacks

from Hack a Day

Posted in Uncategorized | Tagged , | Leave a comment

Fluid Simulations in the Kitchen Sink

In an age of ultra-powerful GPUs and cheap processors, computational techniques which were once only available to those with a government-sized R&D budgets are now available to the everyday hacker. An example of industry buzzword turned desktop software is the field of “computational fluid dynamics”, which put simply allow modeling how gasses or liquids will behave when moving through a cavity under specific conditions. Extensive utilization of these fluid simulations are often cited as one of breakthrough techniques which allowed SpaceX to develop their engine technology so rapidly when compared to Apollo and Shuttle era methods.

But just because anyone with a decent computer has access to the technology used for developing rocket engines doesn’t mean they have to use it. What if you prefer to do things the old-fashioned way? Or what if, let’s me honest, you just can’t figure out how to use software like Autodesk CFD and OpenFOAM? That’s exactly where [Desi Quintans] found himself when developing GUST, his cooling duct for i3-type 3D printers.

[Desi] tried to get the big name fluid simulation projects working with his prototype designs for an improved cooling duct, but had no end of trouble. Either the learning curve was too steep, or the simulation wasn’t accurate enough to give him any useful data. But remembering that air is itself a fluid, [Desi] took his simulation from the computer to the sink in order to better visualize what his cooling duct was doing to the airflow.

[Desi] printed up a box with a hole in the bottom that would connect up to his nozzles under test. As the volume of water in the box would be a constant between tests, he reasoned that this would allow him to evaluate the different nozzles at the same pressure. Sure enough, he found that the original nozzle design he was using caused chaotic water flow, which backed up what he was seeing in his experiments when mounted onto the printer.

After several iterations he was able to tame the flow of water by using internal baffles and fins, which when tested in water created something of a laminar flow effect. When he tried this version on the printer, he saw a clear improvement in part cooling, verifying that the behavior of the air and water was close enough for his purposes.

We’ve seen other projects that successfully used fluid simulations in their design before, but the quick and dirty test procedure [Desi] came up with certainly has its charms.

Filed under: 3d Printer hacks, hardware

from Hack a Day

Posted in Uncategorized | Tagged , | Leave a comment