• Blog
  • Team
    • David Gurlé, founder, CEO
    • <quote>founder of Microsoft’s Real Time Communications division, that worked on Windows Messenger and Exchange IM</quote> ref
  • Product:
    • something about
      • <quote>communication tools such as email, SMS, MMS, IM, Chat Rooms, Presence, Social Networks and Forums</quote>
      • Differentiator: use of 2048-bit RSA encryption
    • Android & iOS
    • something about
    • Launch announcement 2013-08-13
  • Observations & Awards:


Via: backfill

C++ Formatting Libraries


Application: integer-to-string conversion

  1. sprintf
  2. std::stringstream
  3. std::to_string from C++11
  4. boost::format from the Boost Format library
  5. boost::lexical_cast
  6. karma::generate from the Boost Spirit Parser framework
  7. fmt::Writer from the format library
  8. fmt::Format from the format library
  9. Public-domain ltoa implementation
  10. decimal_from function suggested by Alf P. Steinbach
  11. fmt::FormatInt from the format library

Via: Victor Zverovich; Fast integer to string conversion in C++; In His Blog; 2013-09-07.


C Stdio:
printf("%s, %s %d\n", weekday, month, day);

std::cout << weekday << ", " << month << " " << day << "\n";

Boost Format:
std::string s = str(boost::format("%1%, %2% %3%\n") % weekday % month % day);

Loki::SPrintf(s, "%s, %d %d\n")(weekday)(month)(day);

std::string s = str(fmt::Format("{0}, {1} {2}\n") << weekday << month << day);
ReportError("File not found: {0}") << path;


Via: backfill


Breaking for Commercials: Characterizing Mobile Advertising | Vallina-Rodriguez, Shah, Finamore, Grunenberger, Haddadi, Papagiannaki, Crowcroft

Narseo Vallina-Rodriguez, Jay Shah, Alessandro Finamore, Yan Grunenberger, Hamed Haddadi, Konstantina Papagiannaki, John Crowcroft; Breaking for Commercials: Characterizing Mobile Advertising; In Proceedings of the 2012 ACM Internet Measurement Conference (IMC ’12); 2012; 14 pages.


Mobile phones and tablets can be considered as the first incarnation of the post-PC era. Their explosive adoption rate has been driven by a number of factors, with the most signifcant influence being applications (apps) and app markets. Individuals and organizations are able to develop and publish apps, and the most popular form of monetization is mobile advertising.

The mobile advertisement (ad) ecosystem has been the target of prior research, but these works typically focused on a small set of apps or are from a user privacy perspective. In this work we make use of a unique, anonymized data set corresponding to one day of traffic for a major European mobile carrier with more than 3 million subscribers. We further take a principled approach to characterize mobile ad traffic along a number of dimensions, such as overall traffic, frequency, as well as possible implications in terms of energy on a mobile device.

Our analysis demonstrates a number of inefficiencies in today’s ad delivery. We discuss the benefits of well-known techniques, such as pre-fetching and caching, to limit the energy and net work signalling overhead caused by current systems. A prototype implementation on Android devices demonstrates an improvement of 50% in terms of energy consumption for offline ad-sponsored apps while limiting the amount of ad related traffic.



Perzo | This Connection is Untrusted

Nothing says “The Web is Misconfigured” quite like a security protocol failure notice. All the more poignant because the product offering is “free” SaaS for state of art of today’s communication tools such as email, SMS, MMS, IM, Chat Rooms, Presence, Social Networks and Forums

ZaReason Valta X79i & Valta X79 Eyefinity

Multi-Monitor setup with ZaReason Valta X79 X6 AMD FirePro W9000

You want the Eyefinity option and 4x-6x DisplayPort-capable 2560×1600 monitors (e.g. HP ZR30w)



Via: backfill

JavaScript checkers & linters

CAMEO: A Middleware for Mobile Advertisement Delivery | Khan, Jayarajah, Han, Misra, Balan, Seshan

Azeem J. Khan, Kasthuri Jayarajah, Dongsu Han, Archan Misra, Rajesh Balan, Srinivasan Seshan; CAMEO: A Middleware for Mobile Advertisement Delivery; In Proceedings of the 11th International Conference On Mobile Systems, Applications, And Services (MobiSys ’13); 2013-06-25; 13 pages.


Advertisements are the de-facto currency of the Internet with many popular applications (e.g. Angry Birds) and online services (e.g., YouTube) relying on advertisement generated revenue. However, the current economic models and mechanisms for mobile advertising are fundamentally not sustainable and far from ideal. In particular, as we show, applications which use mobile advertising are capable of using significant amounts of a mobile users’ critical resources without being controlled or held accountable. This paper seeks to redress this situation by enabling advertisement supported applications to become significantly more “user-friendly”. To this end, we present the design and implementation of CAMEO, a new framework for mobile advertising that

  1. employs intelligent and proactive retrieval of advertisements, using context prediction, to significantly reduce the bandwidth and energy overheads of advertising, and
  2. provides a negotiation protocol and framework that empowers applications to subsidize their data traffic costs by “bartering” their advertisement rights for access bandwidth from mobile ISPs.

Our evaluation, that uses real mobile advertising data collected from around the globe, demonstrates that CAMEO effectively reduces the resource consumption caused by mobile advertising.



  • CAMEO => Context-Aware Advertising Mediator and Optimizer
  • ANAS => AN Advertisement Selection
  • LAS => Local Advertisement Selection
  • BEAS => Best Effort Advertisement Selection


  • Context Predictor
  • Advertisement Manager
  • ISP Negotiator
  • Accounting and Verification module


See the paper.

Online Advertising Business 101 | Ian Thomas

Ian Thomas (Microsoft); Online Advertising Business 101; In Some Blog entitled Lies, Damned Lies…; 2008-06-02 -> 2010-06-07

Dynamic Adaptive Streaming over HTTP (DASH)



  • MPEG-DASH Media Presentation Description (MPD)


  • Adaptive HTTP streaming (AHS) in 3GPP Release 9
  • HTTP Adaptive Streaming (HAS) in Open IPTV Forum Release 2.


  • Adobe Systems, HTTP Dynamic Streaming,
  • Apple, HTTP Live Streaming (HLS)
  • Microsoft Smooth Streaming.



  • Use Cases
    • On-Demand
    • Live
  • Ad insertion. Advertisements can be inserted as a period between periods or segment between segments in both on-demand and live cases.
  • CDN
    • Multiple URL
    • CCN (CCNx)
  • Codec
    • Agnostic
    • Common Encryption
    • Multiple DRM
  • Coding
    • Scalable Video Coding (SVC)
    • Multiview Video Coding (MVC)


Via: backfill



  • Express the computation as a a graph
  • Use a graph expression lanaguage (DSL) to express maintain the graph
  • Use a graph drawing tool to express & maintain the graph


  • Apple Quartz Composer
  • LabView
  • Yahoo! Pipes
  • Storm
  • …any dataflow language…



  • The Grid
    • $1.8M funding “hoped for”


NoFlo Talks


  • Flow-Based Programming; at Jimi Wales’ Wiki
  • J. Paul Morrison; Data Responsive Modular, Interleaved Task Programming System; In IBM Technical Disclosure Bulletin; Vol. 13, No. 8, pages 2425-2426; 1971-01; paywalled.
    Abstract: Reduced programming costs and earlier productivity of new programmers are achieved with a composite data processing program consisting of an assembly of prewritten and custom-written MODULES such as 3-8, communicating by data elements passing through QUEUES such as 11-15, which can each store some number (called its CAPACITY) of data elements. Each module (e.g. 6) is a program which performs a data processing task such as COLLATE, PRINT REPORTS, READ TAPE, and EDIT CARDS on a data element presented to it by SCHEDULER 20 via a queue (e.g. 13). Scheduler 20 activates modules (e.g. 6) on the basis of availability of data elements for processing by the modules, service requests by the modules for data handling, and checks for completion of external events.
  • J. Paul Morrison; Flow-Based Programming Bibliography
  • Thomas Kuhn, The Structure of Scientific Revolutions

    • it’s a new paradigm,
    • which is categorically rejected by the old guard
    • but will win out “in the long run” because … it’s better.




  • a VPN
    • for pay based on bandwidth/month
  • Support
    • Android
    • iOS
    • Windows
    • OS/X
  • Benefits Alleged
    • “Simple”
      • on or off
      • Country masquerade
    • Prophylaxis against “social sharing”
      • Facebook
      • Twitter
      • Linkedin’s Intro ref
      • Something vague about maybe blocking ad tracking
    • Consumer-grade privacy


  • Toronto CA
  • private funding


  • Ryan Dochuk, co-founder, CEO




Mentioned Within

Via: backfill

N3580: Concepts Lite | Sutton, Stoustrup, Dos Reis

Concepts Lite

Via: backfill

The Dark Mail Alliance of Lavabit & Silent Circle




  • Jon Callas, CTO, Silent Circle
  • Ladar Levison, founder, Lavabit



In archaeological order, derivaties and copypaste on top, original work further below

Via: backfill

Deep Links



  • URL =>
  • URI => profile://user123.



Organized along the great cultures






Cellogic (

  •, an ad retargeting network
  • Nextap (
  • Concept: “ for deep linking”
  • Specifications
    • 300×50 template
    • app badge icon
    • custom message
    • link
  • Who
    • Itamar Weisbrod, CEO
    • Noah Klausman, VP of Business Development
  • Previously



  • By Zwapp
  • open source
  • a database (unpublished) custom URL schemes for iOS applications
  • a downloadable tool
  • scans your iOS device looking for URLs


  • By Pocket Pixels, a photo app, iOS only
  • Older
  • Something about integrating photo sharing & editing web apps
  • iOS (iPhone) only
  • Source Code
  • Supported Apps
    • Original
    • Follow on
      • AutoStitch,
      • Click!,
      • Color Splash,
      • Juxtaposer,
      • PicTools,
      • Photogene,
      • Simply B&W,
      • Snap!,
      • TrueHDR.
  • Promotions



  • Mobile ad retargeting
  • Outreach
  • Promotion
    • Surely …



  • Mobile App Deeplink Retargeting
  • URX Mobile App Retargeting
  • Outreach
  • Founding
  • Funding
    • Y Combinator Summer 2012
    • $3.1 million seed round
    • Include First Round Capital, Maverick Capital, Google Ventures, SV Angel, Betaworks, Crunchfund (Michael Arrington), Greylock, CyberAgent, Fuel Capital, Garry Tan, Alexis Ohanian, Charlie Cheever, Sam Altman, Paul Bucheit, Geoff Ralston, Gus Fuldner, Plug & Play Ventures, Paul Sethi, Bill Peckovich, Joe Montana, Mehul Nariyawal, Dalton Caldwell, Virginia Turner, Andre Ranadive, Linda MacKenzie, Jamie Lee Curtis, Christopher Guest, Sumon Sadhu, Bruno Bowden, Chris Look, Nicholas Smith, and the Erickson Family.
  • Reference Customer
    • LivingSocial
  • Promotions


of the genre

Via: backfill, backfill, backfill



  • Chartbeat
    • Tony Haile, CEO
    • New York
  • <quote>Chartbeat enables websites to see how many concurrent visitors they have at a given moment and shows, in real-time, which articles are most popular. This instant feedback can help sites maximize their traffic through tactics like story placement and social media.</quote>
  • Revenue streams beyond advertising, for journalism


  • Tony Haile, CEO
  • Alex Carusillo, a product manager


Chartbeat last year raised $3 million in venture backing from

  • Index Ventures,
  • Ron Conway,
  • Jeff Clavier,
  • JasonCalacanis,
  • Lowercase Capital,
    • Chris Sacca
  • Betaworks.


2011-04-28(ish) this week the company experienced a double whammy


“Engaged Time” on a page

Source: Ad Age, 2013-03-18


Via: backfill

A Critique Of Lavabit | Moxie Marlinspike

Moxie Marlinspike; A Critique Of Lavabit; In His Blog; at In His Blog at; 2013-11-05.


Moxie Marlinspike; Op-ed: Lavabit’s primary security claim wasn’t actually true; In Ars Technica; 2013-11-06.
Teaser: Ladar Levison stood up for users’ privacy—but perhaps a little too late.



  • <quote>Unfortunately, Lavabit’s primary security claim wasn’t actually true. As Ladar himself explained in this blog post, the system consisted of four basic steps:
    1. At account creation time, the user selected a login passphrase and transmitted it to the server.
    2. The server generated a keypair for that user, encrypted the private key with the login passphrase the user had selected, and stored it on the server.
    3. For every incoming e-mail the user received, the server would encrypt it with the user’s public key, and store it on the server.
    4. When the user wanted to retrieve an e-mail, they would transmit their password to the server, which would avert its eyes from the plaintext encryption password it had just received, use it to decrypt the private key (averting its eyes), use the private key to decrypt the e-mail (again averting its eyes), and transmit the plaintext e-mail to the user (averting its eyes one last time).</quote>


  • <quote>The cryptography was nothing more than a lot of overhead and some shorthand for a promise not to peek</quote>
  • <quote>Perhaps we’re just not reading between the lines, and all this handwaving was a ruse designed to trick the legal system (by claiming it was “unable” to respond to subpoenas) rather than a ruse designed to trick Lavabit’s users. That could have been a plausible experiment to try, but Hushmail already tried the exact same experiment a decade earlier and met the exact same fate.</quote>
  • <quote>It’s not clear whether the Lavabit crew consciously understood the system’s shortcomings and chose to misrepresent them, or if it really believed it built something based on can’t rather than won’t. One way or the other, in the security world, a product that uses the language of cryptography to fundamentally misrepresent its capabilities is the basic definition of snake oil.</quote>


Via: backfill