"identity" entries

Four short links: 17 February 2012

Four short links: 17 February 2012

Predictive Surprises, Javascript Checking, Web Caching, and Security Through Clinical Kills

  1. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did — predictive analytics moves faster than family communications. (via Sara Winge)
  2. JSHint — a tool to detect errors and potential problems in JavaScript code. (via Hacker News)
  3. Web Caching Tutorial — explanation of the technical ins and outs of web caching.
  4. Gatekeeper — Apple’s new app security technology for Mac OS X. Identity, general purpose computing, security, and third-party kill switches all in the one technology. (via John Gruber)
Four short links: 19 December 2011

Four short links: 19 December 2011

Version Control, Web-based ID, Mobile Design, and Node.js Tools

  1. The History of Version Control (Francis Irving) — concise history of the key advances in managing source code versions. Worth it just for the delicious apposition of “history” and “version control”.
  2. BrowserID — Mozilla’s authentication solution. BrowserID aims to provide a secure way of proving your identity to servers across the Internet, without having to create separate usernames and passwords each time. Instead of a new username, it uses your email address as your identity which allows it to be decentralized since anyone can send you an email verification message. It’s currently implemented via JavaScript but hopefully it will be built into the browser in the future. (via Nelson Minar)
  3. A Look Inside Mobile Design Patterns — Sample chapter on how different apps handle invitations, from a new [O’Reilly-published, huzzah!] book on mobile design patterns. (via David Kaneda)
  4. Node Toolbox — concise compendium of resources for node.js development.

Demoting Halder: A wild look at social tracking and sentiment analysis

You no longer have control over where a first impression occurs.

My short story, "Demoting Halder," was supposed to lay out an alternative reality where social tracking and sentiment analysis had taken over society. As the story evolved, I wondered if the reality in the story is something we're living right now.

Visualization of the Week: Visualizing the Library Catalog

WorldCat has a new visualization tool to show relationships between objects in the catalog

The WorldCat Identity Network creates an interactive map where users can see how authors and characters are related.

A Manhattan Project for online identity

A look at the White House's National Strategy for Trusted Identities in Cyberspace.

The U.S. government's National Strategy for Trusted Identities in Cyberspace addresses key issues around identity, privacy and security. Implementation, however, will require significant effort and innovation from the private sector.

The tricky mix of payment, identity and trust

Online payment requires confirmed identity, but who sees what is an open question.

Report excerpt: Online payment providers need to be sure you are who you say you are, but that's just the beginning. Is it possible to lead an active social life online and still have control over your online identity?

Susan Landau explores Internet security and the attribution problem

Landau, a noted privacy advocate, is seeking new technologies and new
policies to identify people on the Internet without onerous effects on privacy.

Being online: Conclusion–identity narratives

Identity online is created by combining many discrete items into a
coherent picture. This concluding section of the article suggests that
Social networking gives individuals more control over the picture.

Being online: Group identities and social network identities

Groups take on their own identities online, and social networks
threaten to subsume individual identities into groups. This section
of the identity article explores grouping in all its online facets.

Being online: Forged identities and non-identities

Creating a fake identity used to be more popular than it is now, but
some people have still hidden who they are when going online. This
section of the identity article covers some ways they do it.