- How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did — predictive analytics moves faster than family communications. (via Sara Winge)
- JSHint — a tool to detect errors and potential problems in JavaScript code. (via Hacker News)
- Web Caching Tutorial — explanation of the technical ins and outs of web caching.
- Gatekeeper — Apple’s new app security technology for Mac OS X. Identity, general purpose computing, security, and third-party kill switches all in the one technology. (via John Gruber)
"identity" entries
Four short links: 17 February 2012
Predictive Surprises, Javascript Checking, Web Caching, and Security Through Clinical Kills
Four short links: 19 December 2011
Version Control, Web-based ID, Mobile Design, and Node.js Tools
- The History of Version Control (Francis Irving) — concise history of the key advances in managing source code versions. Worth it just for the delicious apposition of “history” and “version control”.
- BrowserID — Mozilla’s authentication solution. BrowserID aims to provide a secure way of proving your identity to servers across the Internet, without having to create separate usernames and passwords each time. Instead of a new username, it uses your email address as your identity which allows it to be decentralized since anyone can send you an email verification message. It’s currently implemented via JavaScript but hopefully it will be built into the browser in the future. (via Nelson Minar)
- A Look Inside Mobile Design Patterns — Sample chapter on how different apps handle invitations, from a new [O’Reilly-published, huzzah!] book on mobile design patterns. (via David Kaneda)
- Node Toolbox — concise compendium of resources for node.js development.
Demoting Halder: A wild look at social tracking and sentiment analysis
You no longer have control over where a first impression occurs.
My short story, "Demoting Halder," was supposed to lay out an alternative reality where social tracking and sentiment analysis had taken over society. As the story evolved, I wondered if the reality in the story is something we're living right now.
Visualization of the Week: Visualizing the Library Catalog
WorldCat has a new visualization tool to show relationships between objects in the catalog
The WorldCat Identity Network creates an interactive map where users can see how authors and characters are related.
The tricky mix of payment, identity and trust
Online payment requires confirmed identity, but who sees what is an open question.
Report excerpt: Online payment providers need to be sure you are who you say you are, but that's just the beginning. Is it possible to lead an active social life online and still have control over your online identity?
Susan Landau explores Internet security and the attribution problem
Landau, a noted privacy advocate, is seeking new technologies and new
policies to identify people on the Internet without onerous effects on privacy.
Being online: Conclusion–identity narratives
Identity online is created by combining many discrete items into a
coherent picture. This concluding section of the article suggests that
Social networking gives individuals more control over the picture.
Being online: Group identities and social network identities
Groups take on their own identities online, and social networks
threaten to subsume individual identities into groups. This section
of the identity article explores grouping in all its online facets.
Being online: Forged identities and non-identities
Creating a fake identity used to be more popular than it is now, but
some people have still hidden who they are when going online. This
section of the identity article covers some ways they do it.