Blogging Birds: Telling Informative Stories About the Lives of Birds from Telemetric Data

Communications of the ACM, March 2019
By Advaith Siddharthan, Kapila Ponnamperuma, Chris Mellish, et al.

“The Blogging Birds system shows that raw satellite tag data can be transformed into fluent, engaging, and informative texts directed at members of the public and in support of nature conservation.”

Blogging Birds: Telling Informative Stories About the Lives of Birds from Telemetric Data Read More

The Internet Has Made Dupes—and Cynics—of Us All

Wired, June 24, 2019
By Zeynep Tufekci

“Online fakery runs wide and deep, but you don’t need me to tell you that. New species of digital fraud and deception come to light almost every week, if not every day: Russian bots that pretend to be American humans. American bots that pretend to be human trolls. Even humans that pretend to be bots. Yep, some “intelligent assistants,” promoted as advanced conversational AIs, have turned out to be little more than digital puppets operated by poorly paid people. ”

The Internet Has Made Dupes—and Cynics—of Us All Read More
Mark Zuckerberg walks down aisle of theater full of people wearing Oculus augmented reality headsets. (It's a new wilderness)

The New Wilderness

Idle Words
By Maciej Cegłowski

“For the purposes of this essay, I’ll call it “ambient privacy” – the understanding that there is value in having our everyday interactions with one another remain outside the reach of monitoring, and that the small details of our daily lives should pass by unremembered. What we do at home, work, church, school, or in our leisure time does not belong in a permanent record. Not every conversation needs to be a deposition.”

The New Wilderness Read More
Nielsen Norman Group

Hierarchy of Trust: The 5 Experiential Levels of Commitment

Nielsen Norman Group, March 6, 2016
Persuasive Design, Credibility, Trust & User eXperience
By Kate Sherwin

“Summary: Sites must meet users’ basic trust needs before they demand that visitors enter information or engage with them. The trust pyramid has 5 distinct levels of user commitment, each with separate design requirements before users will give a website what it wants from them.”

Hierarchy of Trust: The 5 Experiential Levels of Commitment Read More
Nielsen Norman Group

Web UX 2016 vs 2004 & How to Maximize User Research Insight

Nielsen Norman Group, December 29, 2016 & January 12, 2017
Web, Usability & User eXperience
By Jakob Nielsen

“Jakob Nielsen presents a rare longitudinal study of 12 years’ evolution in web usability: what’s gotten better, and where we still need to improve, and discusses how to base design changes on valid UX research methods and gain the biggest ROI from the usability investment.”

Web UX 2016 vs 2004 & How to Maximize User Research Insight Read More
National CyberSecurity Awareness Month

National CyberSecurity Awareness Month – October 2019

National Cyber Security Alliance

“Under the overarching theme of ‘Own IT. Secure IT. Protect IT.’, the 16th annual National Cybersecurity Awareness Month (NCSAM) is focused on encouraging personal accountability and proactive behavior in security best practices and digital privacy. It is also focused on drawing attention to careers in cybersecurity. ”

National CyberSecurity Awareness Month – October 2019 Read More
Nielsen Norman Group

Brand Is Experience in the Digital Age

Nielsen Norman Group, July 3, 2016
Branding, Interaction Design
By Kate Kaplan

“Summary: While branding has been around since people began buying and trading goods, the definition has evolved in the Digital Age. Consumers now have a wider range of interaction with companies and greater choice in product selection. Today, brand is the holistic sum of customers’ experiences, composed of visual, tonal and behavioral brand components, many of which are shaped by interaction design.”

Brand Is Experience in the Digital Age Read More

Fully Device Independent Quantum Key Distribution

Communications of the ACM, April 2019
Research Highlights : “Technical Perspective: Was Edgar Allan Poe Wrong After All?
By Gilles Brassard

Research Highlights : “Fully Device Independent Quantum Key Distribution
By U­mesh Vazirani, Thomas Vidick

“Artur Ekert realized as early as 1991 that a different kind of quantum cryptography was possible by harnessing entanglement, which is arguably the most nonclassical manifestation of quantum theory. Even though Ekert’s original protocol did not offer any security above and beyond my earlier invention with Bennett, he had planted the seed for a revolution. It was realized by several researchers in the mid-2000s that entanglement-based protocols could lead to unconditional security even if they are imperfectly implemented—even if the QKD apparatus is built by the eavesdropper, some argued. For a decade, these purely theoretical ideas remained elusive and seemed to require unreasonable hardware, such as an apparatus the size of the galaxy! Vazirani and Vidick’s paper provides an unexpectedly simple and elegant solution, indeed one that is almost within reach of current technology. Once it becomes reality, codemakers will have won the definitive battle, Poe’s prophecy notwithstanding.”

Fully Device Independent Quantum Key Distribution Read More

Cyber Security in the Quantum Era

Communications of the ACM, April 2019
By Petros Wallden, Elham Kashefi

“The ability to communicate securely and compute efficiently is more important than ever to society. The Internet and increasingly the Internet of Things, has had a revolutionary impact on our world. Over the next 5-10 years, we will see a flux of new possibilities, as quantum technologies become part of this mainstream computing and communicating landscape. Future networks will certainly consist of both classical and quantum devices and links, some of which are expected to be dishonest, with functionalities of various sophistication, ranging from simple routers to servers executing universal quantum algorithms. The realization of such a complex network of classical and quantum communication must rely on a solid novel foundation that, nevertheless, is able to foresee and handle the intricacies of real-life implementations and novel applications.”

Cyber Security in the Quantum Era Read More
Vinton G. Cerf

In Debt to the NSF

Communications of the ACM, April 2019
By Vinton G. Cerf

“We collectively owe much to the foresight and nuanced decisions taken by the leadership of [National Science Foundation’s] Computer, Information Systems and Engineering Directorates (CISE) and its Division of Computer and Network Systems.” [Without that, there would be no Internet as we know it today.]

In Debt to the NSF Read More