Leftover Takeout

Aug 28

[video]

“The average story about the Ice Bucket Challenge was much more heavily promoted by Facebook’s algorithms (a factor of 8x) than the average story about Ferguson.” — Self segregation on social-networks and the implications for the ferguson MO story - Ethan Zuckerman.  (via algopop)

[video]

[video]

Aug 26

[video]

“Uber’s algorithm (which it has been refining since 2011) is the company’s greatest asset and most significant innovation, allowing it to find the price that will attract drivers—whom, as independent contractors, it can’t order onto the road—without alienating customers. The strategy works.” — Author James Surowiecki writes about Uber’s price discrimination strategy.

Aug 25

nevver:

Are you experienced?

nevver:

Are you experienced?

Aug 23

5 Minute Quick Thoughts Re: Secret Hacking and Security

Like many, I had already thought about the most recent Secret Hack, but was too lazy to think of trying it.   I think the key to guarding your identity on Secret, in light of these hack methods, is if using Gmail, to ALWAYS use some derivation of your username with the ‘+’ mechanism.

For instance, instead of:

Use:

The email will appear unique to Secret (or any service for that matter), but not unique to Gmail.  Added bonus, you can create filters on the incoming email to direct the marketing spam to the bit bucket.  I wonder if this email obfuscation would, in effect, turn Secret into a follower/following model rather than the current friend model.  Specifically, I follow all the people I’ve ever emailed, but they don’t necessarily follow me.  

Though, no matter what course of action security through obscurity is complete bullsh*t.

[video]

Aug 19

[video]