skip to main content

Posts tagged “tech”, page 2

  1. Simplicity (II)
    bastianallgeier.com

    Bastian Allgeier:

    I have a simple rule of thumb when it comes to programming:

    less code === less potential issues

    This rule of thumb controls my own feelings towards a solution. It shouldn’t take 120 MB of code to uglify some JS. But maybe I’m wrong.

    In practice, this dependency hell has bitten me so often already that my life expectancy probably sank by 2-3 years. You want to build a JS file? Please update Webpack first. Oh, that new version of Webpack is no longer compatible with your Node version. Oh, your new Node version is no longer compatible with that other dependency. Oh, now you have 233 detected security issues in all your node_modules but you can’t fix them because that would break something completely unrelated.

  2. 5G Will Definitely Make the Web Slower, Maybe
    filamentgroup.com

    Scott Jehl:

    Faster networks should fix our performance problems, but so far, they have had an interesting if unintentional impact on the web. This is because historically, faster network speed has enabled developers to deliver more code to users—in particular, more JavaScript code.

    Ugh. Jeremy Keith comments:

    The longer I spend in this field, the more convinced I am that web performance is not a technical problem; it’s a people problem.

  3. Hackers Hit Twitter C.E.O. Jack Dorsey in a ‘SIM Swap.’ You’re at Risk, Too
    nytimes.com

    Nathaniel Popper:

    Called SIM swapping, it allows hackers to take control of a victim’s phone number. In recent months, SIM swapping has been used to hijack the online personas of politicians, celebrities and notables like Mr. Dorsey, to steal money all over the world and to simply harass regular people.

    Victims, no matter how prominent or technically sophisticated, have been unable to protect themselves, even after they have been hit again and again.

    “I’ve been looking at the criminal underground for a long time, and SIM swapping bothers me more than anything I’ve seen,” said Allison Nixon, the director of research at the security firm Flashpoint. “It requires no skill, and there is literally nothing the average person can do to stop it.”

    We’ve been hearing about this exploit for years. Of course, things seem to only have gotten worse.

  4. Altruism Still Fuels the Web. Businesses Love to Exploit It
    wired.com

    Zeynep Tufekci on the miracle of open source software:

    As a social scientist myself, I can say that convincing a colleague from the past that Wikipedia and Linux actually work the way they do would be a pretty huge lift. Given the assumption, common to many 20th-century schools of thought, that humans act in incorrigibly selfish ways, the notion that tens of thousands of people would collaborate to create, respectively, a living monument to human knowledge and a foundational piece of computing infrastructure, free of charge, simply sounds too fanciful.

  5. A Framework for Moderation
    stratechery.com

    Ben Thompson on internet content moderation:

    The top of the stack is about broadcasting — reaching as many people as possible — and while you may have the right to say anything you want, there is no right to be heard. Internet service providers, though, are about access — having the opportunity to speak or hear in the first place. In other words, the further down the stack, the more legality should be the sole criteria for moderation; the further up the more discretion and even responsibility there should be for content.

    This passage made me feel a little queasy but I think I agree?

    I ultimately reject the idea that publishing on the Internet is a right that must be guaranteed by 3rd parties. Stand on the street corner all you like, at least your terrible ideas will be limited by the physical world. The Internet, though, with its inherent ability to broadcast and congregate globally, is a fundamentally more dangerous medium that is by-and-large facilitated by third parties who have rights of their own.

  6. Fast Software, the Best Software
    craigmod.com

    Craig Mod:

    Software that’s speedy usually means it’s focused. Like a good tool, it often means that it’s simple, but that’s not necessarily true. Speed in software is probably the most valuable, least valued asset. To me, speedy software is the difference between an application smoothly integrating into your life, and one called upon with great reluctance. Fastness in software is like great margins in a book — makes you smile without necessarily knowing why.

  7. Chinese vertical dramas made for phone viewing show the future of mobile video
    thenextweb.com

    Henry Sung:

    What’s remarkable about vertical drama is that it’s not just any scripted content cropped for a vertical aspect ratio. These shows are specifically imagined for the mobile screen from the ground up. This is evident in three features they all share.

    I am fascinated by vertical video — it feels like a completely different medium. To me, horizontal video always represents a very deliberate choice to “make a video.” Vertical video is much more spontaneous, like a long photo that lives on your phone.

    Seeing the vertical format used for more serious scripted stuff is still uncanny, but I suspect there’s a lot to explore there.

  8. Jony Ive’s Fragmented Legacy: Unreliable, Unrepairable, Beautiful Gadgets
    ifixit.com

    Kyle Wiens makes a great point:

    [Dieter] Rams loves durable products that are environmentally friendly. That’s one of his 10 principles for good design: “Design makes an important contribution to the preservation of the environment.” But Ive has never publicly discussed the dissonance between his inspiration and Apple’s disposable, glued-together products.

    When a single broken key requires replacing a laptop’s entire top case, there is no denying that Apple has given too little consideration to the durability of its products.

    I’m extremely curious to find out how (if?) Apple’s design philosophy will change with Ive gone.

  9. We Are Tenants on Our Own Devices
    wired.com

    Zeynep Tufekci is worried about what ownership means for always-connected products:

    Today, we may think we own things because we paid for them and brought them home, but as long as they run software or have digital connectivity, the sellers continue to have control over the product. We are renters of our own objects, there by the grace of the true owner.

    I worry about this a lot, maybe too much. Unless I don’t have a choice, I avoid any device that superflously requires an internet connection (or worse, a smartphone app) like the plague.

  10. The New Wilderness
    idlewords.com

    Maciej Ceglowski writes about privacy and I want to quote the whole thing:

    Ambient privacy is not a property of people, or of their data, but of the world around us. Just like you can’t drop out of the oil economy by refusing to drive a car, you can’t opt out of the surveillance economy by forswearing technology (and for many people, that choice is not an option). While there may be worthy reasons to take your life off the grid, the infrastructure will go up around you whether you use it or not.

    Because our laws frame privacy as an individual right, we don’t have a mechanism for deciding whether we want to live in a surveillance society. Congress has remained silent on the matter, with both parties content to watch Silicon Valley make up its own rules. The large tech companies point to our willing use of their services as proof that people don’t really care about their privacy. But this is like arguing that inmates are happy to be in jail because they use the prison library. Confronted with the reality of a monitored world, people make the rational decision to make the best of it.

    That is not consent.

  11. Tech and Antitrust
    stratechery.com

    Ben Thompson:

    Suggesting that users changing ecosystems is a sufficient antidote to Apple’s behavior is like suggesting that users subject to a hospital monopoly in their city should simply move elsewhere; asking a third party to remedy anticompetitive behavior by incurring massive inconvenience with zero immediate gain is just as problematic as making up market definitions to achieve a desired result.

  12. Freedom
    inessential.com

    Brent Simmons:

    In a way, it feels like iOS devices are rented, not owned. This is not a criticism: I’m totally fine with that. It’s appropriate for something so very mass-market and so very much built for a networked world.

    But what about Macs?

    Macs carry the flame for the revolution. They’re the computers we own, right? They’re the astounding, powerful machines that we get to master.

    Except that lately, it feels more and more like we’re just renting Macs too, and they’re really Apple’s machines, not ours.

  13. How Recommendation Algorithms Run the World
    wired.com

    Zeynep Tufekci:

    Deep down, behind every “people like you” recommendation is a computational method for distilling stereotypes through data. Even when these methods work, they can help entrench the stereotypes they’re mobilizing. They might easily recommend books about coding to boys and books about fashion to girls, simply by tracking the next most likely click. Of course, that creates a feedback cycle: If you keep being shown coding books, you’re probably more likely to eventually check one out.