I'm delighted that the news is now out about the Andrew W. Mellon Foundation's grant to Northeastern University Library to launch the Boston Research Center. The BRC will seek to unify major archival collections related to Boston, hundreds of data sets about the city, digital modes of scholarship, and a wide array of researchers and … Continue reading Launching the Boston Research Center
I am extremely fortunate to work in a library, an institution that is designed to help others and to share knowledge, resources, and expertise. Snell Library is a very busy library. Every year, we have two million visits. On some weekdays we receive well over 10,000 visitors, with thousands of them in the building at one … Continue reading Help Snell Library Help Others
On the latest What's New Podcast from Northeastern University Library, I interview Woody Hartzog, who has a new book just out this week from Harvard University Press entitled Privacy’s Blueprint: The Battle to Control the Design of New Technologies. We had a wide-ranging discussion over a half-hour, including whether (and if so, how) Facebook should be regulated … Continue reading What’s New, Episode 14: Privacy in the Facebook Age
When I was in sixth grade our class got an Apple ][ and I fell in love for the first time. The green phosphorescence of the screen and the way text commands would lead to other text instantly appearing was magical. The true occult realm could be evoked by moving beyond the command line and … Continue reading The Post-Coding Generation?
If timing is everything, history professor Mills Kelly didn't have such great timing for his infamous course "Lying About the Past." Taught at George Mason University for the first time in 2008, and then again in 2012—both, notably, election years, although now seemingly from a distant era of democracy—the course stirred enormous controversy and then … Continue reading Revisiting Mills Kelly’s “Lying About the Past” 10 Years Later
Cory Doctorow's 2008 novel Little Brother traces the fight between hacker teens and an overactive surveillance state emboldened by a terrorist attack in San Francisco. The novel details in great depth the digital tools of the hackers, especially the asymmetry of contemporary cryptography. Simply put, today's encryption is based on mathematical functions that are really easy in one direction—multiplying two prime numbers to get a … Continue reading Age of Asymmetries
When the New York Times let it be known that their election-night meter—that dial displaying the real-time odds of a Democratic or Republican win—would return for Georgia's 6th congressional district runoff after its notorious November 2016 debut, you could almost hear a million stiff drinks being poured. Enabled by the live streaming of precinct-by-precinct election … Continue reading Irrationality and Human-Computer Interaction