During an Internet Week panel on digital media, New York Times journalist David Carr said that one of his biggest beefs with ebooks is that they impede that voyeuristic pleasure of knowing what your fellow subway riders are reading. He's right. (Ebooks also diminish the pool of snap-judgement factors.) The easiest workaround: ask. So I did, though, lacking the cajones to ask my fellow 5-train riders, I asked my coworkers instead. Here, for your click-through pleasure, are the most interesting stories they've read this week.
Sean Kermes, Software Engineer
- Read: Trigger Narratives and the Nuclear Option
- Source: Tempobook
- Summary: That the trigger has (knock on wood) not been pulled since World War II is an engineering accomplishment comparable to the Moon landing.
Christina Nguyen, UX Engineer
- Read: 10 Timeframes
- Source: Contents Magazine
- Summary: Interaction designers… must make things that allow other people to make things. They define the experiences that permit other people to do their work, or play, or tweet, or post things. They make the forms that the rest of us fill out.
Paula Marciante, Senior Talent Acquisition Manager
- Read: Hackers Escalate Attacks on Social Networks
- Source: Financial Times
- Summary: Security breaches at LinkedIn and eHarmony have highlighted an escalation in attacks on social networks from hackers seeking to exploit personal data, according to security firms.
Claire Willett, Marketing and Development Manager
- Read: Hello, I Am Sabu
- Source: New York Magazine
- Summary: From a housing project on Avenue D, a hacker mastermind of Anonymous and LulzSec was out to upend many worlds. Including his own.
Nick Martin, Software Engineer
- Read: Flame Malware Makers Send 'Suicide' Code
- Source: BBC
- Summary: The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers.
Scott Dugas, Software Engineer
- Read: Investment Disclosures
- Source: Kottke.org
- Excerpt: Users love our product because it's something free. Venture Capitalists love it because they can imagine themselves talking about it at T.E.D. or on Charlie Rose. Trust us: Once you invest in Ponzify, you'll have a difficult time investing your money anywhere else ever again.
Julian Ceipek, Development Intern
- Read: Crypto Breakthrough Shows Flame Was Designed by World-Class Scientists
- Source: Ars Technica
- Summary: The spy malware achieved an attack unlike any cryptographers have seen before.
David Wihl, CEO
- Read: The Government Comes Knocking: Who Has Your Back?
- Source: Electronic Frontiers Foundation
- Summary: The Electronic Frontier Foundation examined the policies of 18 major Internet companies — including email providers, ISPs, cloud storage providers, and social networking sites — to assess whether they publicly commit to standing with users when the government seeks access to user data.
Tamar Rucham, Software Engineer
- Read: 6 Ways to Run Shell Commands in Ruby
- Source: Nate Murray
- Summary: Often times we want to interact with the operating system or run shell commands from within Ruby. Ruby provides a number of ways for us to perform this task.