I can’t stop writing about Facebook.
Yet again, they’re linked below this week in a good summary from the Nieman Lab. The core issue: “publishing an article is not the same as the article being seen by people interested in it.” Facebook is a master of what Ben Thompson calls “aggregation theory”, where owning demand is more important than supply in the value chain for digital goods/services. Clearly, Facebook is an outsized winner in this regard: huge swaths of the population (but not everyone) start their news consumption diets there.
My open question remains: who else, with more of a civic-minded bent to them, could do this kind of aggregation?
In a conversation, I started to wonder if this would be a role (classic news aggregator) for a digital-era Public Service Broadcaster. Then I got sad again: “Americans could barely buy a coffee with what they spend per year on public media”.
For those who are celebrating, L’Shana Tova.
Unlike the new Twitter news advertising policy from last week’s note, Facebook is yet again being confronted over the lack of nuance in its own policy.
- Naja Nielsen, the chief journalism officer of Orb Media, the non-profit profiled in the above-linked Nieman Lab story, summed this up better than I’ve seen.
- “I completely acknowledge that Facebook is a private company. They have the rules they want to have. We as users have to listen to whatever decisions they’re making,” Nielsen said. “But, as we all know, in the age of the internet publishing an article is not the same as the article being seen by people interested in it.”\
Verizon issues a report on their security breach investigations.
- Financial gain remains at the top of the list for attack motives.
- Bad actors have been targeting our media/public sphere via means that we’ve given them (advertising APIs, etc.)… But we need some thinking about what happens if they decide to make an outright attack?
- For example: what kind of security procedures do our preeminent business journalists undertake?
The Census Bureau Tried to Use Differential Privacy for the 2020 Census. It was hard.
- The Bureau encountered many issues a start-up might (including a lack of trained staff), but perhaps most interesting to me: the lack of computational resources
- They estimated that using differential privacy would require three orders of magnitude more computational power than what they currently require.
- Here is yet another example of how the elasticity of shared computing resources is so valuable (“cloud computing”).
- Genomics is leading the way here, both in terms of need and policy response, but we will see this play out across every industry
- H/T to my Berkman colleague Ram Shankar Siva Kumar for highlighting the paper.
*I know this one sounds crazy. I know. But it isn’t. * One of the keys to making travel easier for me is having a bag that is, essentially, pre-packed. That includes toiletries.
- It’s all about having almost zero cognitive load.
- Did you know you can get bigger-than-test-yet-smaller-than-three-ounce toothpaste tubes?
- I can get a couple of trips out of this – meaning even less that I even need on a pre-travel checklist.
- Next week, the same principle applied to one of my most favorite subjects: ⚡️charging ⚡️.