blogging, Wordpress Bloggers

Reshuffle: what got Unfollowed in my WP Reader

I was following 37 blogs through WordPress ‘Reader’. blogging_stationI hadn’t in fact interacted so much with the Reader, but kept still getting updates of articles to my iPhone. So one day I thought: now is the time to make a clean-up.

Of the 37 original blogs in my Reader’s “list of followed blogs”, I kept way less than half. So over 20 blogs got unfollowed.

I yanked the down-thumb for following:

  • a blog hadn’t published anything for a long time (typical 3 months or more)
  • the subject matter didn’t interest me anymore
  • too complicated or long content (videos: over 15 minutes length)
  • I simply couldn’t figure out what a blog was
  • the content seemed rather unpassionate, no “persona” behind the voice

Blogs that I kept following:

  • sometimes, when in doubt, I had to check outside the blogosphere to make my mind (Twitter ahoy!)
  • author had media coverage outside blogs
  • the very latest blog post looked so darn good/interesting (if I had to flick quickly)
  • a household name in some field of expertise, or..
  • blogger has same professional interests as I do

That said, I turned the vision inwards: what about that Jukkasoft blog that you’re reading right now? Am I complying? Is Jukkasoft understandable? Does it show my opinions and reflect how I feel about things? Time will tell. And, you, my reader! If anything is valuable for a blogger, it’s feedback. Never doubt giving that. In all its honesty.

 

Uncategorized

Where do blogs stand in 2017?

I’m personally quite active consumer of media, from Instagram to news, blogs and of course Twitter.

What’s kept me kind of wondering is the position of blogs, over time. I mean we’re literally bombarded with (other) options to spend our time, which, by the way, is always a scarce resource. Still at least I find blogs really fascinating!

Blogs and differentiation

Blogs are often much more than just straightforward presentation of a collection of facts. Blogs do, and they’re entitled (even expected to) offer personal opinions. That’s the second differentiating aspect of blogs. One being of course the generic topic, if any.

I don’t, for one, have a precise set of topics on Jukkasoft, even though I do claim “to uncover technology”. And I guess that’s pretty much the core what I do here. But I definitely see that I’m not a gadget-geek, in the sense you’d find “phone review every week” or something even close to that frequency.

There’s more than just the informational content one goes after when reading these posts. As a reader you get the “goings on” in the life of yours truly, as well as opinions – perhaps not always so up front and underlined, but interspersed in the text.

I’ll tell you a story of something that changed my view on information in the second part!

Cheers,
Jukka

 

Uncategorized

[2k blog in Computer Science] VLAM authentication method

Human authentication to computer systems is problematic in many ways. There are aspects conserning the user’s ability to memorize arbitrary character-number -combinations as well as extraneous equipment which should be added to the system if other than password-based authentication methods were to be used (biometrics).

The method proposed in this paper is based on the combination of two things: first, the ability of the mind to memorize almost limitless amount of visual objects (once seen), and second, the strengthening effect of associating a phrase (a familiar little story) with the password which is about to form.

Goals to seek in VLAM

  • transferrability of password. You could make your way through the world with that what is inside you, what you really know. Thus the password itself should not be prone to change. Of course it must be given a thought whether it is possible for the attacker to gain knowledge of those precise aspects that you are presenting in authenticating yourself.
  • avoiding the upcoming attack techniques against passwords: timing attacks. These measure the time between your keypresses and thus gain a bit / some bits of information about the password. In VLAM, analogous attack might be possible by deep knowledge of the brain and how much time it takes to scan a matrix and find the picture, depending probably partially on where in the matrix the correct picture is and what are the characteristics of the false pictures (‘bright’, gaining the user’s attention, etc.)