MIT Press opens access to 3480 books
Via @RobertaArielli, https://www.robertadalessandro.it/ – @mitpresshas opened the access to 3480 books, within the MIT Press Direct program. There are 196 #linguistics books, and 3480 books in all disciplines, and counting. direct.mit.edu/books/search-r
The news is dispiriting, repetitive, often of dubious credibility. It makes us feel powerless. Is there a better way to be informed?
Graydon Carter’s Vanity Fair And The Inevitable Fade Of The American Glossy Magazine
Preservationists say Library of Congress makeover plan is ‘vandalism’ - Washington Post: “A proposed change to the ornate Main Reading Room at the Library of Congress that critics say would remove the symbolic and functional heart of the 1897 Beaux-Arts masterpiece has landed the library on the D.C. Preservation League’s 2022 list of Most Endangered Places.
The Library of Congress plans to remove the mahogany librarian’s desk that rises some 16 feet in the middle of this spectacular, first-floor room and replace it with a circular window in the floor that will offer a view of its decorative dome to visitors looking up from the floor below. When the D.C. Preservation League announced the listing last month, it described the alternation as ill-advised and unnecessary and said it would “desecrate the Reading Room’s character and function.” It asked Congress and the Architect of the Capitol, the federal agency responsible for the Capitol complex, to stop it…”
Caitlin Flanagan argued in The Atlantic that we really need to quit Twitter. She joins a long line of people who’ve sworn off the medium (at least for a time). ...
In her essay, Flanagan examines how Twitter destroyed her “ability for private thought” and enjoyment of reading. She even admits to being a Twitter addict.
I am too. I have committed a thousand times to take a break from social media, just to find myself sneaking a look, consumed by shame, as if I huffed some glue real quick between work and picking up the kids. There are nights when I’m up too late, reddened eyes locked onto a screen, finally shaking myself out of my stupor with a cry: “Why am I doing this?”
Christianity Today Op-Ed: Don’t Quit Twitter Yet. You Might Have a Moral Duty to Stay. by Tish Harrison Warren (Priest, Anglican Church; Author, Prayer in the Night: For Those Who Work or Watch or Weep (2021) (Christianity Today's 2022 Book of the Year))
Pete Recommends – Weekly highlights on cyber security issues, July 16, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weisshighlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Should we be worried about real-time facial recognition systems?; Some VPNs can’t be trusted. These are best at privacy and security; In a Post-Roe World, the Future of Digital Privacy Looks Even Grimmer; and Here’s how North Korean operatives are trying to infiltrate US crypto firms.
A New Attack Can Unmask Anonymous Users on Any Major Browser
Wired: “Everyone from advertisers and marketers to government-backed hackers and spyware makers wants to identify and track users across the web. And while a staggering amount of infrastructure is already in place to do exactly that, the appetite for data and new tools to collect it has proved insatiable. With that reality in mind, researchers from the New Jersey Institute of Technology are warning this week about a novel technique attackers could use to de-anonymize website visitors and potentially connect the dots on many components of targets’ digital lives. The findings, which NJIT researchers will present at the Usenix Security Symposium in Boston next month, show how an attacker who tricks someone into loading a malicious website can determine whether that visitor controls a particular public identifier, like an email address or social media account, thus linking the visitor to a piece of potentially personal data. When you visit a website, the page can capture your IP address, but this doesn’t necessarily give the site owner enough information to individually identify you. Instead, the hack analyzes subtle features of a potential target’s browser activity to determine whether they are logged into an account for an array of services, from YouTube and Dropbox to Twitter, Facebook, TikTok, and more. Plus the attacks work against every major browser, including the anonymity-focused Tor Browser…”