Summer Reading

This summer I decided to do something that’s been on mind for a long time, read every unread in my bookshelf. It seems I always have a lot of these major clean-up projects that get pushed aside because they are too time consuming and too laborious. Most of the time, they’re just not that urgent. My list of longer term projects include organizing my photos (both physical and digital), dealing my collection of CDs (yes, I still have CDs and a stereo that plays them), and my unread books.

I’ve decided that NOW is later, at least for the books. Summer is a great time for a reading project.

First step was assembling all the unread books. Twenty-eight! To be fair, some of the books are partially read. What the collection really represents are books that I haven’t committed to keeping or giving away.

A real mix of genres. Everything from plays and poetry to non-fiction and reference.

I took a few moments to reflect on how I had even acquired so many. I’m an avid reader. Since my ereader broke a couple years ago I have been reading more news than books, but still, it was surprising to me.

Among the unread books are gifts, from friends or for attending a conference or buying something. Books that looked interesting to me. Old, used books that I found and thought “I should really read this, it’s a classic!” Promptly put them on my shelf and never read them. Books I purchased because they were authored by somebody I admire (e.g., Victor Wooten – amazing bass player). A book by Alice Walker, one of my favorite authors, that I still haven’t read. Business and reference books, non-fiction and fiction, plays, how-tos, short stories and poetry.

Always something I’ve had a great intention to read.  Always something that I would get to later.

I’m starting the project by reading the ones that look the most interesting to me. I’m allowed to read two – three at a time, which will help me to cycle through the ones I don’t like faster. I’ll be applying librarian Nancy Pearl’s Rule of 50 (read here). In essence her rule is after the first fifty pages of a book, only keep reading if you’re interested.

The goal is to only have books that I’ve read and enjoy.

Totally Tethered

Last week, as I was setting up for a meeting, I felt a twinge of annoyance at the reliance we have on cables, cords, and power outlets. Despite the high-tech, wireless option available for projecting in the meeting room, I still had to spend 20 minutes running around looking for the right adaptor and a cable.

Initially I was pleased to see that the meeting room was equipped with a smart board. A smart board can be used as an electronic white board, a projector screen, and more, usually with a wireless connection. I quickly discovered that I didn’t have the right app installed to connect wirelessly. I was disappointed, but knew I could connect with an adaptor and cable.

The smart board would only accept an HDMI cable, which generally isn’t a problem, except the cable wasn’t there. I found instead a large bundle of cables, snaking across the table like a giant boa constrictor into the floor close to the smart board. The bundle ended in a thick coil with several different ports sticking out of it, including a shredded HDMI. However, nothing in this jumbled mass of options was actually connected to the smart board, or it seemed, to anything else in the room. The only port that could be used was an HDMI one that could be felt, but not seen, behind the screen.

After I secured the necessary adaptor and cables, I then had to figure out where to plug in my device so the power wouldn’t run out during the meeting. Even more tripping hazards. Argh.

We have access to so much great and innovative technology including wireless options. So how come I’m always running around looking for cables?

Even when I don’t need cables and adaptors to use a projector, it seems I’m always stumbling over chargers and wires. The one flaw of all these neat gadgets and devices we’re always tethered to a power source. At one point in time I did use a wireless charger for my phone, but it was slow. And I could either use the phone or let it charge. When the phone is plugged in directly I can do both.

No matter how free and mobile we feel with our devices, we’re still reliant on a power source.

Personally Identifiable Information

As a Records and Information Management (RIM) professional, and a librarian, I’ve always been concerned about keeping private information protected. When working in RIM, I’m constantly evaluating the sensitivity of the information I’m managing to ensure proper safeguards are in place. Typically this entails defining different levels of sensitivity (e.g., secret, top-secret, etc.) for the business documents. Once established we then determine who is allowed access to each levels.

I have to confess that managing personally identifiable information (PII) is a completely different story. On the surface, PII seems obvious and assigning a sensitivity level should be straightforward. About 10 years ago, I would have only considered protection for obvious PII such as names, birthdates, gender, address, social insurance/security numbers, government-issued identifiers, etc. However, the way different data points about a person are now used to determine their likes/dislikes or influence how s/he may vote have really broadened the definition of PII.

So much information is collected, known and unknown by users, PII needs to be expanded to incorporate other factors. For example, when I first blogged about big data I learned that people could be “outed” (i.e., identified as LGBTQ) based on their interests and other “non-personal” data points. Data was analyzed to reveal patterns, preferences, and behaviors, all without a specific admission of being one way or another.

Recently Europe’s new General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018, has been in the news. Essentially the regulation focuses on protecting personal data, which is defined in Article 4 (1) in the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 as:

“(1) ‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person; “*

As technology changes, it’s important to reframe and contextualize our definitions. Now including things like genetics or cultural identities as personal data seems appropriate, especially considering how powerful data analytics have become. It’s easy for companies to create profiles from PII that may not initially appear to be specific, but taken in conjunction with multiple other data points can actually be quite revealing. But in order to protect it, we have to first be able to define it.



*Eur-Lex: Access to European Union Law. “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).” European Parliament, 27 April 2016. Web. 21 May 2018.

Virtual Assistant or Virtual Spy

I last wrote about virtual assistants and using voice commands almost two years ago (Google Home). Since then, the quality and options have gotten much better. Now when I verbally dictate a message, the transcription is near perfect. This is likely attributed to a combination of the system getting used to my voice and improvements made to the technology.

Now that I’ve mastered dictating all kinds of things into my phone, the next step would be to invest in a virtual assistant, like Google Home or Alexa. Like most new technological advances, I’m both creeped out and fascinated at the same time. My first reaction was complete aversion to having yet another device hooked up, synced, and monitoring me in my home. We’re always being forced to make decisions between Control and Convenience.

In addition to my specific voice commands, I want to know what else the device will be listening to? How easy will it be for somebody to hack into it and listen to what I’m saying, or send their own commands? When I first heard about virtual assistants, which all require some kind of command (e.g., “OK, Google”) to notify the device that you’re ready to give directions, it never occurred to me that the device would stay on all the time. I assumed it would be the voice command that activated the virtual assistant, but if it wasn’t alert and ready, how would it register the command was given.

In one sense it’s like voluntarily putting a surveillance device in your home. A recent article in The New York Times, titled “Hey, Alexa, What Can You Hear? And What Will You Do with It?”  described some of the other uses being considered when one engages with a virtual assistant. Some of the options discussed included having the device listen for keywords in conversations to tailor advertisements.

I have to confess that once I started thinking about using a virtual assistant, I considered many scenarios when hands-free voice commands could be useful. For example, I like listening to the radio or podcasts while I’m cooking or cleaning in the kitchen. While washing the dishes the other night, I realized I had forgotten to turn on the podcast first. My hands full of suds, I looked longingly at my smartphone wishing I could utter a few words to automatically start the podcast.

The Golden Killer

In recent weeks I’ve been reading articles about the capture of the “Golden State Killer.” The killer eluded the police for decades. He was finally identified after a detective uploaded the killer’s DNA onto a genealogy website to locate him through distant relations. This has raised some concerns.

Many people seem to be of the opinion that if the information was used for “good,” i.e., to capture a serial rapist/murdered, then what’s the harm. I even heard some people say they were okay with having their DNA used to help catch relatives (near or distant) that had committed crimes, whether they consented to their information being used that way or not.

On the other side information should only be used for the reason/purpose it was gathered initially, unless consent is granted. Therefore if information was uploaded on genealogy websites to find relatives, then that information shouldn’t be re-purposed for other uses without consent.

Last week I heard an interview on The Daily, (a New York Times news podcast) with the detective who worked on the case for over 20 years. According to him, he created an undercover account on the genealogy website, not a fake one. He argued that being “outed” by a relative’s uploaded DNA was the equivalent of a relative calling a hotline to report you.

While we might cheer at these new methods that removed one more dangerous criminal off the streets, it diminishes the value of our privacy and our right to protect/control personal information.

What happens when this kind of information isn’t used for “good”?  Or when we disagree about what “good” means. What if one day somebody in power decides to eradicate a specific gene from the human species and starts researching potential targets through DNA and genealogy websites. What if your voluntary DNA contributions help locate relatives that are carriers of this specific gene and they end up being targeted? Would you still think this was an appropriate use of your information? Likely not, but the point is you can’t always predict how/where your information is going to be used once it’s “out there.” Where’s the consent?

The detective made a good point that we need to have discussions about how/when these databanks of information can be accessed, by whom, and for what purpose. However, these discussions should happen before information is re-purposed, especially if it’s a gray area.

Information Gain and Knowledge Loss

On a recent trip to New York City (NYC) I decided to take a cab from the subway to my friend’s place in Astoria Queens instead of walking, one chilly evening. The driver immediately knew the address, including which side of the street it would be on and how far down the block. He even knew which direction he was traveling in and could point out north, south, east, west. He knew all of this without consulting a map or technology once. I was impressed with his mastery of the streets and told him so.

He replied it was because he had knowledge. For the last 15 years he’d been driving a cab. His early years in the business had forced him to learn how to navigate the labyrinthine ways of Queens, without technology. In the beginning, he explained, he used to have all kinds of maps in his car. When someone gave him an address, he had to locate it on the map and then remember how to get there. Through doing this, he had developed expertise in getting around.

He compared himself to other cab drivers, and people in general, who can only get some where with GPS. They’re lacking knowledge, he said emphatically. They can’t orient themselves and navigate. They don’t know where they are because all they do is follow a dot following a line. They’re not aware of their location. 

I’m definitely “directionally-challenged” but I’ve always managed to learned a few tricks about the layout of every city I’ve lived in to help orient and navigate myself through unfamiliar neighborhoods. I use GPS when I need to, but try not to rely on it.

We’re inundated and overwhelmed with information, but somehow we don’t acquire the knowledge to learn anything. We can go around the world with the internet, but yet can’t manage to get around our neighborhood by the information inside our own heads.

Although I love having GPS and maps available, I still make an effort to learn how to get around by memorizing street names and observing landmarks. By identifying patterns and learning basic tips. By studying maps to orient myself and understand my location. It was refreshing for me to have a cab driver that felt the same way.