Scaling Apache Giraph to a trillion edges | Facebook

Avery Ching (Facebook); Scaling Apache Giraph to a trillion edges; In Their Blog; 2013-08-14.


Audience Modeling & Customer Lifetime Value 101 | Marketing Land

(SellPoint); Audience Modeling & Customer Lifetime Value 101; In Marketing Land; 2014-05-09.
is the Vice President of Performance Marketing and Analytics at SellPoints


  • Customer Lifetime Value (CLV)
  • Recency, Frequency, Monetary Value (RFM)
  • Acquisition Cost (AC)
  • Google Analytics Visitor Flow, user path visualization
  • AdWords Remarketing List for Search Ads (RLSA)

Original Sources

  • Sunil Gupta, Stuart Lehmann, Jennifer Stuart (2004); “Valuing Customers”; In Journal of Marketing Research; 41 (1), pages 7-18.
  • Peter S. Fader, Bruce G. S. Hardie, Paul D. Berger (2004); ”Customer-Based Analysis with Discrete-Time Transaction Data”; In Something.


Deconstructing the Digital Divide | Virginia Eubanks

Virginia Eubanks; Deconstructing the Digital Divide; On YouTube; 2011-12-12; 23:15.

Virginia Eubanks; Digital Dead End: Fighting for Social Justice in the Information Age; The MIT Press; 2012-12-14; 288 pages; kindle: no, paper: $5+SHT.

Hardening the Internet | IETF 88

IETF 88; 2013-11

Hardening the Internet; Technical Plenary; At IETF 88; On YouTube; 2013-11-06; 2:37:28.



  • Encrypt the Backbone
  • Useable Personal Security Products (PSPs)
    • PGP too hard and is not used.
    • OTR “just works” and is popular.
  • Distribute & Disperse the Endpoints
  • Proofs of function in software and hardware
    • that a device (program) does only what it says on the label, and no more.
    • open source; many witnesses.


  • It’s a zero sum game: if you reign in the NSA, then China wins.

General Plenary

  • RFC 7258 Pervasive Monitoring Is an Attack; IETF; Stephen Farrell (Trinity), Hans Tschofenig (ARM); 2014-05.
  • RFC 6973 Privacy Considerations for Internet Protocols; IETF; Cooper (CDT), Tschofenig (Nokie), Aboba (Skype), Peterson (NeuStar), Morris (self), Hansen (ULD), Smith (Janet); 2013-07.
  • RFC 3365 Strong Security Requirements for Internet Engineering Task Force Standard Protocols; Schiller (MIT); 2002-08.
  • RFC 2804 IETF Policy on Wiretapping; IETF Policy on Wiretapping; IETF; IAB; 2000-05.
  • RFC 1984 The Kerberos Version 5 GSS-API Mechanism; IETF; Linn (OpenVision); 1996-06.


Via: backfill

Why Likability Matters More at Work | WSJ

Why Likability Matters More at Work; Sue Shellenbarger; In The Wall Street Journal (WSJ); 2014-03-25.

tl;dr => etiquette; on camera poise & presence.


  • Anonymous Host
  • Sue Shellenbarger, WSJ
  • Tim Sanders, expert


  • Tim Sanders; The Likeability Factor; Three Rivers Press; 2006-04-25; 224 pages; kindle: $10, paper: $0.01+SHT.
  • Some study; attributed to University of Massachusetts
  • An article, on some study; In Management Science; 2008.
  • Wainhouse Research, Boston MA
  • Techniques, attributed to Ben Decker, Decker Communications
    1. making eye contact by looking into the camera,
    2. smiling naturally when you talk
    3. varying your tone of voice to convey warmth and enthusiasm
  • Decker Communications, San Francisco CA
    • training services; poise & presence.
    • Ben Decker, chief executive officer
    • Reference Customers
      • Urban Decay Cosmetics, Newport Beach, Calif., a division of L’Oréal
        • Melissa Temple-Agosta, assistant vice president, education and training.
      • Charles Schwab
        • Jay L. Allen, executive vice president, human resources