After the death of a friend, healing in a human social network |

After the death of a friend, healing in a human social network; press release; In; 2017-04-24.

tl;dr → people come together, they move on.

Original Sources

William R. HobbsMoira K. Burke, Connective recovery in social networks after the death of a friend, Nature Human Behaviour (2017). DOI:10.1038/s41562-017-0092


<quote>”We can’t speak to the subjective experience of loss and recovery, but on the level of a network, it looks like the amount of increased interaction is equal to the amount of interaction lost with the person who died, and there’s a complete recovery of connectivity,” attributed to William R. Hobbs.


We’ve studied the future of the internet since 2004 | Pew Research Center

Lee Rainie (Pew Research Center); In Their Blog on Medium


  • Internet of Things
  • datacosm
  • Joshua Cooper Ramo, The Seventh Sense. Networks. 2016.
  • lifestream
  • fifth limb
  • skin
  • prediction, predictive analytics
  • data ubiquity
  • context-aware gadgets
  • avatars
  • artificially intelligent agents
  • self-driving cars
  • virtual worlds
  • telepresence
  • knowledge economy
  • “new skills”
  • wicked problems, macroglobal wicked problems
  • new regulations (are needed)
  • Enlightenment sensibility


  • surveillance capitalismtm, see Shoshana Zuboff

Memes & Metaphors

  • Minority Report, the film, a meme, a theme
  • The Metaverse from Snow Crash, by Neal Stephenson


  • <quote>With so much upheaval ahead, people, groups, and organizations will be forced to adjust. At the level of social norms, it is easy to envision social environments in which people must constantly negotiate what information can be shared, what kinds of interruptions are tolerable, what balance of fact-checking and gossip is acceptable, and what personal multitasking is harmful. In other words, much of what constitutes civil behavior will be up for grabs.</quote>
  • <quote>Laws and institutions must go hand in hand with the progress of the human mind. As that becomes more developed, more enlightened, as new discoveries are made, new truths disclosed, and manners and opinions change with the change of circumstances, institutions must advance also, and keep pace with the times.</quote>, attributed to Thomas Jefferson, 1816:


  • Joshua Cooper Ramo, The Seventh Sense. Networks, 2017?
  • Stowe Boyd, pundit, a “futurist”
  • Aneesh Aneesh, University of Wisconsin, Milwaukee
  • Shoshana Zuboff, Harvard University


From Pew Research…

In Pew Trends, 2017-Summer (undated?)

The Fact Sheets


NinthDecimal Acquires MoLOGIQ, Launches NinthDecimal Labs | MediaPost

NinthDecimal Acquires MoLOGIQ, Launches New Labs; ; In MediaPost; 2017-06-29.


  • NinthDecimal
  • MoLOGIQ (a DMP)
  • NinthDecimal will buy MoLOGIQ
    no terms stated.
  • NinthDecimal Labs, location data.


  • Arvi Kang, CEO, MoLOGIQ
  • Partha Roy Chowdhury, CTO, Ninth Decimal
  • Michael Fordyce, CEO of NinthDecimal.

Product Category

  • (self-service) audience solutions
  • data visualization
  • Data Management Platform (DMP)
  • Software Development Kit (SDK), proprietary
  • bridging of offline and online data


  • NinthDecimal
    • Household Graph
    • geo-spatial “capabilities”

Data Sources

  • SDKs
  • public demographic data
  • land parcel data
  • voter registration rolls


  • 50 million unique devices
  • Cultures
    • Android
    • iOS

Facebook Adds ‘Family Targeting’ to Ad Products, Enabling New Focus Options | SocialMediaToday

>Facebook Adds ‘Family Targeting’ to Ad Products, Enabling New Focus Options; Andrew Hutchinson; In Social Media Today; 2017-06-28.

tl;dr → cut & paste of the original reportage

Original Sources


  • Television
  • Amazon Echo
  • Google Home
  • Facebook Custom Audiences
  • Facebook ID

The Carefully Sculpted Reality of the Meeker Trends Report | Tom Webster (Edison Research)

Tom Webster (Edison Research); The Carefully Sculpted Reality of the Meeker Trends Report; In Some Blog hosted on Medium; 2017-06-24.
Tom Webster is VP of Strategy, Edison Research.

tl;dr → bloggist discovers that Mary Meeker (for KPCB) is talking up their book. Welcome grasshoper, you have awoke!


  • <quote>But take the report for what it is — an extremely effective piece of content marketing, promoting the trends and interests of a company selectively invested in the space. Nothing sinister here — I fully believe KPCB saw their portfolio companies as a part of future trends first, not that they are trying to engineer these trends after the fact.</quote>


SoK: Cryptographically protected database search | Fuller et al.

Fuller et al.; SoK: Cryptographically proctected database search; In Proceedings of IEEE Symposium on Security and Privacy (SP), 2017-03-06 → 2017-06-02; arXiv:1703.02014, IEEE.



Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly; systems are offered by academia, start-ups, and established companies.

However, there is no best protected search system or set of techniques. Design of such systems is a balancing act between security, functionality, performance, and usability. This challenge is made more difficult by ongoing database specialization, as some users will want the functionality of SQL, NoSQL, or NewSQL databases. This database evolution will continue, and the protected search community should be able to quickly provide functionality consistent with newly invented databases.

At the same time, the community must accurately and clearly characterize the tradeoffs between different approaches. To address these challenges, we provide the following contributions:

  1. An identification of the important primitive operations across database paradigms. We find there are a small number of base operations that can be used and combined to support a large number of database paradigms.
  2. An evaluation of the current state of protected search systems in implementing these base operations. This evaluation describes the main approaches and tradeoffs for each base operation. Furthermore, it puts protected search in the context of unprotected search, identifying key gaps in functionality.
  3. An analysis of attacks against protected search for different base queries.
  4. A roadmap and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.



Bitglass, Ciphercloud, CipherQuery, Crypteron, IQrypt, Kryptnostic, Google’s Encrypted BigQuery, Microsoft’s SQL Server 2016, Azure SQL Database, PreVeil, Skyhigh, StealthMine, ZeroDB


Query Types

  • equality
  • boolean
  • range
  • other

Protection Types

  • legacy
  • custom
  • oblivious
  • other


  • Single table
  • With indices
  • Multiple tables


Legacy Schemes

Deterministic Encryption (DET)
preserves only equality but applying a randomized but fixed permutation to all messages.
Order-Preserving Encryption (OPE)
preserves the relative order of the plaintexts; range queries.
Mutable OPE
only reveals the order of ciphertexts; added interactivity during insertion and query execution.

Custom schemes

  • Inverted index schemes
  • Tree traversal schemes

Oblivious schemes

… aim to hide common results between queries.

Oblivious RAM (ORAM)
performance problems
latest type of ORAM
a second non-colluding server

Full database solutions

enables most DBMS functionality with a performance overhead of under 30%.
is built on top of MongoDB and reports a performance overhead of approximately 10%.
reports slowdowns of between 20% and 300% for most queries
EXT can occasionally beat a MySQL system with a cold cache (a somewhat strange comparison!), but are an order of magnitude slower than MySQL with a warm cache.
reports a 500% slowdown compared to a baseline MySQL system on keyword equality and range queries.


  • SummarizationSystematization of Knowledge (SoK)
  • Data Base Management System (DBMS)
  • searchable symmetric encryption
  • property preserving encryption
  • database search
  • oblivious random access memory
  • private information retrieval
  • Property-Revealing Encryption (PRE)




There are 162 references. As time moves on, check the IEEE, one day they will have the paper & its references.

A Utopia for a Dystopian Age | Espen Hammer (NYT)

A Utopia for a Dystopian Age; Espen Hammer; In THE STONE, a column of The New York Times (NYT); 2017-06-26.
Espen Hammer, professor of philosophy, Temple University.
Espen Hammer, Adorno’s Modernism: Art, Experience, and Catastrophe, Publisher, WHEN?, X pages.

tl;dr → The Utopias are dead, societies have to have a utopian future vision; The only remaining utopia is Nature, and Climate Change. Save the Earth.


  • Thomas More, Utopia
  • Hythloday, protagonist; a neologism oif “nonsense peddler.”
  • John Lennon “Imagine”-esque way
  • Hieronymus Bosch’s painting “The Garden of Earthly Delights,”
  • Utopias of
    • technology
    • social justice
  • Is Your God Dead?; Someone; In The New York Times (NYT); 2017-06.
  • French Revolution
  • 20th-century Marxist politics
  • Vladimir Lenin
  • Russian Revolution of October 1917,
  • <quote>The utopias of desire make little sense in a world overrun by cheap entertainment, unbridled consumerism and narcissistic behavior.</quote>
  • Hiroshima
  • Chernobyl
  • Internet
  • <quote>a widespread disregard for truth and objectivity</quote>
  • <quote>an immense increase in the capacity for surveillance</quote>
  • The Gulag Archipelago
  • The Khmer Rouge’s killing fields
  • The Cultural Revolution
  • Barack Obama
  • <quote>The main task of government, Barack Obama ended up saying, is to avoid doing stupid stuff.</quote>

A taxonomy of prospection: Introducing an organizational framework for future-oriented cognition | Szpunar, Spreng, Schachter

Szpunar, Spreng, Schachter; A taxonomy of prospection: Introducing an organizational framework for future-oriented cognition; In Proceedings of the National Academy of Sciences (PNAS); 2014-09-11; 8 pages; landing., pubmed.



Prospection—the ability to represent what might happen in the future—is a broad concept that has been used to characterize a wide variety of future-oriented cognitions, including affective forecasting, prospective memory, temporal discounting, episodic simulation, and autobiographical planning. In this article, we propose a taxonomy of prospection to initiate the important and necessary process of teasing apart the various forms of future thinking that constitute the landscape of prospective cognition. The organizational framework that we propose delineates episodic and semantic forms of four modes of future thinking: simulation, prediction, intention, and planning. We show how this framework can be used to draw attention to the ways in which various modes of future thinking interact with one another, generate new questions about prospective cognition, and illuminate our understanding of disorders of future thinking. We conclude by considering basic cognitive processes that give rise to prospective cognitions, cognitive operations and emotional/motivational states relevant to future-oriented cognition, and the possible role of procedural or motor systems in future-oriented behavior.