About the Jester

Peter E. Murray

Picture of Peter Murray
Assistant Director, Technology Services Development
LYRASIS

Email:Peter.Murray@lyrasis.org
Telephone:+1-678-235-2955
Address:1438 West Peachtree St NW, Suite 200, Atlanta GA 30309-2955
Résuméhttp://dltj.org/resume/
PGP Key
Fingerprint:
(Professional)

Get Public Key
3072D/39DB18A3
C894 CEE7 40BB B1B1 DAE4 D675 31D0 8C88 39DB 18A3
PGP key statistics
Biglumber Listing
Authority Recordhttp://errol.oclc.org/laf/no2004-9223.html
Google Scholar Profilehttp://scholar.google.com/citations?user=dpnown0AAAAJ
Microsoft Academic Search Profilehttp://academic.research.microsoft.com/Author/12182657/peter-e-murray

Recent Posts

Thursday Threads: Google Maps is Good, DRM is Bad, and Two-factor Authentication can be Ugly

Looking at maps, Eastern Carolina University Digital Collections.

Receive DLTJ Thursday Threads:

by E-mail

by RSS

Delivered by FeedBurner

Three threads this week: how mapping technologies have come such a long way in the past few years, and why explaining digital rights management is bad for your sanity, a cautionary tale for those trying to be more conscious about security their digital lives.

Feel free to send this to others you think might be interested in the topics. If you find these threads interesting and useful, you might want to add the Thursday Threads RSS Feed to your feed reader or subscribe to e-mail delivery using the form to the right. If you would like a more raw and immediate version of these types of stories, watch my Pinboard bookmarks (or subscribe to its feed in your feed reader). Items posted to are also sent out as tweets; you can follow me on Twitter. Comments and tips, as always, are welcome.

The Huge, Unseen Operation Behind the Accuracy of Google Maps

The maps behind those voices are packed with far more data than most people realize. On a recent visit to Mountain View, I got a peek at how the Google Maps team assembles their maps and refines them with a combination of algorithms and meticulous manual labor—an effort they call Ground Truth. The project launched in 2008, but it was mostly kept under wraps until just a couple years ago. It continues to grow, now covering 51 countries, and algorithms are playing a bigger role in extracting information from satellite, aerial, and Street View imagery.

A fascinating look at the application of machine learning to map-making. What used to be hand-done (and is still hand-done with projects like Open Street Map) is now machine done with human review.

Things That Make the Librarian Angry: Enforcing artificial scarcity is a bad role for a public institution

Having a waiting list for library ebooks is really stupid, on the face of it. As a librarian I’m pretty savvy about digital content—enough to know that patrons want it, lots of it. However, we have a short list of ways that we can offer it in a lendable fashion. At work I keep my game face on. At home I just want to tell people the truth, the frustrating truth: offering digital content in this way has short term benefits but long term negative consequences.

- Things That Make the Librarian Angry, by Jessamyn West, The Message — Medium, 12-Dec-2014

Jessamyn leads the layperson through the limited choices that librarians need to make as they select ebooks paired with her frustration at not being able to always say what she wants to say to patrons. Digital is different, and when we try to make it behave like physical objects we find that the analogous processes break down.

The Dark Side of Apple's Two-Factor Authentication

I’d turned two-factor on my Apple ID in haste when I read Mat Honan’s harrowing story about how his Mac, iPhone and other devices were wiped when someone broke into his iCloud account. That terrified me into thinking about real security for the first time.
When I finally had time to investigate the errors appearing on my machine, I discovered that not only had my iCloud account been locked, but someone had tried to break in. Two-factor had done its job and kept the attacker out, however, it had also inadvertently locked me out.
The Apple support page relating to lockouts assured me it would be easy to recover my account with a combination of any two of either my password, a trusted device or the two-factor recovery key. When I headed to the account recovery service, dubbed iForgot, I discovered that there was no way back in without my recovery key. That’s when it hit me; I had no idea where my recovery key was or if I’d ever even put the piece of paper in a safe place.

Two factor authentication — when you sign into a system with both something you know (your password) and something you have (like an app that generates a sequence of numbers based on the current time) — is an important step to increase the security of your online identity. But as with all things dealing with security (i.e. choosing strong, unique passwords and not sharing accounts), it isn’t always easy to do it right. It takes effort and forethought (as in this case, the need to print and safely store that long string of random letters) to do effectively.

  1. Thursday Threads: All about online privacy, or lack thereof Leave a reply
  2. Case Studies on Open Source Adoption in Libraries: Koha, CoralERM, and Kuali OLE 1 Reply
  3. Thursday Threads: Mobile Device Encryption, Getty Images for Free 2 Replies
  4. Thursday Threads: Patron Privacy on Library Sites, Communicating with Developers, Kuali Continued Leave a reply
  5. Thursday Threads: Sakai Reverberations, Ada Initiative Fundraising, Cost of Bandwidth 3 Replies
  6. Thursday Threads: History of the Future, Kuali change-of-focus, 2018 Mindset List Leave a reply
  7. Blocking /xmlrpc.php Scans in the Apache .htaccess File 3 Replies
  8. 2nd Workshop on Sustainable Software for Science: Practice and Experiences — Accepted Papers and Travel Support Leave a reply
  9. Kuali Reboots Itself into a Commercial Entity 6 Replies