Two weeks in a row! This week's DLTJ Thursday Threads looks at how Twitter changed its timeline functionality to include things that it thinks you'll find interesting. Next, for the academic libraries in the audience, is a report from the New Media Consortium on trends and technologies that will libraries will likely encounter in the next five years. Lastly, news about research into how USB devices can spread malware in ways we can't detect.
Feel free to send this to others you think might be interested in the topics. If you find these threads interesting and useful, you might want to add the Thursday Threads RSS Feed to your feed reader or subscribe to e-mail delivery using the form to the right. If you would like a more raw and immediate version of these types of stories, watch my Pinboard bookmarks (or subscribe to its feed in your feed reader). Items posted to are also sent out as tweets; you can follow me on Twitter. Comments and tips, as always, are welcome.
Your Twitter Timeline is No Longer Your Own
Twitter recently began adding tweets to your timeline that have been favorited by people you follow. The decision has been a controversial one, but it looks like it’s here to stay. Twitter has now formally changed its definition of your home timeline to note that it will add in content that it thinks you’ll want to see.- Tweets from People You Don’t Follow in Your Twitter Timeline Are Here to Stay, by Josh Ong, The Next Web, 19-Aug-2014
Additionally, when we identify a Tweet, an account to follow, or other content that's popular or relevant, we may add it to your timeline. This means you will sometimes see Tweets from accounts you don't follow. We select each Tweet using a variety of signals, including how popular it is and how people in your network are interacting with it. Our goal is to make your home timeline even more relevant and interesting.- What's a Twitter timeline?, Twitter Help Center
Twitter was one of the last social network holdouts to not mess with its basic formula of what it showed you: what you saw in your timeline was based directly on who you subscribed to. (Well, we'll ignore the sponsored tweet program for the moment.) As The Next Web points out, Twitter has changed the definition of “What’s a Twitter timeline?” page to include the second quote above. This isn't full-blown filtering -- Twitter is not (yet?) deciding to remove uninteresting tweets from your timeline. It is trying to show you other things that you may be interested in, though.
When I posted an earlier article from The Next Web on LinkedIn about this change, Steve Casburn noted the Medium article The downside of algorithmic filtering. That article pointed out that while the author's Twitter timeline was full of tweets about the police shooting and later civil unrest in Ferguson, her Facebook wall was not -- it had not made it through the algorithmic exclusion filter that Facebook put in place. The author goes on to ask, "what if Ferguson had started to bubble, but there was no Twitter to catch on nationally? Would it ever make it through the algorithmic filtering on Facebook? Maybe, but with no transparency to the decisions, I cannot be sure."
I get that Twitter is trying to increase its "stickiness" by showing us things that it things will hold our interest right in line with things that we ask for. I hope that Twitter doesn't decide to remove things that it things won't be interesting to us. That would change the nature of Twitter dramatically and reduce its usefulness of getting outside of the "filter bubble." (Interestingly, I've yet to see this new behavior myself in either Tweetdeck or the Twitter website.)
A Glimpse at the Future: The Library Edition of the Horizon Report
The NMC Horizon Report: 2014 Library Edition, examines key trends, significant challenges, and emerging technologies for their potential impact on academic and research libraries worldwide. While there are many local factors affecting libraries, there are also issues that transcend regional boundaries and common questions; it was with these questions in mind that this report was created. The NMC Horizon Report: 2014 Library Edition was produced by the NMC in collaboration with University of Applied Sciences (HTW) Chur, Technische Informationsbibliothek (TIB) Hannover, and ETH-Bibliothek Zurich. To create the report, an international body of experts from library management, education, technology, and other fields was convened as a panel. Over the course of three months in the spring of 2014, the 2014 Horizon Project Library Expert Panel came to a consensus about the topics that would appear here in the NMC Horizon Report: 2014 Library Edition.- NMC Horizon Report > 2014 Library Edition, New Medium Consortium
For 12 years, the New Medium Consortium (NMC) and the EDUCAUSE Learning Initiative (ELI) partnered to create the Horizon Report on higher education, a document that brings together practitioners to reach a consensus on emerging technologies in one-, three- and five-year time horizons. This year, NMC and others partnered to create the first report geared towards academic and research libraries. It covers topics like the evolving nature of the scholarly record and the rise of new forms of multidisciplinary research along with the adoption of technologies such as electronic publishing and bibliometrics. This document is well researched and footnoted. And if you want more depth, the project wiki is online with more details about the selected topics and other topics that didn't filter to the top of the discussion.
USB Flash Drives as Vectors for Malware
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found. The problem is that the majority of USB thumb drives, and likely other USB peripherals available on the market, do not protect their firmware -- the software that runs on the microcontroller inside them, said Karsten Nohl, the founder and chief scientist of Berlin-based Security Research Labs.- Most USB thumb drives can be reprogrammed to infect computers, by Lucian Constantin, InfoWorld, 1-Aug-2014
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it’s built into the core of how they work.
Can you trust that USB flash drive? Arguably, no. The problem lies in the software that runs on the flash drive itself. Called the "firmware" it is that software that can be changed to, say, implant malware into files that are copied to and from the flash drive. Or the flash drive could be programmed to emulate a keyboard and "type" nefarious commands to the operating system. Or, most ingeniously in my mind, emulate a network adapter in such a way as to silently redirect all of you internet requests through a bad guy's server.
Why has USB become the main way to connect peripherals to computers? Why hasn't anything replaced it? Ars Technica has an in-depth article on the history of USB and other connectors that have tried to displace it.