Projects walkthroughs, tool teardowns, interviews, and more.
Articles tagged: column
Shields Up: In the Face of Supply Chain Attacks, Stay the CoursePosted on
Everything you need to know about supply chain attacks, a kind of security breach that targets trusted distribution channels for delivering software and hardware.
Shields Up: Using Signal Without Giving Your Phone NumberPosted on
Encrypted messaging apps like Signal, as well as WhatsApp and Viber, use your phone number as your main username. This means that if I want to chat with someone on these apps, I have to give them my phone number. But we may have many reasons—both practical and principled—not to share our number with someone. These digits are personal.
Same Diff: Following the Eclipse TrackersPosted on
A roundup of the custom-designed, interactive news items that helped readers prepare for and understand a solar eclipse.
Shields Up: Get Your Malware ShotsPosted on
Malware lets an unauthorized third party access or take control of your device. In practice, it’s become a catch-all term for a huge variety of malicious software. That could include software that hijacks computing resources, lets an attacker monitor your screen, keystrokes,microphone, or effectively turns your device into an expensive brick.
Ms. Management: Driving Our Employees Over the EdgePosted on
Our fetishisation of stoicism means we tend to dismiss deteriorating mental health breakdowns as mere distractions, best treated with an hour or so of venting to colleagues and several infusions of hard liquor.
Ms. Management: I Hope You Find the Time to Read this ColumnPosted on
If you’re the kind of person who is into both checks on the executive branch and the finer points of employment law, you may already have come across the case of KNTV, Inc. and American Federation of Television and Radio Artists, AFL–CIO. If not—and who can blame you—a quick primer: that case set the precedent that an employer’s use of the phrase “I hope you” could be reasonably construed as “coercive.”
Same Diff: The English-Language Press Maps the French ElectionPosted on
Here’s a reminder: In normal times, US-based publications normally don’t put much effort into visualizing foreign elections. Of course, with presidency of Donald Trump, a British vote to leave the European Union, and a presidential election in France without either of the mainstream political parties qualifying, we don’t live in normal times.
Ms. Management: Whose Stories Do We Consider?Posted on
On books, checklists, and the cumulative effect of unconscious decisions.
Two-Factor Authentication for NewsroomsPosted on
Passwords are the brittle wall that keep unwanted visitors out of your accounts. Breaches can hit anyone, but as frequent targets with sensitive sources, work, and personal information at risk, reporters should take extra care. When it comes to account protection, two-factor authentication is one of the most effective defenses available.
Visually Speaking: Designing for the (Un)wired World
By Dana AmiherePosted on
Why newsrooms should go responsive, even for complex projects.
Ms. Management: The Hard Work of Hiring WellPosted on
In this installment of Ms. Management, we learn why a better interview process is better for everyone, not just the applicants.
Shields Up: Developing Security SkepticismPosted on
A little fear can motivate us to take action. But as consumers of security news, even the most well-intentioned reporting can scare us into paralysis—or worse, encourage us to adopt behaviors that promote a false sense of security.
Same Diff: Trump’s Budget ProposalPosted on
The White House budget proposal was released on March 16, and while the document itself was “skinnier” than in years past, news organizations’ efforts in parsing it were as robust as ever. Let’s take a look at how they found their way into and visually reported out the 60-page document.
Ms. Management: This Isn’t the Diverse Newsroom You’re Looking ForPosted on
The first column in the “Ms. Management” series: how newsroom managers can take more tangible steps to increase newsroom diversity.
Opening Secure Channels for Confidential TipsPosted on
To make it easier for tipsters to share sensitive information, a growing number of news organizations are launching resources for confidential tips. This short guide will describe some basics around how to think about security on behalf of your sources before thinking about tools and practices.
Same Diff: Tracking Trump’s PeoplePosted on
Welcome! This is the first of an occasional series of posts I’ll be writing here about how news organizations around the world are going about the same things differently. The plan is to focus on the kind of work that doesn’t fit neatly into our CMSes, or that need custom design or code. I’ve been doing this work for seven years and remain to be fascinated by the varying approaches to the same subject matter. When news breaks, (or perhaps when news is planned 12 months ahead) how do we in media make the same things, differently?
Visually Speaking: Patterns for Humane Data Visualization
By Dana AmiherePosted on
Data can be impersonal, especially large datasets with thousands or even millions of records. The fact that most data of this magnitude is calculated by machines is, however, a sharp contrast to the ultimate goal of examining it in the first place—to find human trends and patterns behind the numbers.
Discrimination by Design
By Lena GroegerPosted on
Discriminatory design and decision-making affects all aspects of our lives: from the quality of our health care and education to where we live to what scientific questions we choose to ask. Here are just a few of the many tangible, visual examples that humans interact with every day.