Scrapbook photo 1
Scrapbook photo 2
Scrapbook photo 3
Scrapbook photo 4
Scrapbook photo 5
Alex Schleber
26,223 followers|584,134 views


Ahahaha... Silicon Valley #ageism  taken to its inevitable conclusion... :)

#startups  /cc +Eli Fennell +Walter H Groth +John Blossom +David Wood +Gunther Sonnenfeld +Steve Faktor +Gideon Rosenblatt +Sandy Fischler +Paul Simbeck-Hampson 
The fable of the dropout prodigy is so widely-told in Silicon Valley that it even came back to bite the enfant terrible who inspired it. In a new Q&A in the New York Times, Farhad Manjoo asks 29-year-old Mark Zuckerberg if he's out of touch with teens.
Diane Chase's profile photoEli Fennell's profile photoDavid Wood's profile photoSandy Fischler's profile photo
Get rid of that old fart!
Add a comment...
*Did #GoogleGlass  just drop support for Hangout Glass video feeds?*

Since G+ doesn't let me reshare her commentary on her reshare of the announcement directly, I am including it here verbatim. My additional comment at the bottom:

"Google Glass originally shared:
#GlassUpdates are back with KitKat for Glass, photo bundles & more"

+Sarah Hill: "Hangouts Pulled from Google Glass

Incredibly disappointing. I understand the decision but why not label video Hangouts "experimental" so the bugs can get fixed? Please don't pull the plug on the #humanmedia platform altogether? Our veterans benefitted from the video call feature. Journalists and Doctors did too. #bringbackhangouts

Noooo... that was actually one of the top #googleglass #usecases in my view, getting immediate expert input via Hangout video feed from your Glass while making e.g. buying decisions, evaluations/pricing, repairs, asf.

See my previous posts about what I've long said will likely be mostly B2B Use Cases for Glass here:

/cc +John Blossom +Rennie Allen +Eli Fennell +Paul Simbeck-Hampson +Steve Faktor +Marshall Kirkpatrick 
John Blossom's profile photoEli Fennell's profile photoRennie Allen's profile photo
+Sarah Hill Keep an eye out, some developer is sure to come up with an easy solution to enable it again.
Add a comment...
Interesting... #makers   #disruption   #startups  x #selfdrivingcars  ...

What if this got crowd-sourced in a major way?! (Hope that Intel doesn't own/control it somehow by way of the Contest...).

Self-driving cars really need to happen a lot sooner than 10 years from now. There was a discussion as to why? here: "...Every parking lot should look like this [with solar panel covered parking]"

"...Alex SchleberApr 11, 2014+2 
Fine, but the real issue are the cars underneath: they should get a lot lighter, smaller, and ideally self-driving to make the "lighter" part possible (cars are still in an "arms race" of sorts due to "user failure")...

John BlossomApr 11, 2014+1
+Alex Schleber Interesting- if self-driving cars are safer, I guess that they could become lighter..."

Indeed. Imagine if the West had opted for across-the-board significantly lighter cars in say 1973, with most of them staying in the 1,000 lbs to 2,000 lbs range, rather than the 2k to 4k lbs. range. We just might have used only about 1/2 or 2/3 of all of the oil used thus far?!

#fivesixfive   /cc +John Blossom +Steve Faktor +MAKE +Gideon Rosenblatt 
It's an exciting time in the automotive industry. New powertrains are in the works. Cars are learning to talk to one another. Self-driving vehicles are just around the corner. But of course, all those advances come at a price. How much will that technology add to the cost of a conventional car?...
John Blossom's profile photoSteve Faktor's profile photoGideon Rosenblatt's profile photo
I'm on the train right now, +Alex Schleber (coming back up from Portland, actually - next trip down, let's try to meet up), so can't see the video on the link. Will check it out later. 

But yeah, this looks super interesting. 
Add a comment...
*Now that (some of) everybody's passwords may have just been compromised due to the #heartbleed  SSL ("https://...") bug* in the widely used OpenSSL open-source security suite used by the majority of Apache/nginx Web servers (60%+ of all servers)...

(a lot of technical, etc. details curated over here: )

... it is probably time for EVERYONE to review their #security  procedures (hold off on changing ALL of your passwords however UNTIL you've ascertained that all the services you use have been fixed! Many have been by now...), and that starts with passwords:

The bad news, as you will understand from reading the great, medium -length post from famed Security Expert Bruce Schneier (he recently spoke at >>>  #trustycon  ), which you really owe to yourself to read in full if you care about anything... is that ALL passwords that can be somewhat remembered by humans are vulnerable, and all others you keep forgetting weekly/monthly/etc. without writing them down.

Which is also a terrible security practice. So what's the solution? You need to use a global Password Manager of some sort, and then use a completely random password for EACH service that you could never remember on your own.

(I wouldn't even trust the "random" starting letters  of words from a phrase known only to you approach he mentions here, because that could probably be attacked with a "dictionary-style" attack as well before long.

Note the sophisticated existing dictionary/combination attacks including most languages known to wo/man and things like L33T-speak that allow skilled attackers to get up to 90%(!) of exisiting passwords once a user/password database is compromised.

And lest you think that Two-Factor Authentication - "2FA" - makes everything OK, keep in mind that SMS text message and similar channels could also be subject to breach.)

I have long resisted this approach myself, thinking that I had a clever enough system of passwords varied for each service that I could still remember... but now that due to Heartbleed everything is on the table and up for review, I am going to bite the bullet and get it set up as described above.

Here are a few places to start (not an endorsement, do your own homework):

For Windows users, this may be a very good free/open-source option:

Sadly no free Mac version (there is a $15 paid one), but there is a free Android version that I will test (carefully, with 1 or 2 minor services at first!) in the coming days:

Then there are the many Usual Suspects of LastPass, 1Password, asf., a pretty good list is mentioned on this Twitter thread:

Among it this new entrant who's security model I am studying right now, but which sounds good so far, and which has a free version:

Also potentially interesting open-source/free:
keepassx /

/cc +David Wood +Alexander Becker +Dan Durrant +Thomas Baekdal +Paul Simbeck-Hampson +Brett Legree +Eli Fennell +Steve Faktor +Sandy Fischler +Gunther Sonnenfeld +Jeff Sayre +John Blossom +John Kellden +Gaythia Weis +Kee Hinckley +Gregory Esau +Rob Salzman +Reg Saddler +Gideon Rosenblatt 
Stefan Koch's profile photoMarkus Nentwig's profile photoEli Fennell's profile photoDavid Wood's profile photo
+Alex Schleber Right, of course two-factor alone isn't a panacea, the underlying security still has to be sound.
Add a comment...

Alex Schleber

Shared publicly  - 
*First new Twitter Profile I've seen in the wild,* complete with a new "Pinned Tweet" feature apparently.

Some design considerations and discarded concepts here:

/cc +Gideon Rosenblatt +Eli Fennell +Sandy Fischler +Paul Simbeck-Hampson
Alex Schleber's profile photoEli Fennell's profile photoSandy Fischler's profile photo
+Eli Fennell there is probably some value in knowing which people are trying to make themselves look like leaders when they're really just followers. That information may have business implications down the road. 
Add a comment...
Have them in circles
26,223 people
WORST of the shills... as long as this form of #Climatechange denialist propaganda is continuing, what hope do we have?

Can we have this guy's account banned for SPAM please? I thought G+ was a least mildly a S.T.E.M. place...

#facepalm   #lesigh   #fivesixfive   /cc +Gaythia Weis +Daniel Estrada +Steve Faktor +Alex Grossman +Rob Salzman +Cindy Brown +Kee Hinckley +Paul Simbeck-Hampson +EARTH: The Operators' Manual +Walter H Groth 
This Earth Day, instead of attacking those who sell fossil fuels, I will applaud them for overcoming constant environmental hysteria:
Leo McDevitt's profile photoAlex Schleber's profile photoSteve Faktor's profile photo
We can overcome the denial machine. The existential reality of climate change will cause more people to come to their senses. Climate denial is increasingly becoming associated with ignorance. We just need to hope it happens in time
Add a comment...
*First confirmed non-state, bad actors exploits of #Heartbleed ...*

And in case you missed it, tons of Heartbleed curation all week/weekend long about both the more technical side:

As well as the less technical users / passwords / etc. side:

In other news, "Oh Canada..." :)
/cc +Eli Fennell +John Blossom +David Wood +Derek Ross +Rennie Allen +Walter H Groth +Theo Tol +Edward Morbius 
The massive Heartbleed encryption security flaw that came to light last week has been used to compromise details of users stored on the systems of the Canadian Revenue Agency and the ...
Theo Tol's profile photoAlex Schleber's profile photoPeter Bachman's profile photo
+Alex Schleber excellent reaching out security through presentation layer point
Add a comment...

Alex Schleber

Shared publicly  - 
Nope... no touch-screen support... nope...

/cc +Eli Fennell +Rennie Allen
A once-confidential Google document, introduced at the Apple-Samsung trial last week, shows what the phone operating system looked like in 2006. And it looked a lot different.
Brett Legree's profile photoAlex Schleber's profile photoSteve Faktor's profile photoEli Fennell's profile photo
+Steve Faktor agree completely - Windows Phone 8.1 is quite solid and polished.

If you're not deeply rooted in the Google camp, it is a good solution. If you are, it can still work with some effort but obviously Android and iOS are easier. 
Add a comment...
#infosec  alert #heartbleed  SSL ("https:") vulnerability.

Was reading about this earlier in the day, but got sidetracked... not good, all of OpenSSL is apparently compromised.

Overview here:

Detailed tech description here:

Dave Winer in the post below: "...It's not clear if credit card companies, online stores like Amazon, banks and brokerage firms, are vulnerable, and if so how quickly they're installing the patched software.

We're in that awful period where the vulnerability has been fully documented publicly. No one knows if any hackers were aware of the problem before it was discovered, but there is no doubt the bad guys know about it now.

This is one of the reasons why the Internet of Things hype is so scary. Right now, in 2014, our entire financial system is accessible through a compromised system. That's bad enough.

But what happens when our bodies are wired to the net. And our cars, homes, everything. It's great to think about when everything is working and everyone plays nice. But if you know anything about software and networks you know that's a naive dream."

Not to speak of all of the #security  considerations about broken Public Key Encryption surfaced around >>>  #trustycon  etc.

#internetofthings  relevant? /cc +John Blossom +Eli Fennell  +Alexander Becker +Dan Durrant +David Wood +Brett Legree 
Alex Schleber's profile photoJohn Blossom's profile photoEli Fennell's profile photoPeter Bachman's profile photo
Ultimately it will be the people who know the least that will have the greatest impact on this issue because they will defer to the media coverage.

Or they could just read the XKCD comic for a simple explanation of the TLS bounds checking protocol failure.

The backstory they will not get is in terms of what we designed for PKI in 1998 and how that was adopted to browsers as a specific implementation in which clients authenticate servers but rarely vice versa.

For people who don't have any idea how or why TLS works or PKI or even the risks of not encrypting their networked data.

That's the interesting path forward in terms of Heartbleed which is greater awareness of the risks

Essentially we took an unused part of the public memory allocation and freed it for a new data point regarding PKI and TLS awareness.

That memory location held a unused meme about Jerry Lewis and France that could be easily be dereferenced and used to improve Internet security.
Add a comment...
Have them in circles
26,223 people
Mindhacker. I dive into the murky depths of the human mind to emerge with Business Mindhacks and Archetype Branding. Curation fanatic.
Mind Explorer...
UPDATE 11/2012: Currently working full-time on a software startup project (more details to come). I may be relatively sparse on here for that reason, but you can always ping/reach me if necessary.

Mindhacker. I dive into the murky depths of the human mind to emerge with Business Mindhacks (including Behavioral Economics) and Archetype Branding. 

I also curate the living daylights out of the Internets. #Curation FTW! Previously on Now mostly here on Google+.

Business Mindhacks: Business Psychology Consulting and Coaching, Archetype Branding, Behavioral Economics including Price-Point Psychology, Neuromarketing, Lifehacks, GTD, Cognitive Science, Memetics, Wordpress/blogging. Myers-Briggs: INTP.


Seriously, who's got time to write long-form posts anymore? It's tedious and often counterproductive. A luxury we often cannot afford anymore at best:

I subscribe to a modular, "info molecule" (instead of "info atom") philosophy, too bad the tools out there are still so very limited...

Will Google+ manage to bring us some useful Curation features?