front cover of Social Media in an English Village
Social Media in an English Village
(Or how to keep people at just the right distance)
Daniel Miller
University College London, 2016
Daniel Miller spent 18 months undertaking an ethnographic study with the residents of an English village, tracking their use of the different social media platforms. Following his study, he argues that a focus on platforms such as Facebook, Twitter and Instagram does little to explain what we post on social media. Instead, the key to understanding how people in an English village use social media is to appreciate just how ‘English’ their usage has become. He introduces the ‘Goldilocks Strategy’: how villagers use social media to calibrate precise levels of interaction ensuring that each relationship is neither too cold nor too hot, but ‘just right’. He explores the consequences of social media for groups ranging from schoolchildren through to the patients of a hospice, and he compares these connections to more traditional forms of association such as the church and the neighbourhood. Above all, Miller finds an extraordinary clash between new social media that bridges the private and the public domains, and an English sensibility that is all about keeping these two domains separate.
[more]

front cover of Trusted Platform Modules
Trusted Platform Modules
Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
[more]


Send via email Share on Facebook Share on Twitter