Nicholas Tietz-Sokolsky
Runner. Coffee nerd. Software engineer.

[Review] "The Circle" by Dave Eggers

Surveillance has gotten a lot of media attention lately (and a bit of attention on this very blog), and for good reason. So, it should be no surprise that it’s also turning up in our dystopian novels!

Continue reading...

Surveillance, Schools, and Our Children

In 2010, the news broke that Harriton High School, in a suburb of Philadelphia, was activating webcams on student laptops1. When they were at home. In their bedrooms. They captured photos while students were in private spaces, where they never expected to be watched.

Continue reading...

Fight Burnout, Go For a Run

Here’s something we don’t talk about enough: burnout sucks and it can happen to any one of us. We need to talk about it. We need to know how to deal with it and recover from it. And we need to recognize that everyone can come back from it, stronger than ever.

Continue reading...

[Review] "Data and Goliath" by Bruce Schneier

I just finished reading Bruce Schneier’s latest book, “Data and Goliath.” I was apprehensive at first – I’m a big fan of Schneier’s posts online, but I found this randomly at the library and I was hoping not to be disappointed. In the end, it was well worth the read.

Continue reading...

In Defense of the Midwest

As an undergraduate, I always imagined that I would someday move to the SF Bay Area to live in the heart of the software industry. With this in mind, in my final semester at Kent State, I joined a Silicon Valley startup as their third engineer1. The staff at that time was split: one founder and one engineer were in Mountain View, CA; one founder and one engineer were in Ohio; and one engineer was remote. Nearly every month in the first year, I flew out to the Silicon Valley office to work with the engineers out there.

Continue reading...

How Cryptology Can Fix Identity Theft

Identity theft is a huge problem, costing Americans more than $4.5 billion in 2012. Identity theft victims frequently lose time and money and undergo significant mental hardships while dealing with the fallout. It can happen a few different ways, but one large attack vector is through the identity verification process.

Continue reading...

The Beginning of Something

It seems like everyone in the software industry goes through a blogging phase. This is the beginning of mine.

Continue reading...