Weekend Reads 112919

The United States on Tuesday set out a procedure to protect its telecommunications networks and their supply chains from national security threats, saying it would consider whether to bar transactions on a case-by-case basis. —David Shepardson

Last Thursday, Tesla CEO, Elon Musk unveiled Tesla’s latest innovation, the Cybertruck (Or, as he prefers to say, CYBRTRCK.) Tesla already has— if Musk’s cryptic tweet embedded below is correct—at least 200,000 preorders (though the fact that only $100 down payment is required means that enthusiasm is not very expensive)… —Brendan Dixon

The proportion for Golden Ratio is 1:1.618. It is a mathematical equation that has found its way into design practices as well. The golden ratio has been scientifically proven beautiful. The best example to understand the importance of the Golden Ratio can be traced back to one of the most famous paintings: the Mona Lisa. The painting itself uses the golden ratio. —Harsh Raval

After all these “cybersecurity” rules are in place, no foreign company may encrypt data so that it cannot be read by the Chinese central government and the Communist Party of China. In other words, businesses will be required to turn over encryption keys. —Gordon G. Chang

Bean counters have noted that many iconic businesses (Uber, Lyft, Airbnb, WeWork, etc.) are not very profitable. A market shakeout will probably raise the cost of urban living. Here’s some background… —Deyse O’Leary

The minimum viable product (MVP) approach is the minimal or “lean” way to give consumers what they want without it necessarily being a fully realized idea. Given how the cloud works and its unprecedented ability to test incomplete ideas, the MVP approach has become the dominant methodology for pushing ideas out into the world. —John Maeda

By eliminating all the check-out steps required to buy something online, 1-click gave Amazon a decisive edge against cart abandonment, which, according to some studies, averages 70 percent and remains one of the two or three biggest challenges to online retailers. 1-click made impulse buys on the web actually impulsive. —Cliff Kuang

Have you ever worked with someone that has the most valuable time in the world? Someone that counts each precious minute in their presence as if you’re keeping them from something very, very important that they could use to solve world hunger or cure cancer? If you haven’t then you’re a very lucky person indeed. Sadly, almost everyone, especially those in IT, has had the misfortune to be involved with someone whose time is more precious than platinum-plated saffron. —Tom Hollingsworth

The growing adoption of multifactor authentication (MFA) has resulted in a proportionate rise in cyberattacks that target MFA technologies. In a recent Private Industry Notification (PIN), the Federal Bureau of Investigation (FBI) recognized how recent cyberattack campaigns are focusing directly on circumventing MFA. The FBI outlined three specific and comprehensive tactics that hackers have been developing in order to bypass MFA. —Tanner Johnson