{"id":4136,"date":"2022-11-23T08:19:15","date_gmt":"2022-11-23T08:19:15","guid":{"rendered":"https:\/\/2024.thenexus.today\/index.php\/2022\/11\/23\/about-me\/"},"modified":"2022-11-23T08:19:15","modified_gmt":"2022-11-23T08:19:15","slug":"about-me","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2022\/11\/23\/about-me\/","title":{"rendered":"About me"},"content":{"rendered":"<p>I\u2019m a <a href=\"https:\/\/medium.com\/a-change-is-coming\/sex-pleasure-and-diversity-friendly-software-the-article-the-acm-wouldnt-publish-19ebc34175d4\">software engineer<\/a> \/ entrepreneur \/ <a href=\"https:\/\/www.quora.com\/How-did-Jon-Pincus-oppression-theory-project-at-Microsoft-go\">strategist<\/a> and <a href=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vQc0m3OCs6TjgZJcb64dKhLR6NB5Zz0gceMSDSx2izmCahcUuFTU2UAOPPFE0aSsGEGwYWYf-93cYgg\/pub?start=false&amp;loop=false&amp;delayms=3000\">activist<\/a> who focuses on justice, equity, diversity, inclusion, and intersectionality. \u00a0I also consult for and advise tech companies on software engineering, technology, and security.<\/p>\n<p>For the last fifteen years, my research focus has been on re-imagining <a href=\"http:\/\/talesfromthe.net\/jon\/?p=113\">computer science as a social science<\/a>. \u00a0 <a href=\"https:\/\/medium.com\/a-change-is-coming\/sex-pleasure-and-diversity-friendly-software-the-article-the-acm-wouldnt-publish-19ebc34175d4\">Sex, pleasure, and diversity-friendly software: the article the ACM wouldn\u2019t publish<\/a> gives an overview of work combining an intersectional diversity perspective with classic software engineering approaches \u2013 and the institutional barriers this kind of work tends to encounter. \u00a0 <a href=\"https:\/\/medium.com\/a-change-is-coming\/diversity-friendly-software-and-strategy-at-techinclusion-seattle-216adcacf780\">Diversity-friendly software and strategy<\/a> (from TechInclusion Seattle) is a short overview with links out to more. \u00a0 \u00a0<a href=\"https:\/\/medium.com\/a-change-is-coming\/diversity-friendly-software-at-sxsw-2017-references-c0ca05a191a6#.r106e1ylk\">The 2017 SXSW presentation,<\/a> with Shireen Mitchell, goes into detail.<\/p>\n<figure class=\"kg-card kg-embed-card\"><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/208905804?h=ad2527c1f0&amp;app_id=122963\" width=\"640\" height=\"360\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen title=\"Diversity Friendly Software SXSW 2017\"><\/iframe><\/figure>\n<p>Other related work includes <a href=\"https:\/\/medium.com\/@jdp23\/transforming-tech-with-diversity-friendly-software-338f56d91df\">Transforming Tech with Diversity-friendly software<\/a> (from TRANSform Tech), a trio of collaborative presentations at the Open Source Bridge conference with Deborah Pierce, Lynn Cyrin, and Tammarrian Rogers, and the resource page on \u00a0<a href=\"https:\/\/medium.com\/a-change-is-coming\/gender-hci-feminist-hci-and-post-colonial-computing-f955a4054c89\">Gender HCI, Feminist HCI, Post-Colonial Computing, Anti-Oppressive Design, and Design Justice<\/a>.<\/p>\n<p>Previous work includes<\/p>\n<ul>\n<li>Creating the static analysis tools PREfix and PREfast as founder and CTO of venture-funded startup Intrinsa (acquired by Microsoft in 1999) and then at Microsoft Research, where I was part of a team that won the prestigious \u201cPresident\u2019s Award\u201d for our industry-leading static analysis work.<\/li>\n<li>Security planning, research, and company-wide culture change with the Microsoft Windows Security Push and XPSP2 task forces. \u00a0The project I led analyzing and recommending for mitigations to reduce exploitation of buffer overruns helped make SP2 the most secure commercial operating system of its time; the attack surface reduction work I did with Mike Howard and Jeannette Wing helped lead to a broadly-used internal tool that got shipped to customers a decade later.<\/li>\n<li>Leading the <a href=\"https:\/\/www.quora.com\/How-did-Jon-Pincus-oppression-theory-project-at-Microsoft-go\">Ad Astra (Analysis and Development of Awesome STRAtegies)<\/a> project as General Manger for Strategy Development in Microsoft\u2019s Online Services Group, at the time the only multi-million dollar oppression theory project done at a Fortune 500 company in conjunction with McKinsey. \u00a0 The <a href=\"http:\/\/original.achangeiscoming.net\/e-luminatus\/index.php?title=Ad_Astra_strategic_principles\">strategic principles<\/a> have held up well. \u00a0 <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=39\">\u201cA very special Ad Astra holiday\u201d<\/a> has some reflections from various group members; <a href=\"https:\/\/www.quora.com\/How-did-Jon-Pincus-oppression-theory-project-at-Microsoft-go\">my Quora answer<\/a> has the public narrative.<\/li>\n<li>Co-founding Qworky, a Seattle-area startup developing an intelligent platform for \u201cmeetings that don\u2019t suck\u201d, with Mikal Lewis and Sally Abrolous<\/li>\n<li>Running an international 60-person engineering and product management organizations as Senior VP of Products at Accellion<\/li>\n<li>Talks at software engineering and security conferences including ICSE, ICSM, ISSTA, and RSA, and publications in <em>IEEE Software, IEEE Security and Privacy, Software Practice and Experience.<\/em><\/li>\n<\/ul>\n<p>I\u2019ve also volunteered with several non-profits, including<\/p>\n<ul>\n<li>co-chairing the Northwest Entreprenuers\u2019 Network\u2019s First-Look Forum pitch competition (with Rebecca Lovell and Rochelle Whalen), where we substantially increased participation by (and success of) women and under-represented minorities.<\/li>\n<li>co-chairing the ACM conference on <a href=\"http:\/\/www.cfp2010.org\/\">Computers, Freedom, and Privacy in a Network Society<\/a> (with Dorothy Glancy and Sigurd Meldal) in 2010, where we developed <a href=\"http:\/\/www.mercurynews.com\/breaking-news\/ci_15326665\">a social network users\u2019 bill of rights<\/a><\/li>\n<li>the National Academies\/CSTB software dependability panel <em><a href=\"http:\/\/sites.nationalacademies.org\/cstb\/completedprojects\/cstb_042247\">Sufficient Evidence?<\/a><\/em><\/li>\n<li>Board member at the Bill of Rights Defense Committee from 2011 to 2014<\/li>\n<\/ul>\n<p>With my activist and organizer hats on, I\u2019m one of the leaders of <a href=\"https:\/\/medium.com\/@IndiPlusWA\/about-indivisible-plus-washington-caab4dd7f113\">Indivisible Plus Washington<\/a>, a 20,000+-person anti-racist non-partisan \u00a0progressive statewide group. \u00a0<a href=\"https:\/\/medium.com\/a-change-is-coming\/a-bad-day-for-a-bad-privacy-bill-a-good-day-for-privacy-a2aeea8e8739\">A bad day for a bad privacy bill, a good day for privacy<\/a>, <a href=\"https:\/\/medium.com\/a-change-is-coming\/significant-progress-although-still-a-ways-to-go-sb-6280-sb-6281-update-82972ab8536d\">Significant progress, although still a ways to go<\/a>, and <a href=\"https:\/\/medium.com\/@jdp23\/urgent-say-no-to-bad-washington-state-privacy-legislation-f6bb252d0963\">Washington says NO! to bad Washington State Privacy Legislation<\/a> (from 2020) highlight how mostly-white progressive groups like Indivisible can follow the lead of diverse, community-led organizations and help contribute to a significant victory. \u00a0 Current projects include privacy and civil liberties activism at the local, state, and national level; a focus on disinformation (working with Shireen Mitchell of Stop Online Violence Against Women); and voter mobilization.<\/p>\n<p>Past activism experience includes:<\/p>\n<ul>\n<li>Organizer at <a href=\"http:\/\/get-fisa-right.wikifoundry.com\/page\/This+time%2C+we%27re+writing+the+history\">Get FISA Right<\/a>, best known for our 2008 organizing on my.barackobama.com, but still active today<\/li>\n<li>Working with Baratunde Thurston, Tracy Viselli, and Lillie Coney on the <a href=\"http:\/\/www.nytimes.com\/2008\/10\/27\/business\/worldbusiness\/27iht-27link.17266736.html\">Voter Suppression Wiki<\/a>, and a great team of people on <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=242\">Twitter Vote Report<\/a>, also in 2008<\/li>\n<li><a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=347\">Starting #p2 (the largest progressive hashtag on Twitter) with Tracy<\/a> in 2009<\/li>\n<li>work with civil liberties coalitions on issues like Stop Real ID Now (in 2005) and opposing TSA overreach (since 2010)<\/li>\n<\/ul>\n<p>I\u2019ve also written and spoken extensively about activism. \u00a0<a href=\"http:\/\/opensourcebridge.org\/wiki\/2017\/Grassroots_activism_is_hard._Can_open_source_help%3F\">Grassroots activism is hard. \u00a0Can open source help?<\/a> (from Open Source Bridge 2017), \u00a0<a href=\"https:\/\/medium.com\/hashtag-resist\/intersectional-inclusion-perspectives-from-the-resistance-manual-2951f78ec32e\">Intersectional Inclusion: Perspectives from the Resistance Manual<\/a> (a 2017 interview with Aditi Juneja), <a href=\"http:\/\/talesfromthe.net\/jon\/?p=687\">Cognitive evolution and revolution<\/a> (from the opening plenary at Politics Online 2009), and <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=1113\">Social network activism and the future of civil liberties<\/a> (originally published on <em>Pam\u2019s House Blend<\/em>) are good starting places . \u00a0The <a href=\"http:\/\/talesfromthe.net\/jon\/?page_id=742\">Writings on activism<\/a> page on Liminal States has a lot more links.<\/p>\n<p><!--kg-card-begin: html--><\/p>\n<p>You can reach me by email (nexus-of-privacy@thenexus.today), or social networks including  <a href=\"http:\/\/twitter.com\/jdp23\">Twitter<\/a>; <a href=\"http:\/\/jdp23.dreamwidth.org\/\">Dreamwidth<\/a>; Mastodon at <a rel=\"me\" href=\"https:\/\/indieweb.social\/@jdp23\">@jdp23@indieweb.social<\/a>, <a rel=\"me\" href=\"https:\/\/hci.social\/@jdp23\">@jdp23@hci.social<\/a>, <a rel=\"me\" href=\"https:\/\/scholar.social\/@jon\">@jon@scholar.social<\/a>, <a rel=\"me\" href=\"https:\/\/toot.cat\/@jdp23\">@jdp23@toot.cat<\/a> and <span style=\"display:none\"> <a rel=\"me\" href=\"https:\/\/oulipo.social\/@jdp23\">oulipo.social<\/a><a rel=\"me\" href=\"https:\/\/social.treehouse.systems\/@jdp23\">social.treehouse.systems<\/a><a rel=\"me\" href=\"https:\/\/kolektiva.social\/@jdp23\">kolektiva.social<\/a> <a rel=\"me\" href=\"https:\/\/pnw.zone\/@jdp23\">pnw.zone<\/a> <a rel=\"me\" href=\"https:\/\/democracy.town\/@jdp23\">democracy.town<\/a> <a rel=\"me\" href=\"https:\/\/mastodon.social\/@jdp23\">mastodon.social<\/a> <a rel=\"me\" href=\"https:\/\/projectmushroom.social\/@jdp23\">projectmushroom.social<\/a><a rel=\"me\" href=\"https:\/\/spore.social\/@jdp23\">spore.social<\/a> <a rel=\"me\" href=\"https:\/\/techpolicy.social\/@jdp23\">techpolicy.social<\/a> <a rel=\"me\" href=\"https:\/\/mastodon.sdf.org\/@jdp23\">mastodon.sdf.org<\/a><\/span>elsewhere; Diaspora at <a rel=\"me\" href=\"https:\/\/diasp.org\/u\/jdp23\">diasp.org<\/a>; <a href=\"http:\/\/www.new.facebook.com\/profile.php?id=623727023\">Facebook<\/a> <a href=\"http:\/\/www.linkedin.com\/in\/jdp23\">LinkedIn<\/a>; and a bunch of other social networks that I&#8217;ve mostly forgotten the passwords to.<!--kg-card-end: html--><\/p>\n<h2 id=\"selected-presentations\">Selected presentations<\/h2>\n<h3 id=\"diversity-inclusion-and-software-engineering\">Diversity, inclusion, and software engineering<\/h3>\n<p><em><a href=\"https:\/\/medium.com\/a-change-is-coming\/diversity-friendly-software-and-strategy-at-techinclusion-seattle-216adcacf780\">Diversity-friendly software and strategy,<\/a><\/em> TechInclusion Seattle, 2017.<\/p>\n<p><em><a href=\"https:\/\/medium.com\/@jdp23\/transforming-tech-with-diversity-friendly-software-338f56d91df\">Transforming Tech with Diversity-friendly software<\/a><\/em>, TRANSform Tech, 2017.<\/p>\n<p><em><a href=\"https:\/\/medium.com\/a-change-is-coming\/diversity-friendly-software-at-sxsw-2017-references-c0ca05a191a6#.r106e1ylk\">Diversity-friendly software<\/a>, <\/em>with Shireen Mitchell, SXSW 2017.<\/p>\n<p><em>Supporting Diversity with a New Approach To Software <\/em>(<a href=\"http:\/\/opensourcebridge.org\/sessions\/1790\">session description<\/a>, <a href=\"http:\/\/opensourcebridge.org\/wiki\/Supporting_diversity_with_a_new_approach_to_software\">wiki page<\/a>, <a href=\"https:\/\/docs.google.com\/presentation\/d\/11t0BS1yJojKwPEcOuQ-iSiEkT1HlZ-VSn0f_vbhosVA\/edit?usp=sharing\">slides<\/a>), with Tammarrian Rogers, Open Source Bridge 2016<\/p>\n<p><em>Building Diverse Social Networks <\/em>(<a href=\"http:\/\/achangeiscoming.net\/docs\/Building%20diverse%20social%20networks.pdf\">slides<\/a>, <a href=\"https:\/\/www.youtube.com\/watch?v=3M_v35HMx80\">video<\/a>), with Lynn Cyrin, Open Source Bridge 2015<\/p>\n<p><em>Towards Diversity-Friendly Social Networks<\/em> (<a href=\"http:\/\/achangeiscoming.net\/docs\/Building%20diverse%20social%20networks.pdf\">slides<\/a>),<em> <\/em>with Deborah Pierce, Open Source Bridge 2014<\/p>\n<p><em>Cognitive evolution and revolution<\/em> (<a href=\"http:\/\/p2pt0.wikifoundry.com\/page\/Cognitive+evolution+and+revolution+at+%23polc09\">slides<\/a>, <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=687\">discussion<\/a>), Politics Online 2009<\/p>\n<p><em>Dealing with Hate Speech, Flaming, and Trolls<\/em> (<a href=\"http:\/\/cfp.wikia.com\/wiki\/Dealing_with_hate_speech,_flaming,_and_trolls\">reference list<\/a>) at Computers, Freedom, and Privacy 2008<\/p>\n<p><em>Project Fabulous<\/em> (<a href=\"http:\/\/research.microsoft.com\/apps\/video\/dl.aspx?id=104543\">audio<\/a>, <a href=\"http:\/\/msrvideo.vo.msecnd.net\/rmcvideos\/104543\/dl\/104543.pdf\">slides<\/a>), Microsoft Research Talk, 2005. \u00a0Alas, the three talks in my Holistic System of Systems series are Microsoft-internal-only.<\/p>\n<h3 id=\"software-engineering-and-security\">Software engineering and Security<\/h3>\n<p><em>What can Diaspora learn about security from Microsoft<\/em> (<a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=1998\">blog post<\/a>), Blue Hat, 2010<\/p>\n<p><em>Computer Science as a Social Science: Applications to Computer Security, <\/em>with Sarah Blankinship, Data Devolution, 2006<\/p>\n<p><em>Graceless Degradation, Measurement, and Other Challenges in Security and Privacy<\/em>, invited talk, ICSE 2004<\/p>\n<p><em>Buffer Overruns<\/em>, RSA 2004<\/p>\n<p><em>Steering the Pyramids: Tools, Technology, and Process in Engineering at Microsoft<\/em>, \u00a0keynote, ICSM 2002<\/p>\n<p><em>Analysis is necessary but by no means sufficient<\/em> (<a href=\"http:\/\/www.cc.gatech.edu\/~harrold\/issta00\/cfp\/slides\/pincus.issta2000.ppt\">slides<\/a>), invited talk, ISSTA 2000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m a software engineer \/ entrepreneur \/ strategist and activist who focuses on justice, equity, diversity, inclusion, and intersectionality. \u00a0I also consult for and advise tech companies on software engineering, technology, and security. For the last fifteen years, my research focus has been on re-imagining computer science as a social science. \u00a0 Sex, pleasure, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4136","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/4136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=4136"}],"version-history":[{"count":0,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/4136\/revisions"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=4136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=4136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=4136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}