Sketchplanations
Big Ideas Little Pictures

Sketchplanations in a book! I think you'll love Big Ideas Little Pictures

Sketchplanations podcast photo of Rob Bell, Tom Pellereau and Jono Hey

Prefer to listen?
Try the podcast

Like Sketchplanations?
Support me on Patreon

Explaining the world one sketch at a time

Acronym vs initialism illustration: comparing the acronym laser—pronounced as a word— and the initialism FBI—pronounced by saying the letters

Acronyms and initialisms

We all know that you make an acronym by taking the initial letters of a set of words and putting them together. So Random Access Memory becomes RAM, or the United States becomes the US. But I only found out recently that these two examples are actually different. An acronym is when the initials of a set of words are said as a word, like laser (light amplification by stimulated emission of radiation), radar (radio detection and ranging), sonar (sound navigation and ranging), NATO (North Atlantic Treaty Organization) or NASA (National Aeronautics and Space Administration). An initialism, by contrast, is when a set of initials are pronounced as letters when you say them, like FBI, CIA, US, BBC or CD. More word-related sketchplanations This sketch was revised for my book Big Ideas Little Pictures. Here's the original.
Read more…
What is 2 factor authentication (2FA) and its meaning: using something you know, something you are, and something you have

What is Two-Factor Authentication (2FA)?

Two-factor authentication (2FA) adds an extra layer of security by requiring two different types of proof to verify your identity. Unlike using a single password, which could be guessed or stolen, 2FA combines multiple forms of authentication to ensure better protection against unauthorised access. How Does 2FA Work? Two-factor authentication typically involves providing two types of evidence from these three categories: • Something you know: e.g., a password or PIN. • Something you have: e.g., a physical card, a key, or a phone. • Something you are: e.g., your fingerprint, voice, or facial recognition. For example: • Logging into an account might require your password (something you know) and a verification code sent to your phone (something you have). • Using a credit card at an ATM requires the card itself (something you have) and your PIN (something you know). This combination significantly reduces the risk of unauthorised access, even if one factor is compromised. Everyday Examples of 2FA • Photo ID verification: You present a photo ID (something you have) and must match the photo (something you are). • ATM withdrawals: Using your debit card (something you have) alongside your PIN (something you know). • Smartphone logins: Entering a password (something you know) and confirming your identity with a fingerprint (something you are). Why Use Two-factor Authentication? Cybercriminals are sneaky and constantly finding new ways to breach security. Two-factor authentication (2FA) provides a vital extra layer of defence by requiring two independent forms of verification. Even if one factor, like a password, is stolen, the second factor helps keep your account secure. Multi-factor authentication (MFA) takes this even further by incorporating two or more factors, adding additional safeguards. Whether you’re protecting personal accounts or sensitive business data, 2FA and MFA are simple yet highly effective tools to reduce the risks of phishing attacks, password leaks, and unauthorised access. This sketch features in my book Big Ideas Little Pictures Related Ideas to Two-Factor Authentication Also see: Types of phishing: phishing, spear-phishing, whaling The bus factor Choose passwords that make you happy 8 character password combinations
Read more…
The Rashomon Effect illustration: a smashed bottle and its contents lie strewn on the ground. Each individual present recounts how this happened and their stories are not the same.

The Rashomon effect

The Rashomon effect is the name given to situations where people give mutually contradictory versions of the same event. Named after the 1950’s Japanese film Rashomon—widely seen as a masterpiece—which hinges on four conflicting descriptions of the same incident. Also commonly seen on the football field by coaches after the game.
Read more…
How owls' necks turn so far round illustration: showing the amazing neck vertebrae they have

How owls’ necks turn so far round

Owls are famous for being able to turn their heads seemingly full circle. It turns out some owls can turn their necks an amazing 270 degrees whereas our necks turn a measly 180 or so — see if you can turn your chin along your shoulder on both sides. However, it’s likely the cause for this amazing feat is that, unlike our eyes, theirs are set facing forward and don’t rotate. So rotating their head becomes a key skill. Biomechanically they are able to turn so far by having twice the neck vertebrae as we do. If each vertebrae turns a little then having more helps them twist much further than us. And yet the real trick is turning your neck while maintaining blood supply to your head through the arteries that also run up your neck. Rotate too far and the arteries can twist, stretch or be impeded. Owls have evolved a number of nifty strategies to help them turn their necks while maintaining blood flow. These include having the large carotid arteries towards the centre where they twist less than ours do, which run up the sides of our vertebrae. They also have loads of space around the arteries that run up inside the vertebrae and an area that may pool with blood at the base of the skull to provide a kind of reservoir if flow gets restricted. And more. All kind of amazing.
Read more…
Conway's law showing how the organisation of a company, as small, distributed teams or large colocated teams can reflect the architecture of the software as modular or monolithic

Conway’s Law

Conway's law is, paraphrased, that the structure of software will mirror the structure of the organisation that built it. Conway was mostly observing software development, but I would think it has some application to any large project: cruise ship design, car design, space shuttle design, and maybe even governments and law. Law is kind of a strong word for an observation, but in any case, here are some other "laws": Fitt’s law Metcalfe’s law Goodhart’s Law Muphry’s law Moore’s law Koomey’s law The law of diminishing brownies The law of lockers and, my favourite, Hofstadter’s Law
Read more…
The Kitchen Working Triangle illustration: a plan view of a kitchen is shown with the distances between commonly related appliances and storage highlighted.

The kitchen working triangle

The kitchen working triangle is the triangle between the most key parts of a kitchen — the sink, the hob and the fridge. The idea is that, when planning the layout of a kitchen, you should consider that you’ll be moving between these three regularly. Ideally, if you can get them just a step or a turn away from each other then your kitchen will be efficient and feel a pleasure to use. Another handy thought is to allow trips to and from the fridge while someone may be preparing food without getting in their way — so having the fridge not deep at the back of the kitchen can be handy. Plus, there’s a useful secondary triangle to consider between the sink, the dishwasher and your storage. Think rinse, dishwash and put away without having to trek back and forth across the kitchen all the time. A more recent concept is to think of zones instead, such as the preparing zone, the cooking zone, the washing zone or the backing zone and make sure each of these has everything you need in them for the activity. And make sure when the dishwasher is open there’s room to walk around it without it getting totally in the way. Also see: How to load a dishwasher well
Read more…
Buy Me A Coffee