August monthly round-up


August has been a quieter month with only two book summaries and no blog posts:

Book summaries

I expect to be publishing more than this in September, though. Next week you'll see a summary for Death by Meeting by Patrick Lencioni and an accompanying blog post with some of my own thoughts on meetings.

Thanks for subscribing and, until next time,

ToSummarise.com

ToSummarise.com

I summarise non-fiction books with more detail and critical analysis than you'll find elsewhere. Join my newsletter to get new summaries delivered straight to your inbox!

Read more from ToSummarise.com

I'm back after a short break with a new summary for The Art of Gathering: How We Meet and Why It Matters by Priya Parker. Great gatherings have so much potential to deepen our social connections and enrich our lives, yet so many gatherings frankly kind of suck. It's worth a read even if you've never thought of yourself as much of a “gatherer”. As usual, the key takeaways are below, and you can find the full summary by clicking the link above. KEY TAKEAWAYS Gatherings don’t have to suck. But...

March was a quieter month with only 2 book summaries: Why We’re Polarized by Ezra Klein (25 mins) — published in 2020, Ezra Klein looks at how US politics got to be so polarized. A Hacker’s Mind by Bruce Schneier (25 mins) — Schneier applies his background in computer security to looking at how market, legal, political, and cognitive systems can also be "hacked". I'm also planning to take some time off next month, so I'll see you in May! Thanks for subscribing and until next time, To Summarise

My latest summary is for A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back by security expert Bruce Schneier. It's an interesting look at the systems around us through the lens of hacking. As usual, the key takeaways are below, and you can find the full summary by clicking the link above. KEY TAKEAWAYS A hack is an activity allowed by the system that subverts the goal or intent of the system. Hacks exploit a vulnerability in the system to advance the hacker’s...