Article   271669

« earlier    

'All wifi networks' are vulnerable to hacking, security expert discovers | Technology | The Guardian
WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed
internet  wifi  security  vulnerability  wpa2  article  theguardian 
11 hours ago by aeng
UX Without Users isn't UX (Video)
Summary: Many organizations claim to be user-centric. Yet they fail to include users in the development process. Without customer input, organizations risk creating bad interfaces.
ux  enterprise  corporate  research  article  video  nielsen-norman 
12 hours ago by ndstyles
SMMRY - About
Summarize articles, text, websites, essays and PDF documents online for free with SMMRY. Developers can also implement our free API into applications that may require summarization.
summary  algorithm  article  nlp  summarisation  Bookmarks_bar  Coding  godam  idk  junk 
13 hours ago by otlib
End all immigration controls – they’re a sign we value money more than people | Gary Younge | Opinion | The Guardian
"Martin Luther King could have climbed the steps of the Lincoln Memorial and called for a 10-point plan for better legislation. But then who would have remembered that?"
"Immigrants are not the problem. Borders are."
politics  article  opinion  quote 
19 hours ago by tremolo
One person’s history of Twitter, from beginning to end
At some point in 2006, or possibly late 2005, Noah Glass walked into our office all excited about something. That in itself isn’t news because Noah was always excited about something. Dude had an energy.
article 
23 hours ago by mud

« earlier    

related tags

*  2016_populism  2017  actoninstitute  addiction  ai  aladdin  algorithm  algorithms  amazon  animation  animator  announcement  apple  archive  arstechnica  article  attack  attention-economy  attention-span  attention  autonomousvehicles  aviation  aws  baseball  bem  bestpractices  binary  bitcoin  blog  bookmarks_bar  brazil  c++  chaos  china  chrome  cli  code  codereview  coding  coldwar  communication  community  concepts  consumer  container  containerd  corporate  correction  cost-effectiveness-analysis  cost-effectiveness  coverage  cpp  credential  credit-beuros  credit-freeze  credit  cruise  crypto  cryptocurrencies  cryptography  cuba  culture  cybersecurity  debt  deployment  description  design  diet  distraction  distributed  dkl  docker  drm  economics  ecs  editorial  elm  elonmusk  em-português  ember  encryption  engineering  enterprise  equifax  error-handling  experian  experimental  facebook  fascism  fastcompany  fitness  food  fork  freedom  functional-programming  future  game  git  github  go  godam  gokit  golang  google  goroutine  government  grafana  guardian  guide  hack  hacks  headless  health  highereducation  history  homeaudio  hugo  humblebundle  idk  ifttt  ikea  important  innovation  instapaper  internet  interpreter  interview  iot  iphone  iphonex  istio  itcss  jquery  junk  justthomism  kit  kubernetes  lag  lang-en  list  logging  london  longread  longreads  makefile  makermovement  makers  maps  mckinsey  media  medium  mesos  mexican  micro-services  microservice  migration  mlk  moby  money  monitoring  moodboard  music  nationalgeographic  nats  networking  nielsen-norman  nlp  nobelprize  node  nserror  nudge  nutrition  nytimes  openbsd  opinion  oversight  paper  philosophy  photography  police  politics  politiken  pool  privacy  productivity  products  programming  prototyping  python  quote  race  rating  rd  read  reading  recipe  references  replication  repository  research  resources  review  samzdat  sass  science  score  search  security  serverless  silicon-valley  siliconvalley  smithsonian  social  socialmedia  sound  southafrica  soviet  speaker  speech  sports  starter  statistics  submodule  summarisation  summary  support  swift  technology  teenage  testing  theguardian  theintercept  theology  theverge  tifwe  todo  travel  tristan-harris  tristanharris  ue  uk  unc  us  usb  ux  value  version  video  videogame  virtualization  vr  vulnerability  wifi  windows  workshop  wpa  wpa2 

Copy this bookmark:



description:


tags: