6686
Get used to tweets from people you don’t follow in your Twitter timeline. It’s an official feature.
Twitter recently began adding tweets to your timeline that have been favorited by people you follow. The decision has been a controversial one, but it looks like it’s here to... Keep reading →
10 hours ago
Twitter Tests Notifications for Favorites
. Mysterious retweets in your timeline might be this: Twitter Tests Notifications for Favorites
from twitter
12 hours ago
New Delaware Law Allows Users To Will Their Digital Assets To Their Descendants | TLDR blog
New Delaware Law Allows Users To Will Their Digital Assets To Their Descendants | TLDR blog
20 hours ago
Find out which apps are destroying your iPhone or iPad battery life with Normal [commercial variant of Caret] | NetworkWorld
While its easy to see how wi-fi, Bluetooth and screen brightness to rival a supernova can stress the iPhone or iPad's battery, there are hidden battery destroyers present on all iOS devices – apps.
ios 
21 hours ago
Carat: Collaborative Energy Diagnosis [telling you which apps are battery hogs, iOS/Android]
Carat: Collaborative Energy Diagnosis [telling you which apps are battery hogs, iOS/Android]
21 hours ago
Twitter / nprmusic: How Long Do CDs Last? It Depends, ...
RT : How Long Do CDs Last? It Depends, But Definitely Not Forever
from twitter
23 hours ago
The Good, the Bad, and the Ugly of Adam Carolla’s Settlement with the Podcasting Troll | EFF
Big news from Texas: Adam Carolla has settled with the podcasting patent troll Personal Audio. Although the settlement is confidential, we can guess the terms. This is because Personal Audio sent out a press release last month saying it was willing to walk away from its suit with Carolla. So we can assume that Carolla did not pay Personal Audio a penny.
yesterday
A brief history of USB, what it replaced, and what has failed to replace it | Ars Technica
USB isn't perfect, but it replaced lots of ports we'll never have to see again.
yesterday
Internet access is now an essential, but the landline isn't anymore | ZDnet
We could not live without our mobile phones and texting, according to Ofcom's latest survey of consumer habits.
2 days ago
I'm Ira Glass, Host of This American Life, and This Is How I Work | LifeHacker
Ira Glass is a writer, producer, storyteller, performer, and a familiar voice. His show This American Life has set the contemporary standard of nonfiction radio shows, and has influenced and inspired countless others to grab a mic and give podcasting a try.
2 days ago
Why it might be time for Twitter to start filtering your feed [dealing with repeatedly posted links] | The Next Web
It seems that of late, publishers are losing their inhibitions when it comes to tweeting a link to the same piece of content multiple times over a period of hours or days.
2 days ago
802.11ac 'gigabit Wi-Fi' starts to show potential, limits [higher throughput, connected clients vs 802.11n] | NetworkWorld
Vendor tests and very early 802.11ac customers provide a reality check on "gigabit Wi-Fi" but also confirm much of its promise.
2 days ago
Use open source tools to create your own eBooks | Opensource(dot)com
Opensource.com provides a simple, reliable method for creating eBooks the open source way.
2 days ago
Personal Privacy Is Only One of the Costs of NSA Surveillance | Wired
There is no doubt the integrity of our communications and the privacy of our online activities have been the biggest casualty of the NSA’s unfettered surveillance of our digital lives. But the ongoing revelations of government eavesdropping have had a profound impact on the economy, the security of the internet and the credibility of the…
2 days ago
Lawsuit Filed To Prove Happy Birthday Is In The Public Domain; Demands Warner Pay Back Millions Of License Fees | TechDirt
Happy Birthday remains the most profitable song ever. Every year, it is the song that earns the highest royalty rates, sent to Warner/Chappell Music (which makes millions per year from "licensing" the song). However, as we've been...
2 days ago
Most USB thumb drives can be reprogrammed to infect computers | InfoWorld
Most USB thumb drives can be reprogrammed to infect computers | InfoWorld
2 days ago
Why the Security of USB Is Fundamentally Broken | Wired Threat Level blog
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t…
2 days ago
How Verizon lets its copper network decay to force phone customers onto fiber | Ars Technica
Fiber is fast, but copper is reliable—even during multi-week power outages.
3 days ago
The invisible elephant in the room [publishing's significant fixed labor costs] | Dave Bryant blog
Inspired by Christopher Wright’s post on the subject. Addendum: Be sure to read the comments below—they cover additional factors I forgot to bring up myself or are outside my primarily print-based experience. So once again Hachette and Amazon are in the spotlight as their Bleak House drama…
4 days ago
Amazon v. Hachette: Everyone Is Wrong But Me | Eviscerati blog
Amazon v. Hachette: Everyone Is Wrong But Me | Eviscerati blog
4 days ago
First-person Hyperlapse Videos | Microsoft Research
First-person Hyperlapse Videos | Microsoft Research
4 days ago
Microsoft to support fewer IE versions [starting in Jan 2016] | NetworkWorld
Microsoft has started a 17-month campaign to upgrade customers to the newest version of Internet Explorer that their operating systems will support, which should make it simpler for the company to keep the browser secure because it will have fewer versions to deal with.
4 days ago
Law Students Fend Off a Patent Troll | Medium, Patents & Technology Law
A handful of Brooklyn Law students forced a patent troll to drop a meritless lawsuit.
4 days ago
Guns Fueling Immigration from Central America Come from U.S. | New Republic
Guns Fueling Immigration from Central America Come from U.S. | New Republic
4 days ago
What Happens to #Ferguson Affects Ferguson | Medium
What Happens to #Ferguson Affects Ferguson | Medium
Ferguson 
4 days ago
Twitter / pewresearch: In Hype Cycle of what's hot ...
RT : In Hype Cycle of what's hot & what's not in tech world, Internet of Things on top (for now)
from twitter
4 days ago
Chart of the Week: The hype cycle of emerging technologies | Pew Research Center
RT : In Hype Cycle of what's hot & what's not in tech world, Internet of Things on top (for now)
from twitter
4 days ago
How to crack an open source community | InfoWorld
Want to contribute to an open source project? Here are the main reasons you'll struggle -- and some tips to help you persevere
4 days ago
7 ways DARPA is trying to kill the password | InfoWorld
7 ways DARPA is trying to kill the password | InfoWorld
8 days ago
Many home routers supplied by ISPs can be compromised en masse, researchers say | Network World
Some ISP servers used to manage routers provisioned to customers can be hacked from the Internet, researchers from Check Point said
8 days ago
How to copy Vagrant boxes (or duplicate them) | Dev Metal
Copy vagrant box & compress it Making a real 1:1 copy of a Vagrant box is really easy ! Simply turn off the box (if she is currently running - yes, for me a Vagrant box is female!) with vagrant halt and create a package.box file (default name) in the same folder with vagrant package That s it. The package.
8 days ago
EMV: Why Payment Systems Fail [postprint] | CACM Viewpoints
EMV: Why Payment Systems Fail [postprint] | CACM Viewpoints
8 days ago
Update: Payment cards with chips aren't perfect, so encrypt everything, experts say - Computerworld
Update: Payment cards with chips aren't perfect, so encrypt everything, experts say
from twitter
9 days ago
Amazon’s Latest Volley | Scalzi's blog
Amazon’s Latest Volley | Scalzi's blog
9 days ago
How cellphone calling is going all Internet [shift to VoIP native in the device OS] | Network World
It isn’t just wireline voice calls that are shifting to IP. Voice calls over wireless mobile phones are too, in a big way.
10 days ago
New Site Recovers Files Locked by Cryptolocker Ransomware | Krebs on Security
New Site Recovers Files Locked by Cryptolocker Ransomware | Krebs on Security
11 days ago
Scientists reconstruct speech through soundproof glass by watching a bag of potato chips | The Verge
Your bag of potato chips can hear what you're saying. Now, researchers from MIT are trying to figure out a way to make that bag of chips tell them everything that you said — and apparently they...
14 days ago
How to set up a highly available Apache cluster using Heartbeat | OpenLogic Wazi
How to set up a highly available Apache cluster using Heartbeat | OpenLogic Wazi
14 days ago
Crap Detection Resources - Google Docs
RT : Recently updated crap detection tools, resources:
from twitter
16 days ago
The App I Used to Break Into My Neighbor’s Home | Threat Level | WIRED
RT : The App I Used to Break Into My Neighbor’s Home | Threat Level | WIRED
from twitter
25 days ago
BIBFRAME Archives -- July 2014 (#221)
.: "If I ran into ISBD in a dark alley I would take it out with my pocket knife and do us all a big favor."
221  from twitter
25 days ago
The Gratuitous Injustice of American Tipping Culture
"Unless a waiter can be a gentleman, democracy is a failure. If any form of service is menial, democracy is a failure. Those Americans who dislike self-respect in servants are undesirable citizens; they belong in an aristocracy."
27 days ago
The state of women in technology: 15 data points you should know | Tech Republic
There's a massive gender gap in the technology industry, and it's important to be aware of the facts. Here are 15 key statistics on the state of women in tech.
4 weeks ago
Twitter / DataG: I sounded so smart way back ...
I sounded so smart way back when working for . 1,098 high density floppy diskettes!
from twitter
4 weeks ago
Digital Preservation Q&A, where you can ask questions and receive answers from other members of the community.
Digital Preservation Q&A, where you can ask questions and receive answers from other members of the community.
5 weeks ago
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers | USENIX Conference
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers | USENIX Conference
5 weeks ago
Log In - The New York Times
Amazon, a Friendly Giant as Long as It’s Fed | New York Times
from twitter
5 weeks ago
Amazon, a Friendly Giant as Long as It’s Fed | New York Times
Is resistance to Amazon futile in the book publishing world? Its battle with Hachette has many on edge.
book 
5 weeks ago
Amazon Kindle: A Highlight and Note by Peter Murray from Red Mars (Mars Trilogy)
What it means to have power. Power wasn’t a matter of job titles, after all. Power was a matter of vision, pe...
from twitter
5 weeks ago
Amazon Kindle: A Highlight and Note by Peter Murray from Red Mars (Mars Trilogy)
What it means to have power. Power wasn’t a matter of job titles, after all. Power was a matter of vision, pe...
from twitter
5 weeks ago
Log In - The New York Times
How Birth Year Influences Political Views [interactive graphic] | New York Times
from twitter
5 weeks ago
How Birth Year Influences Political Views [interactive graphic] | New York Times
People’s political views are particularly shaped by events they experience between 14 and 24.
5 weeks ago
How the 'PayPal Mafia' redefined success in Silicon Valley | Tech Republic
A decade ago, the PayPal Mafia played a major role in revitalizing the tech industry in Silicon Valley. The story behind this group of leaders proves that their success is more than just luck.
5 weeks ago
Amazon offers authors 100% of sales amid dispute | Market Watch
Amazon.com Inc. appealed directly to authors in a bitter publishing dispute, hoping to gain hearts and minds--and leverage--against Hachette Book Group in talks that could affect e-book pricing industrywide.
book 
6 weeks ago
Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords | Ars Technica
More evidence the Internet of things treats security as an afterthought.
6 weeks ago
Clayton Christensen Responds to New Yorker Takedown of 'Disruptive Innovation' | Business Week
Harvard business guru accuses Harvard history professor of "criminal act of dishonesty"
6 weeks ago
Avoiding Stupidity is Easier than Seeking Brilliance [Winner’s Game versus Loser’s Game] | Farnam Street Blog
Avoiding Stupidity is Easier than Seeking Brilliance [Winner’s Game versus Loser’s Game] | Farnam Street Blog
6 weeks ago
Is Math Liberal? | Mother Jones
Is Math Liberal? | Mother Jones
6 weeks ago
NSA Targets the Privacy-Conscious for Surveillance | Schneier on Security
NSA Targets the Privacy-Conscious for Surveillance | Schneier on Security
6 weeks ago
A Rogue State Along Two Rivers [interactive map] | New York Times
The victories gained by the militant group calling itself the Islamic State in Iraq and Syria were built on months of maneuvering along the Tigris and Euphrates Rivers, which define a region known as the cradle of civilization.
6 weeks ago
Your device, your data: Don't let IT screw up your iPhone or iPad | InfoWorld
Your device, your data: Don't let IT screw up your iPhone or iPad | InfoWorld
6 weeks ago
Inbox to app developers: Disrupt our email -- please! [REST API over existing email protocols] | InfoWorld
Inbox to app developers: Disrupt our email -- please! [REST API over existing email protocols] | InfoWorld
6 weeks ago
If you read Boing Boing [or access a TOR node or look for information about TOR or…], the NSA considers you a target for deep surveillance | Boing Boing
If you read Boing Boing [or access a TOR node or look for information about TOR or…], the NSA considers you a...
6 weeks ago
Google sweetens the deal for transitioning to Google Apps in the enterprise | TechRepublic
Google sweetens the deal for transitioning to Google Apps in the enterprise | TechRepublic
6 weeks ago
« earlier      
access accessibility advertising agile ajax ala ala12 ala2007 alamw10 amazon amazon_ec2 apache api apple architecture audio barcode blog book browser business career citation cloudcomputing cmh code4lib collaboration color commerce comparison conference copyright css culture data database datamining description design development digital digital_libraries digitization directory discovery disruption disruptive dltj dns dpla dr drc drm drupal dspace ebook ebooks eclipse economics education ejb3 ejournal email encryption etextbook facebook fedora fedora_dr finance firefox flash flying foss4lib frbr free funstuff future gbs gentoo google googlebooksearch government graphics gtd hardware hcod highered history howto html html5 http humor identifier iii ils imaging innovation internet internetarchive interview j2ee j2karclib java javascript jisc jpeg2000 kindle legal legislation libraries library library2.0 library20 librarysoa licensing linkeddata linux lita litaforum loc maps marc marketing mashup metadata metasearch microformats mobile monitoring mswindows music mysql networking news ngc4lib niso oai oaiore oclc odcecon ohiolink opac open openaccess openlibrary opensource osx paper pdf perl pgp phone photography photoshop php pipa politics presentation preservation printondemand privacy productivity programming protect-ip publishers publishing python rdf reference repair repository research resource resourcesync rest retail rootstrikers sakai scalability science screencast seam search searchengine security semanticweb service shibboleth soa socialmedia socialnetworking software sopa source spam specification standards statistics storage streaming subversion support sysadmin tedtalk television textbook tools travel trends tutorial twitter unconference univsysohio unread usability utilities video visualization weather web web2.0 webarchitecture webdesign webdev webservices wikipedia wireless wordpress worldcat writing xml xslt

Copy this bookmark:



description:


tags: