niksilver + dopost   2188

High performing teams know more about trust
"Delivering something on-time is key to building trust. But customers can distrust people who want to limit scope in order to achieve early deliverables. Previous disappointments (they never got the functionality they wanted) mean they assume the first release will be the only one. So they include everything in a gold plated wish-list through lack of trust."
trust  delivery  teams  dopost 
yesterday by niksilver
Causal Capital: Self-Healing Risk Solutions
"Perhaps one of the learning takeaways we should acknowledge with Self-Healing Risk Solutions is that the concept reverses the function of reliability to scale, in that the larger and more complex the scale, the more effective, efficient and reliable you become."
risk_management  power_distribution  scalability  self_healing_systems  dopost 
7 days ago by niksilver
Cyber security and information risk guidance for Audit Committees - National Audit Office (NAO)
"Audit committees should be scrutinising cyber security arrangements. To aid them, this guidance complements government advice by setting out high-level questions and issues for audit committees to consider."
auditing  risk_management  cyber_security  security  dopost 
21 days ago by niksilver
Four ways to keep the daily scrum from being about status | Scrum.org
"The heart of the daily scrum is to use it as a micro planning and coordination session for the next 24 hours, not so everyone can share their status. Status can be gleaned from a simple task board, a burndown, a burnup, or other information radiators."
scrum  advice  dopost 
24 days ago by niksilver
Risk Management – The 3 Lines of Defense for Good Risk Management
"Today, a new governance model is gaining popularity. The “three lines of defense” (3LoD) model mobilizes three separate groups—business managers, central risk and compliance management teams, and internal auditors—to work together at different stages to provide increased protection against an ever-widening array of risks."
risk_management  management  auditing  dopost 
5 weeks ago by niksilver
The limits of our language… – Risk Reflections
"And after more than 10 years in audit, risk management and compliance, I think it is the risk functions who have to adapt their language and thinking more to business and management. It is not (primarily) management who needs to be educated more about (downside) risks and formal, heuristic risk “management tools”, periodic review of risk registers and dots on heat maps."
risk_management  language  dopost 
5 weeks ago by niksilver
How Amazon Became Corporate America’s Nightmare
"Other companies become verbs because of their products: to Google or to Xerox. Amazon became a verb because of the damage it can inflict on other companies. To be Amazoned means to have your business crushed because the company got into your industry. And fear of being Amazoned has become such a defining feature of commerce, it’s easy to forget the phenomenon has arisen mostly in about three years."
amazon  business_strategy  dopost 
5 weeks ago by niksilver
Introducing Buffer's Salary Calculator & New Salary Formula
"It’s been over 2 years since we first shared our transparent salary formula; we’ve been truly blown away by the response we’ve seen."
salaries  transparency  openness  buffer  dopost  management 
5 weeks ago by niksilver
A beginner’s guide to using My Get Me There: Manchester’s hilarious attempt at reinventing London’s…
"Those of you who haven’t given up by this point might say that all of these rules and regs negate the benefits of a ticketless system. [...] If that’s the case, you honestly may as well bail out here because you ain’t seen nothing yet."
ticketing  product_development  launch  manchester  public_transport  dopost 
5 weeks ago by niksilver
‘Blockchain’ is meaningless - The Verge
“A bunch of states are really in a rush to pass some sort of legislation to demonstrate how crypto-friendly or tech-savvy they are, [...] Many of them are putting definitions of blockchain technology in these statutes, and from my perspective, they are very problematic definitions.”
blockchain  law  dopost 
5 weeks ago by niksilver
What is an Influence Diagram? | Analytica Software
"An influence diagram is an intuitive visual display of a decision problem. It depicts the key elements, including decisions, uncertainties, and objectives as nodes of various shapes and colors. It shows influences among them as arrows."
uncertainty  visualisation  decision_making  dopost 
6 weeks ago by niksilver
Amazon admits Alexa is creepily laughing at people and is working on a fix - The Verge
"Over the past few days, users with Alexa-enabled devices have reported hearing strange, unprompted laughter. Amazon responded to the creepiness in a statement to The Verge, saying, “We’re aware of this and working to fix it.”"
weird  amazon  amazon_alexa  artificial_intelligence  dopost 
6 weeks ago by niksilver
The Agile Coaching DNA – ChangingDojo – Medium
"To provide this enablement, Agile Coaches can work on five elements (see the image above): Catalyse Improvement, Promote Awareness, Boost Ownership, Develop Competencies, and Facilitate Barrier Removal."
agile  coaching  dopost 
6 weeks ago by niksilver
Causal Capital: The shape of risk
"Risk practitioners who evaluate risk as a single number will miss the shape of uncertainty."
uncertainty  risk  maths  visualisation  dopost 
6 weeks ago by niksilver
How Russia turned the internet against America - POLITICO
""I’m sort of at a loss right now," Hall added. "I value anonymity, but it’s really hard to see how this doesn’t lead to some sort of driver’s license for the internet, which makes me feel horrible. There needs to be some sort of accountability, though I really don’t know what that is. We have a lot of work to do.”"
russia  social_media  use  subversion  politics  dopost 
8 weeks ago by niksilver
How Your Budget Process Blocks Digital Transformation (and What to Do About It) - Connected Futures
"Anders Olesen, a financial management consultant and director of the Beyond Budgeting Institute, enumerated problems this traditional budgeting process creates"
budgets  finance  transformation  dopost 
9 weeks ago by niksilver
Visualising Brexit | Nico Lategan | LinkedIn
"...the focus of this article is to showcase how different forms of visualisation can convey complex information simply in order to aid decision making. I have created three visualisations related to Brexit..."
brexit  visualisation  risk_management  uncertainty  dopost 
9 weeks ago by niksilver
Linguistic bots explain why big groups produce simple grammar | Ars Technica
"A funny thing happens to languages that have huge numbers of speakers: over time, they seem to simplify. They lose all the fiddly bits that make languages like Hungarian so incredibly hard to learn, and instead become more regular and grammatically simple."
language  grammar  dopost 
10 weeks ago by niksilver
It’s not about risk management | Norman Marks on Governance, Risk Management, and Audit
Great discussion about what risk management is all about... "How would you advise the executive team? What would you suggest to the CRO?"
risk  risk_management  comments  dopost 
10 weeks ago by niksilver
Terrorists Don't Do Movie Plots | WIRED
"SOMETIMES IT SEEMS like the people in charge of homeland security spend too much time watching action movies. They defend against specific movie plots instead of against the broad threats of terrorism."
risk_management  terrorism  risk  dopost 
10 weeks ago by niksilver
Please do not try to bring your ‘emotional support peacock’ onto a plane - The Verge
"Yes, a woman at Newark International Airport tried to board a United flight to Los Angeles with her “emotional support peacock,” a phrase that had never been uttered in all of recorded history until yesterday."
weird  animals  flying  dopost 
11 weeks ago by niksilver
Risk Management Collection - NCSC Site
"Welcome to the NCSC's guidance on Risk Management for Cyber Security. In this collection, we'll be outlining the fundamentals of risk management, and describing techniques you can use to manage cyber security risks."
security  risk  risk_management  guidelines  government  cyber_security  dopost 
12 weeks ago by niksilver
An example of game theory in risk management | Norman Marks on Governance, Risk Management, and Audit
"One consultant from a major accounting firm suggested establishing a ‘risk appetite’. But management is not sure that means anything tangible to them. They believe that the right approach, with which I agree, is to understand the options, how they will change the risk at what cost, and then select from them the one or more that make good business sense."
risk_management  game_theory  uncertainty  dopost 
january 2018 by niksilver
The most important audits my team performed | Norman Marks on Governance, Risk Management, and Audit
"Internal auditors should understand that business is not about avoiding or limiting risk, it is about taking the right risk. I have learned that all internal auditors should consider themselves business people who have a job as internal auditors."
dopost  risk_management  auditing 
january 2018 by niksilver
A Deeper Dive into Spectre and Meltdown
"This is a follow up to 'Meltdown and Spectre: What They Are and How to Deal with Them' taking a deeper look at: the characteristics of the vulnerability and potential attacks, why its necessary to patch cloud virtual machines even though the cloud service providers have already applied patches, the nature of the performance impact and how it's affecting real world applications, the need for threat modelling, the role of anti virus, how hardware is affected, and what's likely to change in the long term."
intel  security  hacking  dopost 
january 2018 by niksilver
“Meltdown” and “Spectre”: Every modern processor has unfixable security flaws | Ars Technica
"The presence of the data in the cache can then be detected, because accessing it will be a little bit quicker than if it weren't cached. Other data structures in the processor, such as the branch predictor, can also be probed and have their performance measured, which can similarly be used to reveal sensitive information."
security  intel  amd  dopost 
january 2018 by niksilver
New bill could finally get rid of paperless voting machines | Ars Technica
"Some states already do post-election audits, but even here Halderman argues there's room for improvements. States can maximize the effectiveness of these audits and minimize costs by varying the size of each recount based on the victory margin."
statistics  elections  voting  security  usa  dopost 
january 2018 by niksilver
What’s behind the Intel design flaw forcing numerous patches? | Ars Technica
"Since the Linux patches first came to light, a clearer picture of what seems to be wrong has emerged. While Linux and Windows differ in many regards, the basic elements of how these two operating systems [...] handle system memory is the same..."
security  intel  linux  windows  macros  dopost 
january 2018 by niksilver
You don't ever deliver an Epic User Story even if your Agile tool says you do!
"Clear concise user requirements emerge throughout the journey of an agile project, and the "Epics" are just wrappers along the way."
agile  delivery  business_analysis  epics  backlogs  dopost 
january 2018 by niksilver
Measuring Ethical Culture – Tapping Into “Open Secrets” - The Protiviti View
"I can’t think of an internal investigation of corruption, fraud or misconduct in which the underlying conduct that was at the center of the need for the investigation wasn’t an “open secret” at the company."
ethics  compliance  culture  surveys  dopost 
december 2017 by niksilver
Identifying, assessing, and evaluating risk is the easy part | Norman Marks on Governance, Risk Management, and Audit
"Many ERM programs stop when they have identified a risk, determined its level, assigned an owner, and said what will be done about it. But they usually don’t provide a disciplined process for evaluating the options and identifying the new or modified risks that result from the decision on how to address the original risk – and, essentially, factoring that into the selection process."
risk_management  risk  management  standards  dopost 
december 2017 by niksilver
Chinese hackers go after think tanks in wave of more surgical strikes | Ars Technica
"The think tank attacks in October and November had all the hallmarks of a Chinese operation. The attackers worked largely during Beijing business hours, used tried-and-true (and widely available) tools, and were highly focused in their attempts to extract data."
china  hacking  security  phishing  dopost 
december 2017 by niksilver
Bitcoin: Seven questions you were too embarrassed to ask | Ars Technica
"One back-of-the-envelope calculation suggested that each bitcoin transaction uses 252kWh of electricity—enough to power a typical American home for eight days."
bitcoin  energy  dopost 
december 2017 by niksilver
Iced tea company rebrands as “Long Blockchain” and stock price triples | Ars Technica
"The stock market loved the announcement. Trading opened Thursday morning more than 200 percent higher than Wednesday night's closing price."
blockchain  weird  stock_market  dopost 
december 2017 by niksilver
Revenue and Customs Brief 9 (2014): Bitcoin and other cryptocurrencies - GOV.UK
"This brief sets out HM Revenue and Customs (HMRC) position on the tax treatment of income received from, and charges made in connection with, activities involving Bitcoin and other similar cryptocurrencies, specifically for VAT, Corporation Tax (CT), Income Tax (IT) and Capital Gains Tax (CGT)."
bitcoin  hmrc  tax  guidelines  dopost 
december 2017 by niksilver
'He began to eat Hermione's family': bot tries to write Harry Potter book – and fails in magic ways | Books | The Guardian
"After being fed all seven Potter tales, a predictive keyboard has produced a tale that veers from almost genuine to gloriously bonkers"
harry_potter  artificial_intelligence  humour  dopost 
december 2017 by niksilver
Is Bitcoin a bubble? Here’s what two bubble experts told us | Ars Technica
"Both academics saw clear parallels between the bubbles they've studied and Bitcoin's current rally. Bubbles tend to be driven either by new technologies (like railroads in 1840s Britain or the Internet in the 1990s) or by new financial innovations (like the financial engineering that produced the 2008 financial crisis)."
finance  bitcoin  history  dopost 
december 2017 by niksilver
Risk and Game Theory | Norman Marks on Governance, Risk Management, and Audit
"It is important to consider not only your actions but also those of the other parties. I will leave it to my friend, Ruth Fisher[i], to pick up the explanation of how Game Theory can help you assess the situation, understand and assess the risk, and then make an informed decision."
risk_management  game_theory  dopost 
december 2017 by niksilver
Slicing Pie | Slicing Pie, Perfect Equity Splits for Bootstrapped Startups
"Slicing Pie is a universal, one-size-fits all model that creates a perfectly fair equity split in an early-stage, bootstrapped start-up company."
equity  startups  negotiating  dopost 
november 2017 by niksilver
Inside the Revolution at Etsy - NYTimes.com
"The first time Josh Silverman addressed the staff of Etsy as their newly installed chief executive, he tried to connect with a work force known for its diversity, idealism and sincerity. “Hello,” he said. “My name is Josh. I identify as male. My preferred pronouns are ‘him’ and ‘he.’ Most people just call me Josh.”"
etsy  culture  change  dopost 
november 2017 by niksilver
How app developers and designers feel about the iPhone X—and the notch | Ars Technica UK
"The iPhone X could have easily been one of the roughest transitions for app developers, but it seems that Apple did a good job preparing them for it. Elegant solutions and important groundwork were laid at WWDC and in iOS 11, and that left only a little to be figured out when the phone itself was revealed and came to market."
apple  iphone  design  software_development  dopost 
november 2017 by niksilver
Your Database is Your Prison — Here’s How Expensify Broke Free | First Round Review
"Despite us having no customers—and thus no data to store—our CTO bet the company on a fancy distributed system claiming it was the only way to scale to petabytes of data [...] Like most sexy, ‘hyper-scalable’ solutions, in practice it couldn’t even scale to megabytes..."
technology  startups  databases  dopost 
november 2017 by niksilver
How to fix a program without the source code? Patch the binary directly | Ars Technica UK
"To make space for the new length checking, the part of the program that copied the font name was ever so slightly deoptimized, replacing a faster routine with a slightly slower one, and freeing up a few bytes in the process."
microsoft  security  souce_code  dopost 
november 2017 by niksilver
Transformation troubles and non-technical debt
"...what you have actually done is payed back the "non-technical debt" in your company all in one go and "boosted" your future velocity as a result. You're still in business and now better prepared to take on the future, in fairness you've potentially saved the company from a steady decline and uncertain fate. Things are certainly different."
technical_debt  transformation  dopost 
november 2017 by niksilver
Divining Business Value for Agile Projects - Value Mapping, Value Statements & Measures
Matt Hosking has some answers... "If you read a scrum guide or a paper on prioritisation, or indeed many of the learned texts on Agile, they all seem to fall into a grey area around what business value actually is. They will potentially give you reams of advice on prioritisation methods, however these can only be applied once you understand where your value lies."
value  measurement  agile  prioritisation  dopost 
november 2017 by niksilver
How AV can open you to attacks that otherwise wouldn’t be possible | Ars Technica UK
"AVGater is the latest example of the way AV programs can make people susceptible to attacks that otherwise wouldn't be possible. These types of critical AV weaknesses have existed for as long as the industry has, but they didn't start to get much attention until researchers Alex Wheeler and Neel Mehta presented a talk titled 0wning Antivirus at the Blackhat security conference in 2005."
security  antivirus  dopost 
november 2017 by niksilver
Blog | Documenting Architecture Decisions | Relevance
"An architecture decision record is a short text file in a format similar to an Alexandrian pattern. (Though the decisions themselves are not necessarily patterns, they share the characteristic balancing of forces.) Each record describes a set of forces and a single decision in response to those forces. Note that the decision is the central piece here, so specific forces may appear in multiple ADRs."
architecture  decision_making  documentation  dopost 
november 2017 by niksilver
IBM’s plan to regulate pot with blockchains isn’t as crazy as it sounds | Ars Technica UK
"In a regulatory filing, IBM argued that the province should use a blockchain to manage its legal marijuana market. That is probably not a sentence that you ever expected to read. But it's not as crazy as it sounds."
blockchain  ibm  drugs  canada  dopost 
november 2017 by niksilver
Leaders as Decision Architects
"It’s extraordinarily difficult to rewire the human brain to undo the patterns that lead to such mistakes. But there is another approach: Alter the environment in which decisions are made so that people are more likely to make choices that lead to good outcomes."
failure  psychology  learning  dopost 
november 2017 by niksilver
The serious side of pranking - NCSC Site
"I was recently targeted for a prank and have taken the unorthodox step of asking James Linton, the very person who was trying to prank me, to help write this blog."
phishing  security  email  dopost 
november 2017 by niksilver
The Verge Survey: how Americans really feel about Facebook, Apple - The Verge
"The findings are fascinating: respondents trusted Facebook less than Google, and “trust” was a primary factor for individuals who abstained from using Facebook overall. Respondents trusted Amazon almost as much as their own bank."
survey  facebook  microsoft  twitter  apple  google  amazon  dopost 
november 2017 by niksilver
QA joke
"A QA Tester walks into a bar..."
quality_assurance  testing  humour  dopost 
october 2017 by niksilver
Steve Blank Why Tim Cook is Steve Ballmer and Why He Still Has His Job at Apple
One of the strengths of successful visionary and charismatic CEOs is that they [...] unconsciously force out any world-class innovators from their direct reports. The problem is in a company driven by a visionary CEO, there is only one visionary.
leadership  innovation  apple  microsoft  steve_jobs  tim_cook  dopost 
october 2017 by niksilver
Yes, That Web Project Should Be a PWA · An A List Apart Article
"...many designers and developers (and their management teams) that PWAs aren’t appropriate for their projects. They are! Your site—every site—should be a PWA. This approach offers benefits for every project on the web, but I’ll get to that in a minute."
web_development  architecture  dopost 
october 2017 by niksilver
On HMRC, cloud providers, SMEs – and cloud-first government IT - Computer Weekly Editor's Blog
"The original scoop, another good piece from The Register, said that HM Revenue & Customs’ (HMRC) decision to switch some of its cloud estate from a small UK cloud provider, Manchester-based Datacentred, to Amazon Web Services (AWS), sent the SME into administration. [But] according to our source, “Datacentred was already dead.”"
hmrc  cloud_computing  risk_management  amazon  dopost 
october 2017 by niksilver
Report: Twitter CEO took a Russian impostor’s bait in 2016 | Ars Technica UK
"Accounts like these can allow a fake actor to attract seemingly organic connections to other users, which Twitter may look for when determining whether an account is legitimate and/or should be pushed down by its "quality filter." From there, a politically motivated actor can distribute divisive messages or target advertising at a bucket of like-minded users."
dopost  propaganda  russia  twitter 
october 2017 by niksilver
Sell Your By-products – Signal v. Noise
"Look closely at everything you do. There are probably by-product opportunities everywhere. Hell, even your office space could be a by-product. You rent it to work, but what about after hours? Could you rent it out for events? Maybe you could hold stand-up comedy shows like Maryʼs Futons in San Rafael, California does. Sometimes customers return to buy the futon they were sitting on during the show. That’s extra sweet."
product_development  dopost  business_strategy 
october 2017 by niksilver
Quantitative Risk Analysis for overall project risk - YouTube
Demonstration and discussion of the eyeball plot (or football plot) for indicating projected project completion time and cost.
video  risk_management  visualisation  dopost 
october 2017 by niksilver
My tolerance for risk appetite is fading | Norman Marks on Governance, Risk Management, and Audit
"Now PwC has published a piece, “Board oversight of risk: defining risk appetite in plain English”. I was hoping to see new thinking that would help organizations and their boards manage risk effectively. Instead, while PwC says that risk appetite “is not a new concept but one that can be confusing”, I don’t believe they have succeeded in removing any of that confusion."
risk  risk_management  management  dopost 
october 2017 by niksilver
So what is a Coach and what is a Trainer? | LinkedIn
"The Coach should be able to ask the right questions and make sure the recipient team is moving in the right direction toward their own objective. The recipient team is normally providing all the content themselves. The more the Coach keeps the process moving along and resists him or herself from providing content in the discussion, the more effective they will be."
jobs  agile  coaching  training  dopost 
october 2017 by niksilver
Twitter deleted data potentially crucial to Russia probes - POLITICO
"Were Twitter a contractor for [Russian intelligence agency] the FSB [...] they could not have built a more effective disinformation platform."
russia  twitter  data  election  dopost 
october 2017 by niksilver
How Facebook rewards polarizing political ads - The Verge
"But even as Facebook makes unpopular messages more expensive to distribute, it can still promote polarization on a grander scale: thanks to Facebook’s microtargeting capabilities, voters can see fewer viewpoints that they might disagree with, because Facebook algorithms treat disagreement as bad for the user experience."
facebook  advertising  election  donald_trump  dopost 
october 2017 by niksilver
Wardley Mapping Tools and Techniques – Benjamin Mosior – Medium
"This post has two main sections: A semi-serious reflection on the problem space of tools for mapping, and then a fun overview of all sorts of mapping tools and techniques, informed by discussion and sharing that took place at the inaugural Map Camp."
business_strategy  wardley_maps  dopost 
october 2017 by niksilver
AWS Lambda Summary // Practical Applications
"AWS Lambda is the cornerstone of the AWS serverless framework and provides a fully managed, zero-admin, auto-scaling, pay-per-use, code execution environment."
aws  serverless  dopost  architecture 
october 2017 by niksilver
GOV.UK Ethnicity facts and figures
"Use this service to find information about the different experiences of people from a variety of ethnic backgrounds. It gathers data collected by government in one place, making it available to the public, specialists and charities."
statistics  ethnicity  data  uk  dopost 
october 2017 by niksilver
Can a dynamic IP address constitute personal data? - Privacy, Security and Information Law Fieldfisher
Dynamic IP addresses could be considered personally identifiable information (PII) in the context of GDPR.
gdpr  privacy  data  legal  dopost 
october 2017 by niksilver
Why it’s important to understand that agile is radically different to what went before
"...if you think agile is not radically different to what’s gone before, you might believe that the processes and ways-of-working used in the enabling functions around delivery (e.g. Governance, Change Management, Finance, Facilities, IT etc.), that have evolved (and been optimised) to enable non-agile delivery approaches, do not need to be changed to enable agile delivery."
agile  transformation  management  dopost 
october 2017 by niksilver
Facebook’s chief security officer let loose at critics on Twitter over the company’s algorithms - Recode
Facebook's Chief Security Officer argues that fake news is hard to kill with algorithms: "A bunch of the public research really comes down to the feedback loop of "we believe this viewpoint is being pushed by bots" -> ML"
tweets  facebook  media  bias  dopost 
october 2017 by niksilver
Secure development and deployment - NCSC Site
"Today we are pleased to share with you an alpha draft of our secure development and deployment guidance."
security  development  advice  dopost 
october 2017 by niksilver
HP Enterprise let Russia review the Pentagon's security software
"Last year, Hewlett Packard Enterprise (HPE) allowed a Russian defense agency to analyze the source code of a cybersecurity software used by the Pentagon, Reutersreports."
russia  software  hp  usa  security  dopost 
october 2017 by niksilver
Adobe Crossword
"The answers to the crossword are chosen from the 1000 most used passwords for Adobe user accounts from the recent password leak. The clues are up to 50 of the most commonly used hints for each of the passwords."
humour  adobe  passwords  security  dopost 
september 2017 by niksilver
Reader, I clicked on him! I test-drive the online Jane Austen role-playing game | Books | The Guardian
"I’m playing Ever, Jane, a virtual roleplaying game by Judy L Tyrer, formerly of Linden Labs, which created the seminal online world Second Life. As avid fans of Jane Austen, Tyrer and her team at 3 Turn Productions have worked to unify the worlds of Austen’s writing, from Lady Susan to Sense and Sensibility, turning them into Tyrehampton, a place where women in bonnets lounge about in day rooms and dissect their rivals."
games  jane_austen  dopost 
september 2017 by niksilver
Data Viz Project | Collection of data visualizations to get inspired and finding the right type.
"This is a website trying to present all relevant data visualizations, so you can find the right visualization and get inspiration on how to do it."
visualisation  reference  statistics  dopost 
september 2017 by niksilver
The Copenhagen Letter, 2017
"It is time to take responsibility for the world we are creating. Time to put humans before business. Time to replace the empty rhetoric of “building a better world” with a commitment to real action. It is time to organize, and to hold each other accountable."
letter  design  ethics  technology  dopost 
september 2017 by niksilver
3D Face Reconstruction
"This is an online demo of our paper Large Pose 3D Face Reconstruction from a Single Image via Direct Volumetric CNN Regression. Take a look at our project website to read the paper and get the code. Please use a (close to) frontal image, or the face detector won't see you (dlib)"
3d  artificial_intelligence  modelling  photographs  dopost 
september 2017 by niksilver
Two Ex-Googlers Want To Make Bodegas And Mom-And-Pop Corner Stores Obsolete
"The major downside to this concept–should it take off–is that it would put a lot of mom-and-pop stores out of business. In fact, replacing that beloved institution seems explicit in the very name of McDonald’s venture, a Spanish term synonymous with the tiny stores that dot urban landscapes and are commonly run by people originally from Latin America or Asia. Some might bristle at the idea of a Silicon Valley executive appropriating the term “bodega” for a project that could well put lots of immigrants out of work. (One of my coworkers even referred to it as “Bro-dega” to illustrate the disconnect.)"
bodega  retail  startup  startups  economics  social_media  dopost 
september 2017 by niksilver
The great nutrient collapse
"“Every leaf and every grass blade on earth makes more and more sugars as CO2levels keep rising,” Loladze said. “We are witnessing the greatest injection of carbohydrates into the biosphere in human history―[an] injection that dilutes other nutrients in our food supply.”"
food  nutrition  biology  climate_change  science  dopost 
september 2017 by niksilver
The Equifax Data Breach Didn't Have to Be This Bad
"The problem with Social Security numbers is that businesses and financial services treat them as authenticators, meaning that the mere possession of the number is enough to verify a person’s identity. In practice, identification and authentication should be two different things. For example, a driver’s license is a form of identification. A person’s face, which corroborates with the photo on the license, provides the authentication. One is useless without the other."
security  identity  authentication  crime  dopost 
september 2017 by niksilver
Equifax moves to fix weak PINs for “security freeze” on consumer credit reports | Ars Technica UK
"A number of customers discovered that the PINs generated by enrolling in Equifax's TrustedID Premier Service were non-random and apparently sequential—in fact, they were essentially date-time stamps of the time of enrollment."
security  failure  dopost 
september 2017 by niksilver
« earlier      
per page:    204080120160

related tags

2e2  2fa  3d  3d_printing  7digital  37signals  abortion  about_com  abtesting  academia  accessibility  accountability  aclu  acquisition  acquisitions  adobe  advert  advertising  advice  affiliate_schemes  aframe  age  agile  agilepm  agile_awards  airbnb  airlines  airport  airtime  akka  algorithms  alibaba  alphago  alternatives  altruism  amazon  amazon_alexa  amazon_fire  amazon_silk  amazon_storage_gateway  amd  analogy  analyis  analysis  android  animals  animation  anobii  anonymous  ansible  antisemitism  antivirus  aol  apache  api  apis  apologies  apology  app  apple  applebees  apple_daily  apple_newton  apple_pay  apple_watch  applications  apps  app_store  april_fool  archeology  architecture  arduino  art  article  artificial_intelligence  asa  ashley_madison  assurance  asus  atari  atlassian  audio  auditing  augmented_reality  australia  authentication  authoring  automation  automattic  autonomy  autotrader  aws  a_b_testing  ba  bach  backlogs  backup  banking  barak_obama  barbie  basecamp  bbc  bbc_micro  bbh  bdd  beats  bebo  behaviour  belgium  benchmarking  ben_and_jerry  ben_horowitz  betaworks  beta_gov  beyond_budgeting  bias  big_data  bill_gates  biology  bitcoin  bitly  bittorrent  blackberry  bletchley_park  blockchain  blog  blogging  bodega  book  bookmarklet  books  box  branch  branding  brexit  broadband  browsers  bskyb  bt  bubble  budgets  buffer  bugs  building  bullying  busines  business  business_analysis  business_models  business_strategy  buzzfeed  byod  calendar  call_centres  cambridge_analytica  camera  cameras  canada  capitalism  captchas  careers  cars  cartoon  cartoons  case_study  categorisation  category_theory  censorship  census  ceos  certification  ces  change  change_control  characters  charities  charts  cheezburger  chef  children  china  chris_argyris  chrome  cia  cio  circulation  cisco  civilization  civil_liberties  civil_service  claude_shannon  clayton_christensen  climate_change  climbing  clock  clojure  closure  clothing  cloud_computing  cloud_services  cms  cnn  coaching  cobol  codecademy  cognitive_bias  collaboration  color  colour  comcast  comedy  commenting  comments  commission  communication  community  commuting  comparison  competition  complexity  compliance  computing  comscore  concurrency  conference  conferences  confidentiality  configuration_management  containers  content_management  continuous_delivery  continuous_deployment  continuous_integration  contracts  conversion  cookies  cooking  coop  cooperative_group  copyright  corruption  cortana  cost  cost_control  cost_of_delay  counting_crows  co_op  craft  craigslist  creativity  credit_cards  crime  criticism  crunchfund  cryptocat  cryptography  css  culture  customer_feedback  customer_service  customer_value  cvs  cyanogen  cyber_security  cynefin  c_sharp  daily_mail  dan_crow  dart  data  database  databases  data_integration  data_mining  dave_winer  ddd  ddos  debates  decision_making  delicious  delivery  dell  demand_media  deming  demo  democracy  demotix  depression  design  development  devops  digg  digital  digitalness  digital_literacy  directory  direct_gov  disclosure  discrimination  disruption  distributed_computing  diversity  diy  django  dmca  dns  docker  documentation  document_management  donald_trump  don_reinertsen  dopost  doteveryone  download  downsizing  driving  drm  dropbox  drucker  drugs  dsdm  dvd_rentals  dvla  dwp  easter_eggs  ebooks  economics  economist  ecosystems  editorial  editors  education  edward_snowden  eff  effectiveness  efficiency  election  elections  electronics  elixir  elm  elon_musk  email  emc  emergn  emoji  employment  encryption  energized_work  energy  engineering  enterprise_architecture  enterprise_computing  entrepreneurship  environment  epics  epigram  equality  equity  ereaders  ergonomics  eric_ries  eric_schmidt  erlang  erp  estimation  estonia  esynergy  ethics  ethnicity  etsy  eu  event  evernote  everything_everywhere  evidence  evo  exams  excel  expedia  experience  experiment  faa  faber_and_faber  facebook  failure  falsehoods  families  faqs  farming  fashion  favicons  fcc  features  file_formats  file_sharing  film  filters  finance  financials  financial_times  firefox  firefox_os  flame  flash  flickr  fliptop  flow  flying  food  ford  forms  foursquare  fox_news  frameworks  france  freedom  freedom_of_information  freemium  free_software  friendster  friends_reunited  ft  ftc  fun  functional_programming  future  gadgets  game  gamergate  games  gamevy  game_theory  gaming  gantt_charts  gartner  gawker  gchq  gdpr  gds  geeklist  geofeedia  geography  geolocation  germany  getty  gigaom  gilt  gimp  git  github  gmail  gmg  go  godaddy  golang  goldman_sachs  google  googlewhack  google_apps  google_docs  google_drive  google_glass  google_hangouts  google_maps  google_news  google_now  google_play  google_plus  google_reader  google_wallet  gopro  governance  government  gov_uk  gowalla  grammar  graphic  groupon  guardian  guidelines  guides  guns  gus_power  hachette  hacking  hack_day  hack_days  happiness  hardware  harry_potter  haystack  health  healthcare  henry_ford  hillary_clinton  hires  hiring  history  hmrc  hoaxes  holacracy  holland  homelessness  homophobia  hp  hr  hs2  htc  html  html5  http  https  huawei  huffington_post  humour  ibm  icloud  icons  ide  ideas  identity  identity_assurance  idris  ietf  ifg  image  images  immutability  impact_mapping  incremental_delivery  indigo_blue  infographics  information  information_architecture  information_radiators  infrastructure  innovation  instagram  instapaper  insurance  intel  inter  internet  internet_explorer  internet_of_things  interview  invention  investigatory_powers_act  investing  investment  ios  ios5  ios6  iot  ipad  iphone  iplayer  ipo  ipod  isps  issue_tracking  iterative  itunes  itv  itv_digital  james_martin  jane_austen  java  javascript  jeff_jarvis  jgit  jimmy_wales  jobs  job_hunting  joel_spolsky  john_seddon  jonathan_ive  journalism  json  julian_assange  justin_tv  kaizen  kanban  kaspersky  kevin_rose  kickstarter  kindle  kindle_fire  kindness  koch_industries  kodak  labour_party  land_registry  language  languages  lanyrd  laptops  larry_page  lastminute_com  launch  lavabit  law  layout  leadership  leak  lean  lean_startups  leap_motion  learning  legacy_systems  legal  lego  lending  lenovo  lessons  letter  lg  libraries  library  licencing  lifestyle  lift  lightbend  lightbox  lily_cole  linkedin  linking  linus_torvalds  linux  lisp  list  listening  literature  little_printer  lobbying  local  local_government  lock_in  logo  logs  london  lytro  mac  macros  magazine  magazines  mail  mail_online  malware  management  manchester  mandelbrot_sets  manifesto  manufacturing  map  mapping  marissa_mayer  marketing  market_place  market_share  marks_and_spencer  markup  mark_thompson  mark_zuckerberg  martin_odersky  maths  maturity_model  mbo  mbti  measurement  media  medicine  medium  meetings  meg_whitman  memes  mental_health  metaphor  methodologies  methodology  metrics  micro  micropayments  microservices  microsoft  microsoft_surface  microsoft_surface_book  micro_services  mike_arrington  mike_bracken  military  mind_candy  minecraft  mistake  mitt_romney  mixel  mobile  mobiles  mobius  mockito  model  modelling  monads  monarchy  monero  monetisation  mongodb  monitoring  monopolies  moonfruit  motivation  motorola  movies  mozilla  mpaa  music  musical_instrument  music_industry  mutualisation  mvp  myers_briggs  mysociety  myspace  mysql  myths  n0tice  names  naming  nao  nasa  nato  nbc  ndas  negotiating  neil_young  netflix  netkernel  netscape  networking  networks  network_effect  net_neutrality  neuroscience  news  newspapers  newsweek  news_corp  new_york  new_zealand  nexus  nexus_7  nexus_q  nhs  nick_denton  nike  nikon  nik_silver  nintendo  node_js  nokia  noom  northcliffe  north_korea  nostalgia  no_estimates  npr  nsa  ntk  nutrition  nytimes  o2  oauth  obituary  object_orientation  office  offshoring  olympics  onlive  ons  openness  opensource  open_data  open_kanban  open_source  open_standards  operating_systems  operations  oracle  ordnance_survey  organisation_design  osx  outsourcing  ownership  p2p  paid_content  pair_programming  palm  palm_pre  pandora  paradigm_shift  parenthood  parenting  passwords  patent  patents  path  patriot_act  patterns  payment_systems  paypal  paywalls  pdas  pdf  people  performance  perl  personality  personal_data  personas  pgp  philosophy  phishing  photograph  photographs  photography  photoshop  php  physics  pinboard  pinterest  piracy  pivotal_labs  planguage  planning  platform  platforms  playstation  police  politics  poll  pornography  portfolio_management  poster  posterous  poverty  power_distribution  presentation  presentations  pressy  press_release  pricing_models  prince2  principles  printing  prioritisation  prism  prisoners_dilemma  privacy  privatisation  prize  probability  process  procurement  productivity  product_design  product_development  product_management  product_ownership  professionalism  programme_management  programming  programming_language  projects  project_ara  project_glass  project_management  project_tracking  propaganda  protest  protocols  prototyping  psychology  public_relations  public_sector  public_transport  publishing  puppet  puzzle  python  qcon  qr_codes  quality  quality_assurance  quantification  quantified_self  quantum_physics  questioning  queueing_theory  quiz  quote  quotes  qwerly  qwest  qwikster  racism  radio  radiumone  rag_statuses  rally  ransomware  rap  raspberry_pi  rdio  react  readability  reading  realtime  real_options  recording  recruitment  reddit  redhat  reed_elsevier  refactoring  reference  regretsy  regulation  reid_hoffman  religion  remote_access  remuneration  report  reporting  requirements  research  resource_oriented_computing  responsive_design  retail  retrospectives  review  reviews  rewards  rewired_state  riaa  richard_stallman  righthaven  rim  risk  risk_management  robert_scoble  robot  robots  rocket_internet  roo_reynolds  rss  ruby  rules  rumours  russia  s3  saas  sabam  safari  safe  safety  sainsbury  salaries  sales  salesforce.com  samsung  sam_schillace  sap  satire  scala  scalability  scalaz  scaling  schools  science  science_fiction  scott_forstall  screencast  screenshots  screen_capture  scrum  sealand  search  secret  security  self_healing_systems  self_publishing  sensemaker  seo  serverless  services  service_design  service_organisations  sexism  sexuality  sexual_harassment  shares  sharing  shopping  silicon_roundabout  silicon_valley  simon_and_schuster  simplicity  simulation  simulations  sim_cards  siri  six_sigma  skeuomorphism  skills_development  skimlinks  skydiving  slack  slideshare  slow_web_movement  smart_watches  sms  snapchat  social_media  social_networking  society  sociocracy_3_0  software  software_craftsmanship  software_development  software_failure  software_in_practice  songkick  sony  sopa  souce_code  soundcloud  sourceforge  space  spacex  spam  speaking  speech  sponsorship  spoof  sport  spotify  sql  sql_server  square  ssh  ssl  stack_exchange  standards  standard_life  starbucks  startup  startups  star_wars  statistics  statoil  stephen_elop  steve_jobs  stock_market  stoicism  storage  strategy  streaming  stuxnet  subscriptions  subversion  sue_black  supply_chain  support  surveillance  survey  surveys  sustainability  swatting  sweden  swift  switzerland  sxsw  synchronisation  syntax  systems_administration  systems_thinking  system_dynamics  tablet  tablets  targets  tax  taxation  tdd  teaching  teams  teardown  techcrunch  technical_debt  technology  telcos  telecoms  telegraph  telepresence  television  templates  terms_and_conditions  terrorism  tesla  testing  text  theory_of_constraints  the_daily  the_oatmeal  the_onion  the_verge  thinkpad  thoughtworks  threes  ticketing  time  time_out  tim_cook  tips  tool  tools  tor  toy  toyota  toys_r_us  trade  trademarks  traffic  training  transformation  transparency  transport  travel  travis_perkins  trello  trends  trident  trolls  troubleshooting  trust  tumblr  tutorial  tutorials  tweet  tweets  twins  twitch  twitter  typekit  typesafe  typography  uber  uk  uml  uncertainty  unicode  unions  unit_testing  universal_credit  unix  unruly_media  upcoming  updating_mobile  upgrade  ups  urls  usa  usability  usb  use  user_engagement  user_experience  user_interfaces  user_needs  user_research  user_stories  user_testing  vagrant  valuation  value  vanguard  vcs  venture_capitalists  version_control  vibe  video  videos  video_player  video_production  virtualisation  virtual_reality  visibility  vision  visualisation  vlc  voice_recognition  voting  voxio  vpns  vtech  w3c  war  wardley_maps  washington_post  wat  watch  watches  waterfall  watermarking  wearables  wearable_computing  webos  web_analytics  web_development  web_intents  weird  whatsapp  whisper  wifi  wiki  wikileaks  winamp  windows  windows_8  windows_10  windows_hello  windows_phone  windows_xp  wireframing  wolfram  women  wonga  wordpress  work  working_practices  writing  wsj  xbox  xerox  xpday  yahaoo  yahoo  yammer  year_of_code  yell  yotaphone  youtube  y_combinator  zeebox  zipcar  zynga 

Copy this bookmark:



description:


tags: