niksilver + dopost   2146

How to fix a program without the source code? Patch the binary directly | Ars Technica UK
"To make space for the new length checking, the part of the program that copied the font name was ever so slightly deoptimized, replacing a faster routine with a slightly slower one, and freeing up a few bytes in the process."
microsoft  security  souce_code  dopost 
19 hours ago by niksilver
Transformation troubles and non-technical debt
"...what you have actually done is payed back the "non-technical debt" in your company all in one go and "boosted" your future velocity as a result. You're still in business and now better prepared to take on the future, in fairness you've potentially saved the company from a steady decline and uncertain fate. Things are certainly different."
technical_debt  transformation  dopost 
3 days ago by niksilver
Divining Business Value for Agile Projects - Value Mapping, Value Statements & Measures
Matt Hosking has some answers... "If you read a scrum guide or a paper on prioritisation, or indeed many of the learned texts on Agile, they all seem to fall into a grey area around what business value actually is. They will potentially give you reams of advice on prioritisation methods, however these can only be applied once you understand where your value lies."
value  measurement  agile  prioritisation  dopost 
4 days ago by niksilver
How AV can open you to attacks that otherwise wouldn’t be possible | Ars Technica UK
"AVGater is the latest example of the way AV programs can make people susceptible to attacks that otherwise wouldn't be possible. These types of critical AV weaknesses have existed for as long as the industry has, but they didn't start to get much attention until researchers Alex Wheeler and Neel Mehta presented a talk titled 0wning Antivirus at the Blackhat security conference in 2005."
security  antivirus  dopost 
7 days ago by niksilver
Blog | Documenting Architecture Decisions | Relevance
"An architecture decision record is a short text file in a format similar to an Alexandrian pattern. (Though the decisions themselves are not necessarily patterns, they share the characteristic balancing of forces.) Each record describes a set of forces and a single decision in response to those forces. Note that the decision is the central piece here, so specific forces may appear in multiple ADRs."
architecture  decision_making  documentation  dopost 
9 days ago by niksilver
IBM’s plan to regulate pot with blockchains isn’t as crazy as it sounds | Ars Technica UK
"In a regulatory filing, IBM argued that the province should use a blockchain to manage its legal marijuana market. That is probably not a sentence that you ever expected to read. But it's not as crazy as it sounds."
blockchain  ibm  drugs  canada  dopost 
10 days ago by niksilver
Leaders as Decision Architects
"It’s extraordinarily difficult to rewire the human brain to undo the patterns that lead to such mistakes. But there is another approach: Alter the environment in which decisions are made so that people are more likely to make choices that lead to good outcomes."
failure  psychology  learning  dopost 
11 days ago by niksilver
The serious side of pranking - NCSC Site
"I was recently targeted for a prank and have taken the unorthodox step of asking James Linton, the very person who was trying to prank me, to help write this blog."
phishing  security  email  dopost 
13 days ago by niksilver
The Verge Survey: how Americans really feel about Facebook, Apple - The Verge
"The findings are fascinating: respondents trusted Facebook less than Google, and “trust” was a primary factor for individuals who abstained from using Facebook overall. Respondents trusted Amazon almost as much as their own bank."
survey  facebook  microsoft  twitter  apple  google  amazon  dopost 
16 days ago by niksilver
QA joke
"A QA Tester walks into a bar..."
quality_assurance  testing  humour  dopost 
18 days ago by niksilver
Steve Blank Why Tim Cook is Steve Ballmer and Why He Still Has His Job at Apple
One of the strengths of successful visionary and charismatic CEOs is that they [...] unconsciously force out any world-class innovators from their direct reports. The problem is in a company driven by a visionary CEO, there is only one visionary.
leadership  innovation  apple  microsoft  steve_jobs  tim_cook  dopost 
19 days ago by niksilver
Yes, That Web Project Should Be a PWA · An A List Apart Article
"...many designers and developers (and their management teams) that PWAs aren’t appropriate for their projects. They are! Your site—every site—should be a PWA. This approach offers benefits for every project on the web, but I’ll get to that in a minute."
web_development  architecture  dopost 
20 days ago by niksilver
On HMRC, cloud providers, SMEs – and cloud-first government IT - Computer Weekly Editor's Blog
"The original scoop, another good piece from The Register, said that HM Revenue & Customs’ (HMRC) decision to switch some of its cloud estate from a small UK cloud provider, Manchester-based Datacentred, to Amazon Web Services (AWS), sent the SME into administration. [But] according to our source, “Datacentred was already dead.”"
hmrc  cloud_computing  risk_management  amazon  dopost 
24 days ago by niksilver
Report: Twitter CEO took a Russian impostor’s bait in 2016 | Ars Technica UK
"Accounts like these can allow a fake actor to attract seemingly organic connections to other users, which Twitter may look for when determining whether an account is legitimate and/or should be pushed down by its "quality filter." From there, a politically motivated actor can distribute divisive messages or target advertising at a bucket of like-minded users."
dopost  propaganda  russia  twitter 
27 days ago by niksilver
Sell Your By-products – Signal v. Noise
"Look closely at everything you do. There are probably by-product opportunities everywhere. Hell, even your office space could be a by-product. You rent it to work, but what about after hours? Could you rent it out for events? Maybe you could hold stand-up comedy shows like Maryʼs Futons in San Rafael, California does. Sometimes customers return to buy the futon they were sitting on during the show. That’s extra sweet."
product_development  dopost  business_strategy 
4 weeks ago by niksilver
Quantitative Risk Analysis for overall project risk - YouTube
Demonstration and discussion of the eyeball plot (or football plot) for indicating projected project completion time and cost.
video  risk_management  visualisation  dopost 
4 weeks ago by niksilver
My tolerance for risk appetite is fading | Norman Marks on Governance, Risk Management, and Audit
"Now PwC has published a piece, “Board oversight of risk: defining risk appetite in plain English”. I was hoping to see new thinking that would help organizations and their boards manage risk effectively. Instead, while PwC says that risk appetite “is not a new concept but one that can be confusing”, I don’t believe they have succeeded in removing any of that confusion."
risk  risk_management  management  dopost 
4 weeks ago by niksilver
So what is a Coach and what is a Trainer? | LinkedIn
"The Coach should be able to ask the right questions and make sure the recipient team is moving in the right direction toward their own objective. The recipient team is normally providing all the content themselves. The more the Coach keeps the process moving along and resists him or herself from providing content in the discussion, the more effective they will be."
jobs  agile  coaching  training  dopost 
4 weeks ago by niksilver
Twitter deleted data potentially crucial to Russia probes - POLITICO
"Were Twitter a contractor for [Russian intelligence agency] the FSB [...] they could not have built a more effective disinformation platform."
russia  twitter  data  election  dopost 
5 weeks ago by niksilver
How Facebook rewards polarizing political ads - The Verge
"But even as Facebook makes unpopular messages more expensive to distribute, it can still promote polarization on a grander scale: thanks to Facebook’s microtargeting capabilities, voters can see fewer viewpoints that they might disagree with, because Facebook algorithms treat disagreement as bad for the user experience."
facebook  advertising  election  donald_trump  dopost 
5 weeks ago by niksilver
Wardley Mapping Tools and Techniques – Benjamin Mosior – Medium
"This post has two main sections: A semi-serious reflection on the problem space of tools for mapping, and then a fun overview of all sorts of mapping tools and techniques, informed by discussion and sharing that took place at the inaugural Map Camp."
business_strategy  wardley_maps  dopost 
5 weeks ago by niksilver
AWS Lambda Summary // Practical Applications
"AWS Lambda is the cornerstone of the AWS serverless framework and provides a fully managed, zero-admin, auto-scaling, pay-per-use, code execution environment."
aws  serverless  dopost  architecture 
5 weeks ago by niksilver
GOV.UK Ethnicity facts and figures
"Use this service to find information about the different experiences of people from a variety of ethnic backgrounds. It gathers data collected by government in one place, making it available to the public, specialists and charities."
statistics  ethnicity  data  uk  dopost 
5 weeks ago by niksilver
Can a dynamic IP address constitute personal data? - Privacy, Security and Information Law Fieldfisher
Dynamic IP addresses could be considered personally identifiable information (PII) in the context of GDPR.
gdpr  privacy  data  legal  dopost 
5 weeks ago by niksilver
Why it’s important to understand that agile is radically different to what went before
"...if you think agile is not radically different to what’s gone before, you might believe that the processes and ways-of-working used in the enabling functions around delivery (e.g. Governance, Change Management, Finance, Facilities, IT etc.), that have evolved (and been optimised) to enable non-agile delivery approaches, do not need to be changed to enable agile delivery."
agile  transformation  management  dopost 
5 weeks ago by niksilver
Facebook’s chief security officer let loose at critics on Twitter over the company’s algorithms - Recode
Facebook's Chief Security Officer argues that fake news is hard to kill with algorithms: "A bunch of the public research really comes down to the feedback loop of "we believe this viewpoint is being pushed by bots" -> ML"
tweets  facebook  media  bias  dopost 
5 weeks ago by niksilver
Secure development and deployment - NCSC Site
"Today we are pleased to share with you an alpha draft of our secure development and deployment guidance."
security  development  advice  dopost 
5 weeks ago by niksilver
HP Enterprise let Russia review the Pentagon's security software
"Last year, Hewlett Packard Enterprise (HPE) allowed a Russian defense agency to analyze the source code of a cybersecurity software used by the Pentagon, Reutersreports."
russia  software  hp  usa  security  dopost 
6 weeks ago by niksilver
Adobe Crossword
"The answers to the crossword are chosen from the 1000 most used passwords for Adobe user accounts from the recent password leak. The clues are up to 50 of the most commonly used hints for each of the passwords."
humour  adobe  passwords  security  dopost 
7 weeks ago by niksilver
Reader, I clicked on him! I test-drive the online Jane Austen role-playing game | Books | The Guardian
"I’m playing Ever, Jane, a virtual roleplaying game by Judy L Tyrer, formerly of Linden Labs, which created the seminal online world Second Life. As avid fans of Jane Austen, Tyrer and her team at 3 Turn Productions have worked to unify the worlds of Austen’s writing, from Lady Susan to Sense and Sensibility, turning them into Tyrehampton, a place where women in bonnets lounge about in day rooms and dissect their rivals."
games  jane_austen  dopost 
7 weeks ago by niksilver
Data Viz Project | Collection of data visualizations to get inspired and finding the right type.
"This is a website trying to present all relevant data visualizations, so you can find the right visualization and get inspiration on how to do it."
visualisation  reference  statistics  dopost 
8 weeks ago by niksilver
The Copenhagen Letter, 2017
"It is time to take responsibility for the world we are creating. Time to put humans before business. Time to replace the empty rhetoric of “building a better world” with a commitment to real action. It is time to organize, and to hold each other accountable."
letter  design  ethics  technology  dopost 
8 weeks ago by niksilver
3D Face Reconstruction
"This is an online demo of our paper Large Pose 3D Face Reconstruction from a Single Image via Direct Volumetric CNN Regression. Take a look at our project website to read the paper and get the code. Please use a (close to) frontal image, or the face detector won't see you (dlib)"
3d  artificial_intelligence  modelling  photographs  dopost 
8 weeks ago by niksilver
Two Ex-Googlers Want To Make Bodegas And Mom-And-Pop Corner Stores Obsolete
"The major downside to this concept–should it take off–is that it would put a lot of mom-and-pop stores out of business. In fact, replacing that beloved institution seems explicit in the very name of McDonald’s venture, a Spanish term synonymous with the tiny stores that dot urban landscapes and are commonly run by people originally from Latin America or Asia. Some might bristle at the idea of a Silicon Valley executive appropriating the term “bodega” for a project that could well put lots of immigrants out of work. (One of my coworkers even referred to it as “Bro-dega” to illustrate the disconnect.)"
bodega  retail  startup  startups  economics  social_media  dopost 
8 weeks ago by niksilver
The great nutrient collapse
"“Every leaf and every grass blade on earth makes more and more sugars as CO2levels keep rising,” Loladze said. “We are witnessing the greatest injection of carbohydrates into the biosphere in human history―[an] injection that dilutes other nutrients in our food supply.”"
food  nutrition  biology  climate_change  science  dopost 
9 weeks ago by niksilver
The Equifax Data Breach Didn't Have to Be This Bad
"The problem with Social Security numbers is that businesses and financial services treat them as authenticators, meaning that the mere possession of the number is enough to verify a person’s identity. In practice, identification and authentication should be two different things. For example, a driver’s license is a form of identification. A person’s face, which corroborates with the photo on the license, provides the authentication. One is useless without the other."
security  identity  authentication  crime  dopost 
9 weeks ago by niksilver
Equifax moves to fix weak PINs for “security freeze” on consumer credit reports | Ars Technica UK
"A number of customers discovered that the PINs generated by enrolling in Equifax's TrustedID Premier Service were non-random and apparently sequential—in fact, they were essentially date-time stamps of the time of enrollment."
security  failure  dopost 
9 weeks ago by niksilver
Every JavaScript framework tutorial written more than 5 minutes ago
"Step one, the tutorial said, was to install Tupress. Well, duh. Then Roger had to install Bistup — a lightweight wrapper, whatever that meant. After that, he had to install Claster, which provided a thin unopinionated layer of utility methods and middleware. He didn’t know what that meant either, but installed it anyway."
humour  javascript  frameworks  dopost  tutorials 
9 weeks ago by niksilver
For the love of God, please tell me what your company does
"A button invites us to try a demo, but doesn’t bother to mention what this might be a demo of — clicking it takes us to a contact form, which seduces us with the promise, “Learn how to take your PR and social media marketing programs to the next level”."
marketing  communication  failure  dopost  public_relations 
10 weeks ago by niksilver
Why I owned a Macbook Pro for a day — and what it says to me about the future of Apple
"Chapter 1. ‘How to run a business’ — ‘Think like a customer’. The End."
apple  hardware  customer_service  dopost  mac 
10 weeks ago by niksilver
There are some crazy medical codes out there—here are the weirdest on record | Ars Technica UK
"Amino found that 25,500 people experienced a W2203, which is code for “walked into furniture.” In the same vein, 17,200 Americans walked into walls and 400 walked into a lamppost."
categorisation  health  insurance  data  weird  dopost 
10 weeks ago by niksilver
JP Morgan Chase just got a patent on basic app communications | Ars Technica UK
"As we have explained many times before, the Patent Office seems to operate in an alternate universe where the only evidence of the state of the art in software is found in patents. Indeed, the examiner considered only patents and patent applications when reviewing JP Morgan's application. It's no wonder the office gets it so wrong."
patents  apps  dopost 
10 weeks ago by niksilver
Twitter account suspected of being part of Russian disinformation campaign
"Keir Giles, an expert in Russian information warfare at Chatham House, said that the user’s high standard of English, and the relative complexity of their arguments, would make it “one of the most sophisticated” pro-Kremlin accounts on social media."
russia  propaganda  twitter  analysis  dopost 
11 weeks ago by niksilver
Not everything is awesome | FT Labs
"Unfortunately we often write job ads thinking about how we’d describe the person we want to hire, not how someone like that would describe themselves. So it’s understandable that you describe them in glowing terms, but it’s actually not helpful."
recruitment  sexism  language  dopost 
11 weeks ago by niksilver
If you’re a startup, you should not use React (reflecting on the BSD + patents license)
"“BSD + patents” essentially means that the code is open (for everyone to see and use), but it’s always copyrighted by Facebook. And they grant you a patent license as long as you’re nice to them by never suing Facebook for patent infringement."
facebook  react  patents  legal  startups  licencing  dopost 
12 weeks ago by niksilver
So apparently we lost the grammar war, and on-premises is just called "on premise" now?
"I never thought I'd be writing a blog post like this, but now that I'm coming up on 20 years in this industry, and I'm writing on a website called BrianMadden.com, I feel like I've earned the right to. I'm saddened that the industry seems to have adopted the grammatically-incorrect term "on premise" in place of the actual term, "on premises" when discussing where servers will live."
grammar  cloud_computing  dopost 
august 2017 by niksilver
12 'best practices' IT should avoid at all costs
"What makes IT organizations fail? Often, it’s the adoption of what’s described as “industry best practices” by people who ought to know better but don’t, probably because they’ve never had to do the job."
advice  enterprise_computing  project_management  failure  dopost 
august 2017 by niksilver
AgilePM aka DSDM | IndigoBlue
"If you’ve never heard of it then you really ought to take a look and if you did use it in the past then it’s worth revisiting as much has changed in the latest version (launched in 2014). [...] DSDM is also well structured, established, scalable, home grown and for organisations who’s governance is based around traditional approaches, a more comfortable migration path."
agile  scalability  frameworks  dsdm  agilepm  dopost 
august 2017 by niksilver
How it feels to learn JavaScript in 2016 – Hacker Noon
"No JavaScript frameworks were created during the writing of this article."
javascript  humour  frameworks  dopost 
august 2017 by niksilver
Every Voting Machine at This Hacking Conference Got Totally Pwned
"By the end of the weekend, every one of the roughly 30 machines at the village, including those used to tabulate votes and to check voters in when they go to the polls, had been hacked. Even though several of the exploits ended up paying tribute to Astley, they’re not jokes—they also present a serious lesson about the security vulnerabilities in voting machines that leave them open to tampering and manipulation."
voting  hacking  security  dopost 
august 2017 by niksilver
How these hidden video watermarks can help spot piracy, doctored images | ZDNet
"He argues that what this technology brings is reversibility. Reversible watermarking is a method of hiding the watermark in digital media in such a way that its effect is as imperceptible as possible but which also allows digital media to be restored to its original form, down to the individual bit, once the watermark has been extracted."
video  copyright  algorithms  dopost  watermarking 
august 2017 by niksilver
Thank you Donald Rumsfeld! | IndigoBlue
"I have been working with a client on explaining the concept and management of Uncertainty. I write Uncertainty here with a capital as I would like to differentiate it from the generic use of the word in the same way Agile is often stated. There are many definitions of what Agile thinking is all about but here at Indigoblue we consider the three pillars of Agile as collaboration, incremental delivery and Uncertainty management. So, understanding Uncertainty management is pretty fundamental."
risk  risk_management  uncertainty  agile  dopost 
august 2017 by niksilver
How to spot a fake viral video - The Verge
"we turned to filmmaker and visual effects specialist Alan Melikdjanian, better known as Captain Disillusion — a character Melikdjanian has been playing on YouTube for a decade, and who’s responsible for some of the best (and wittiest) debunkings online. Here are his top tips for spotting forgeries and fakes"
falsehoods  videos  myths  tips  dopost 
august 2017 by niksilver
Cost of Delay: Not Shipping on Time, Part 1 | Johanna Rothman, Management Consultant
"Any delays in our shipment will not push our sales figures to the right. They will remove our max sales from the middle. Got it? We have to make our ship date."
cost_of_delay  delivery  technical_debt  dopost 
august 2017 by niksilver
The best telepresence robot
"...we don't think these devices are ready for prime time. But if you want a telepresence robot to give remote employees a physical presence in your office, the Suitable Technologies Beam Enhanced is the only bot that's reliable and user-friendly enough to consider."
robots  telepresence  review  hardware  dopost 
august 2017 by niksilver
Depression simulator 'Please Knock' arrives September 7th
"Please Knock on My Door is a conversation about depression via video game. Developer Michael Levall created the indie title about his own experiences with depression and the mind-numbing routine of making games."
depression  game  psychology  dopost 
august 2017 by niksilver
Slacking off? ICO probe throws up concerns over instant messaging • The Register
"The Cabinet Office initially told the ICO that Slack "is not used in any official capacity", but in the same sentence added that any decisions made outside the official system would be "properly recorded and transferred to official systems"."
slack  government  freedom_of_information  dopost 
august 2017 by niksilver
Monolithic Architecture pattern
Pattern (plus advantages and disadvantages) for choosing a monolithic architecture for your application.
microservices  architecture  patterns  dopost 
august 2017 by niksilver
Technical Debt: Don't Go Bankrupt - YouTube
Philippe Kruchten on ways to think about, make decisions about, and deal with technical debt.
technical_debt  analysis  video  dopost 
august 2017 by niksilver
Music And Measure Theory - YouTube
"A connection between a classical puzzle about rational numbers and what makes music harmonious."
music  maths  video  dopost 
august 2017 by niksilver
Researchers say WannaCry operator moved bitcoins to “untraceable” Monero | Ars Technica UK
"Monero is a private digital currency that is focused on anonymity. While it is based on blockchain like other cryptocurrencies and uses distributed consensus for all transactions to prevent wallet hacking, it uses "ring signatures"—an anonymous cryptographic signature scheme—to sign transactions."
malware  ransomware  monero  bitcoin  dopost  crime 
august 2017 by niksilver
Escaping the Build Trap by Melissa Perri - Mind the Product
"Companies believe that feature ideas + code = profit. So if we just keep product managers shovelling requirements to the developers, and keep developers shovelling features out the door, all will be fine. But developing products is part of a system. It’s a value exchange."
product_development  value  video  dopost 
august 2017 by niksilver
Taylor Wescoatt - Being the First Product Manager - Mind the Product
"In working at Seedcamp and helping over 100 startups understand product thinking, Taylor Wescoatt has learned some valuable lessons he’d like to share, together with some real-world examples to drive the point home!"
product_development  startups  advice  dopost 
august 2017 by niksilver
Dual-Track Agile: Why Messy Leads to Innovation - Mind the Product
"With Dual-Track Agile, the development team participates in the discovery track – often led by the lead engineer, the UX designer, and the product manager. In other IT development methodologies, the IT teams are only a part of the delivery track, so they don’t get the valuable knowledge from talking with users and performing experiments."
agile  product_development  dopost 
august 2017 by niksilver
Elon Musk says Mark Zuckerberg is an AI dumb-ass | Ars Technica UK
"I suspect the real bone of contention between the two nerds has more to do with time scales: Zuckerberg's stance on AI is that it will massively improve the human condition (and probably Facebook ad revenues) in the short term, but Musk is more concerned with what happens further down the line, when it's too late to put the sentient robot cat back in the bag."
artificial_intelligence  elon_musk  mark_zuckerberg  dopost 
july 2017 by niksilver
A new deal could end Bitcoin’s long-running civil war | Ars Technica UK
"In short, traditionalists are willing to sacrifice growth, if necessary, to preserve Bitcoin's decentralization. Pragmatists are willing to sacrifice decentralization, if necessary, to promote growth. Hence, each camp sees the other as a threat to their vision of Bitcoin's long-term evolution."
bitcoin  dopost 
july 2017 by niksilver
Architecture principles considered harmful | InfoWorld
"Architecture principles are descriptive rules, not prescriptive ones. And that difference is something that can lead us astray, it is related to the difference between statistical and causal relations."
enterprise_architecture  rules  dopost 
july 2017 by niksilver
The Book | Chess and the Art of Enterprise Architecture
"In spite of many `best practices’ and `frameworks’ that have been introduced, Enterprise Architecture is not a great success. After thirty years, we still have the same problems. Chaos is still everywhere. Projects still fail far too often."
enterprise_architecture  change  dopost  book 
july 2017 by niksilver
The Story of the Suicidal Kangaroo - The Analogies Project
"Identify the suicidal kangaroos within your organisation. Typically resistance to behaviour change is related to a particular culture, so you may find that a particular department or function (where cultural norms are distinct to that function) may be resistant to behaviour change."
security  analogy  change  dopost 
july 2017 by niksilver
Would You Ever Fire a Client Because They Were Unkind? | Dave Aron | Pulse | LinkedIn
"When my colleague introduced me and set up the meet, [the client] told me to 'give my pitch', then proceeded to open his laptop and read his email whilst I talked about what we could do. He did not do this surreptitiously, or try to pretend he was also listening; he wanted to show us that he actively ignoring us. Obviously it was not a fun experience, and looking back on it, I wished I had had the courage to stop the meeting and leave."
culture  people  kindness  behaviour  dopost 
july 2017 by niksilver
Software Architecture training musings, day 2 | Richard Wild | Pulse | LinkedIn
Wow - "Don't make software architect a higher pay grade than the developers. This fosters the idea that development is something to aspire away from, and hinders collaboration."
architecture  software_development  careers  dopost  training 
july 2017 by niksilver
“They never want the gravy train to end”—the NASA contracts debate lifts off | Ars Technica UK
"At the heart of this issue lies a tussle between traditional aerospace companies and their penchant for cost-plus contracts and a desire by new space firms such as SpaceX for fixed-price awards."
elon_musk  space  spacex  nasa  dopost  contracts 
july 2017 by niksilver
Android killed Windows Phone, not Apple - The Verge
"So Windows Phone is well and truly dead(excepting a tiny handful of Windows 10 devices). There it lies, buried in the graveyard of failed smartphone platforms. Cause of death: Android. Yes, really."
windows_phone  android  google  microsoft  dopost  mobile 
july 2017 by niksilver
White House releases voter-fraud comments, personal info included (updated)
"As noted by former Deputy Secretary of Labor Chris Lu on Twitter, however, the commission published 112 pages of public comment "without redacting email addresses, home addresses & phone numbers.""
personal_data  usa  voting  dopost 
july 2017 by niksilver
Thousands sign up to clean sewage because they didn't read the small print | Technology | The Guardian
"The (hopefully) joke clause was inserted in the terms and conditions of Manchester-based wifi company Purple for a period of two weeks, “to illustrate the lack of consumer awareness of what they are signing up to when they access free wifi”."
humour  legal  wifi  terms_and_conditions  dopost 
july 2017 by niksilver
What was it like to be at Xerox PARC when Steve Jobs visited? - Quora
"I can supply a few comments to highlight just how little attention is paid in the media, histories, and by most people to find out what actually happened."
apple  xerox  history  user_interfaces  dopost 
july 2017 by niksilver
Lumosity boosts brain function by 0%, the same as normal video games—study | Ars Technica UK
"Brain training may do little more than train healthy brains to be good at brain training, yet another study suggests."
neuroscience  research  games  dopost 
july 2017 by niksilver
Two-factor authentication is a mess - The Verge
"We talk about two-factor like aspirin — a uniform, all-purpose fix that’s straightforward to apply — but the reality is far more complex. The general framework still offers meaningful protection, but it’s time to be honest about its limits."
security  2fa  authentication  dopost 
july 2017 by niksilver
Here’s how to find the weak spots in your personal security | Ars Technica UK
"By using threat modeling to identify your own particular pile of risks, you can then move to counter the ones that are most likely and most dangerous."
risk  security  advice  modelling  dopost 
july 2017 by niksilver
« earlier      
per page:    204080120160

related tags

2e2  2fa  3d  3d_printing  7digital  37signals  abortion  about_com  abtesting  academia  accessibility  accountability  aclu  acquisition  acquisitions  adobe  advert  advertising  advice  affiliate_schemes  aframe  age  agile  agilepm  agile_awards  airbnb  airlines  airport  airtime  akka  algorithms  alibaba  alphago  alternatives  altruism  amazon  amazon_fire  amazon_silk  amazon_storage_gateway  analogy  analyis  analysis  android  animation  anobii  anonymous  ansible  antisemitism  antivirus  aol  apache  api  apis  apologies  apology  app  apple  applebees  apple_daily  apple_newton  apple_pay  apple_watch  applications  apps  app_store  april_fool  archeology  architecture  arduino  art  article  artificial_intelligence  asa  ashley_madison  assurance  asus  atari  atlassian  audio  augmented_reality  australia  authentication  authoring  automation  automattic  autonomy  autotrader  aws  a_b_testing  ba  bach  backup  banking  barak_obama  barbie  basecamp  bbc  bbc_micro  bbh  bdd  beats  bebo  behaviour  belgium  benchmarking  ben_and_jerry  ben_horowitz  betaworks  beta_gov  beyond_budgeting  bias  big_data  bill_gates  biology  bitcoin  bitly  bittorrent  blackberry  bletchley_park  blockchain  blog  blogging  bodega  book  bookmarklet  books  box  branch  branding  brexit  broadband  browsers  bskyb  bt  bubble  budgets  bugs  building  bullying  busines  business  business_analysis  business_models  business_strategy  buzzfeed  byod  calendar  call_centres  cambridge_analytica  camera  cameras  canada  capitalism  captchas  careers  cars  cartoon  cartoons  case_study  categorisation  category_theory  censorship  census  ceos  certification  ces  change  change_control  characters  charities  charts  cheezburger  chef  children  china  chris_argyris  chrome  cia  cio  circulation  cisco  civilization  civil_liberties  civil_service  claude_shannon  clayton_christensen  climate_change  climbing  clock  clojure  closure  clothing  cloud_computing  cloud_services  cms  cnn  coaching  cobol  codecademy  cognitive_bias  collaboration  color  colour  comcast  comedy  commenting  comments  commission  communication  community  commuting  comparison  competition  complexity  compliance  computing  comscore  concurrency  conference  conferences  confidentiality  configuration_management  containers  content_management  continuous_delivery  continuous_deployment  continuous_integration  contracts  conversion  cookies  cooking  coop  cooperative_group  copyright  corruption  cortana  cost  cost_control  cost_of_delay  counting_crows  co_op  craft  craigslist  creativity  credit_cards  crime  criticism  crunchfund  cryptocat  cryptography  css  culture  customer_feedback  customer_service  customer_value  cvs  cyanogen  cynefin  c_sharp  daily_mail  dan_crow  dart  data  database  databases  data_integration  data_mining  dave_winer  ddd  ddos  debates  decision_making  delicious  delivery  dell  demand_media  deming  demo  democracy  demotix  depression  design  development  devops  digg  digital  digitalness  digital_literacy  directory  direct_gov  disclosure  discrimination  disruption  distributed_computing  diversity  diy  django  dmca  dns  docker  documentation  document_management  donald_trump  don_reinertsen  dopost  doteveryone  download  downsizing  driving  drm  dropbox  drucker  drugs  dsdm  dvd_rentals  dvla  dwp  easter_eggs  ebooks  economics  economist  ecosystems  editorial  editors  education  edward_snowden  eff  effectiveness  efficiency  election  elections  electronics  elixir  elm  elon_musk  email  emc  emergn  emoji  employment  encryption  energized_work  engineering  enterprise_architecture  enterprise_computing  entrepreneurship  environment  epigram  equality  ereaders  ergonomics  eric_ries  eric_schmidt  erlang  erp  estimation  estonia  esynergy  ethics  ethnicity  etsy  eu  event  evernote  everything_everywhere  evidence  evo  exams  excel  expedia  experience  experiment  faa  faber_and_faber  facebook  failure  falsehoods  families  faqs  farming  fashion  favicons  fcc  features  file_formats  file_sharing  film  filters  finance  financials  financial_times  firefox  firefox_os  flame  flash  flickr  fliptop  flow  flying  food  ford  forms  foursquare  fox_news  frameworks  france  freedom  freedom_of_information  freemium  free_software  friendster  friends_reunited  ft  ftc  fun  functional_programming  future  gadgets  game  gamergate  games  gamevy  game_theory  gaming  gantt_charts  gartner  gawker  gchq  gdpr  gds  geeklist  geofeedia  geography  geolocation  germany  getty  gigaom  gilt  gimp  git  github  gmail  gmg  go  godaddy  golang  goldman_sachs  google  googlewhack  google_apps  google_docs  google_drive  google_glass  google_hangouts  google_maps  google_news  google_now  google_play  google_plus  google_reader  google_wallet  gopro  governance  government  gov_uk  gowalla  grammar  graphic  groupon  guardian  guides  guns  gus_power  hachette  hacking  hack_day  hack_days  happiness  hardware  haystack  health  healthcare  henry_ford  hillary_clinton  hires  hiring  history  hmrc  hoaxes  holacracy  holland  homelessness  homophobia  hp  hr  hs2  htc  html  html5  http  https  huawei  huffington_post  humour  ibm  icloud  icons  ide  ideas  identity  identity_assurance  idris  ietf  ifg  image  images  immutability  impact_mapping  incremental_delivery  indigo_blue  infographics  information  information_architecture  information_radiators  infrastructure  innovation  instagram  instapaper  insurance  intel  inter  internet  internet_explorer  internet_of_things  interview  invention  investigatory_powers_act  investing  investment  ios  ios5  ios6  iot  ipad  iphone  iplayer  ipo  ipod  isps  issue_tracking  iterative  itunes  itv  itv_digital  james_martin  jane_austen  java  javascript  jeff_jarvis  jgit  jimmy_wales  jobs  job_hunting  joel_spolsky  john_seddon  jonathan_ive  journalism  json  julian_assange  justin_tv  kaizen  kanban  kaspersky  kevin_rose  kickstarter  kindle  kindle_fire  kindness  koch_industries  kodak  labour_party  land_registry  language  languages  lanyrd  laptops  larry_page  lastminute_com  launch  lavabit  law  layout  leadership  leak  lean  lean_startups  leap_motion  learning  legacy_systems  legal  lego  lending  lenovo  lessons  letter  lg  libraries  library  licencing  lifestyle  lift  lightbend  lightbox  lily_cole  linkedin  linking  linus_torvalds  linux  lisp  list  listening  literature  little_printer  lobbying  local  local_government  lock_in  logo  logs  london  lytro  mac  magazine  magazines  mail  mail_online  malware  management  mandelbrot_sets  manifesto  manufacturing  map  mapping  marissa_mayer  marketing  market_place  market_share  marks_and_spencer  markup  mark_thompson  mark_zuckerberg  martin_odersky  maths  maturity_model  mbo  mbti  measurement  media  medicine  medium  meetings  meg_whitman  memes  mental_health  metaphor  methodologies  methodology  metrics  micro  micropayments  microservices  microsoft  microsoft_surface  microsoft_surface_book  micro_services  mike_arrington  mike_bracken  military  mind_candy  minecraft  mistake  mitt_romney  mixel  mobile  mobiles  mobius  mockito  model  modelling  monads  monarchy  monero  monetisation  mongodb  monitoring  monopolies  moonfruit  motivation  motorola  movies  mozilla  mpaa  music  musical_instrument  music_industry  mutualisation  mvp  myers_briggs  mysociety  myspace  mysql  myths  n0tice  names  naming  nao  nasa  nato  nbc  ndas  neil_young  netflix  netkernel  netscape  networking  networks  network_effect  net_neutrality  neuroscience  news  newspapers  newsweek  news_corp  new_york  new_zealand  nexus  nexus_7  nexus_q  nhs  nick_denton  nike  nikon  nik_silver  nintendo  node_js  nokia  noom  northcliffe  north_korea  nostalgia  no_estimates  npr  nsa  ntk  nutrition  nytimes  o2  oauth  obituary  object_orientation  office  offshoring  olympics  onlive  ons  openness  opensource  open_data  open_kanban  open_source  open_standards  operating_systems  operations  oracle  ordnance_survey  organisation_design  osx  outsourcing  ownership  p2p  paid_content  pair_programming  palm  palm_pre  pandora  paradigm_shift  parenthood  parenting  passwords  patent  patents  path  patriot_act  patterns  payment_systems  paypal  paywalls  pdas  pdf  people  performance  perl  personality  personal_data  personas  pgp  philosophy  phishing  photograph  photographs  photography  photoshop  php  physics  pinboard  pinterest  piracy  pivotal_labs  planguage  planning  platform  platforms  playstation  police  politics  poll  pornography  portfolio_management  poster  posterous  poverty  presentation  presentations  pressy  press_release  pricing_models  prince2  principles  printing  prioritisation  prism  prisoners_dilemma  privacy  privatisation  prize  probability  process  procurement  productivity  product_design  product_development  product_management  product_ownership  professionalism  programme_management  programming  programming_language  projects  project_ara  project_glass  project_management  project_tracking  propaganda  protest  protocols  prototyping  psychology  public_relations  public_sector  publishing  puppet  puzzle  python  qcon  qr_codes  quality  quality_assurance  quantification  quantified_self  quantum_physics  questioning  queueing_theory  quiz  quote  quotes  qwerly  qwest  qwikster  racism  radio  radiumone  rag_statuses  rally  ransomware  rap  raspberry_pi  rdio  react  readability  reading  realtime  real_options  recording  recruitment  reddit  redhat  reed_elsevier  refactoring  reference  regretsy  regulation  reid_hoffman  religion  remote_access  remuneration  report  reporting  requirements  research  resource_oriented_computing  responsive_design  retail  retrospectives  review  reviews  rewards  rewired_state  riaa  richard_stallman  righthaven  rim  risk  risk_management  robert_scoble  robot  robots  rocket_internet  roo_reynolds  rss  ruby  rules  rumours  russia  s3  saas  sabam  safari  safe  safety  sainsbury  sales  salesforce.com  samsung  sam_schillace  sap  satire  scala  scalability  scalaz  scaling  schools  science  science_fiction  scott_forstall  screencast  screenshots  screen_capture  scrum  sealand  search  secret  security  self_publishing  sensemaker  seo  serverless  services  service_design  service_organisations  sexism  sexuality  sexual_harassment  shares  sharing  shopping  silicon_roundabout  silicon_valley  simon_and_schuster  simplicity  simulation  simulations  sim_cards  siri  six_sigma  skeuomorphism  skills_development  skimlinks  skydiving  slack  slideshare  slow_web_movement  smart_watches  sms  snapchat  social_media  social_networking  society  sociocracy_3_0  software  software_craftsmanship  software_development  software_failure  software_in_practice  songkick  sony  sopa  souce_code  soundcloud  sourceforge  space  spacex  spam  speaking  speech  sponsorship  spoof  sport  spotify  sql  sql_server  square  ssh  ssl  stack_exchange  standards  standard_life  starbucks  startup  startups  star_wars  statistics  statoil  stephen_elop  steve_jobs  stoicism  storage  strategy  streaming  stuxnet  subscriptions  sue_black  supply_chain  support  surveillance  survey  sustainability  swatting  sweden  swift  switzerland  sxsw  synchronisation  syntax  systems_administration  systems_thinking  system_dynamics  tablet  tablets  targets  tax  taxation  tdd  teaching  teams  teardown  techcrunch  technical_debt  technology  telcos  telecoms  telegraph  telepresence  television  templates  terms_and_conditions  terrorism  tesla  testing  text  theory_of_constraints  the_daily  the_oatmeal  the_onion  the_verge  thinkpad  thoughtworks  threes  time  time_out  tim_cook  tips  tool  tools  tor  toy  toyota  toys_r_us  trade  trademarks  traffic  training  transformation  transparency  transport  travel  travis_perkins  trello  trends  trident  trolls  troubleshooting  trust  tumblr  tutorial  tutorials  tweet  tweets  twins  twitch  twitter  typekit  typesafe  typography  uber  uk  uml  uncertainty  unicode  unions  unit_testing  universal_credit  unix  unruly_media  upcoming  updating_mobile  upgrade  ups  urls  usa  usability  usb  user_engagement  user_experience  user_interfaces  user_needs  user_research  user_stories  user_testing  vagrant  valuation  value  vanguard  vcs  venture_capitalists  version_control  vibe  video  videos  video_player  video_production  virtualisation  virtual_reality  visibility  vision  visualisation  vlc  voice_recognition  voting  voxio  vpns  vtech  w3c  war  wardley_maps  washington_post  wat  watch  watches  waterfall  watermarking  wearables  wearable_computing  webos  web_analytics  web_development  web_intents  weird  whatsapp  whisper  wifi  wiki  wikileaks  winamp  windows  windows_8  windows_10  windows_hello  windows_phone  windows_xp  wireframing  wolfram  women  wonga  wordpress  work  working_practices  writing  wsj  xbox  xerox  xpday  yahaoo  yahoo  yammer  year_of_code  yell  yotaphone  youtube  y_combinator  zeebox  zipcar  zynga 

Copy this bookmark:



description:


tags: