― David Adams Richards, Mercy Among the Children
Don Foster, Commvault (
Complacency and cheeseburgers. “Cowen is optimistic in general, but not necessarily for you.”
6 Ways Liberal Celebrities Could Make A Difference
Disaster recovery: How is your business set up to survive an outage?
Jason Dinesen, Glossary: Audit Technique Guides. “Audit Technique Guides are IRS guidebooks that give detailed insight into various industries IRS auditors may encounter.”World Bank’s top economist says India’s controversial ID program should be a model for other nations Quartz. Jerri-Lynn provides more background: What is Aadhaar ?WhatIs.com
“When I use a word,” Humpty Dumpty said in rather a scornful tone, “it means just what I choose it to mean — neither more nor less.” “The question is,” said Alice, “whether you can make words mean so many different things.” “The question is,” said Humpty Dumpty, “which is to be master — that’s all.” (Lewis Carroll, Through the Looking Glass)
How the Internet Found a Better Way Than Illegible Squiggles to Prove You're Not a Robot or a Horse
Captcha has evolved from identifying mangled letters to web users unwittingly training Google’s AI. Now, finally, you won’t have to do anything ...
How the internet found a better way than illegible squiggles to prove you're not a robot
Feminist’ brand behind ‘period-proof’ underwear slammed over allegations of toxic working conditions – with one ex-employee claiming ‘it was like being in an abusive relationship.’ Why are lefty institutions such cesspits of abuse and exploitation?
Internet of things: Home is where the hackers are Financial Times. Clive will have much to say if he shows up. Oh, and my bank keeps offering me voice verification, and I keep saying, “No way!” And my God, who needs to operate a Roomba remotely?
The
Cyberwar Information Gap The
Atlantic
U.S.
government hackers began developing destructive malware meant to disrupt Iran’s
nascent nuclear program as early as 2006, and deployed an early version of the
worm in Iran the following year. But it wasn’t until 2010 that the first public
reports about the cyberattack—dubbed Stuxnet—began to surface. At around the
same time as the U.S. was working on Stuxnet, it attempted a similar attack on
North Korea’s nuclear program. That effort failed: The malware never reached
the computers that controlled the country’s nuclear centrifuges. But it wasn’t
reported until 2015, years after it happened. Just this weekend, The New York
Times described a series of cyberattacks on North Korea’s missile launches that
took place in 2016, during Barack Obama’s final year as president. The timing
of these landmark reports emphasizes the yawning gap that often opens between a
high-profile state-on-state cyberattack and the moment it’s revealed to the
public
7 questions to guide your voice as a writer
7 questions to guide your voice as a writer
Crowdfunding: Everything you need to know
Merkel Meets Trump, the Defender Versus the DisrupterNew York TimesGerman reporters press Trump on wiretap claims, ‘fake news’ The Hill (furzy)