-
Renowned Security Expert Kevin Mitnick Can Steal Your Identity In Three Minutesforbes.com
If a well-known security expert and former hacker asked you to volunteer your name for a live demo, would you do it? At DEF CON 2014, Kevin Mitnick prompted the audience for a volunteer. A few hands shot up, but quickly went down when he explained the ... -
Updated: Firing of Los Alamos political scientist spurs criticismnews.sciencemag.org
Political scientist's paper on disarmament caused concern in Congress - osgameclones.com
- ksplice.com
- neilmitchell.blogspot.com
- hirzels.com
-
Should Students Memorize Facts or Assume They Will Always Be a Click Away?slate.com
A young doctor-in-training examines a new patient. Should she draw information for the diagnosis from her “E-memory”—electronic memory, the kind that’s available on a computer? Or should she dip into her “O-memory”—organic memory, the old-fashioned sor... -
The Power, and Process, of a Simple Solutionopinionator.blogs.nytimes.com
Mix salt, sugar and water. Add a decades long, strategic health crusade. Yield: about 50 million saved lives. -
After years of hype, patent troll Vringo demolished on appealarstechnica.com
"We always believed strongly in our case," says Google rep. -
Better Browsing for Ruby Developers: Omniref Plugins for Chrome and Firefox - The Omniref Blogomniref.com
Today we’re exicted to release our browser addons for Chrome and Firefox. These do a few cool things to make your life as a Ruby developer much … -
Starbucks to Revise Policies to End Irregular Schedules for Its 130,000 Baristasnytimes.com
Starbucks announced the move to amend its scheduling practices after a New York Times article detailed the problems faced by an employee given erratic work schedules. - paperthon.com
- sixpack.seatgeek.com
-
Lookout Hackers Bloghackers.lookout.com
We're the engineers of Lookout Mobile Security, and now we have a blog. Join us! -
Basic Income Is Practical Today...Necessary Soonhawkins.ventures
This is part 3 in an ongoing series. Check out part 1 and part 2. “ No one, as a child, ever aspired to scrub toilets or flip burgers or restock merchandise. But you had to earn money to live your... - news.ycombinator.com
-
Schrodinger's Cat Video and the Death of Clear-Textcitizenlab.org
"...Web 2.0 was created so that people could publish cute photos of cats." This report provides analysis of products for facilitating targeted surveillance. -
Infinite Mile Warranty | Blog | Tesla Motorsteslamotors.com
The Tesla Model S drive unit warranty has been increased to match that of the battery pack. That means the 85 kWh Model S, our most popular model by far, now has an 8 year, infinite mile warranty on both the battery pack and drive unit. There is also n... -
Kevin Rose Steps Into Part-Time Role At Google Ventures To Build A New Startup Called North | TechCrunchtechcrunch.com
Serial entrepreneur, investor, and overall Internet good guy Kevin Rose is stepping down from his role of general partner at Google Ventures. The Digg and.. -
NSA/GCHQ: The HACIENDA Program for Internet Colonizationheise.de
Englisch version: New classified documents show country wide port scans and active mapping of vulnerable net systems by intelligence agencies. This showcases the request of the agencies to colonize the net. There is some technical remedy, proven by an ...