“Unexplained affluence, failing to report overseas travel, showing unusual interest in information outside the job scope, keeping unusual work hours, unreported contacts with foreign nationals, unreported contact with foreign government, military, or intelligence officials, attempting to gain new accesses without the need to know, and unexplained absences are all considered potential espionage indicators.” â€” oh, and also several of those would seem to be indicators of your average student…
The “issue needs more study” â€” gee, ya think?
Link: The Mechanized Future
Michael J. Ross and Dan Sisson write “In our increasingly mechanized world, we repeatedly hear promises that every new digital product, computerized service, or other form of technology, will make our lives easier â€” bestowing greater leisure, health, and happiness. Yet are any of those promises being fulfilled? Are we not instead becoming slaves to the very “conveniences” that we struggle to master? These weighty questions are addressed by Steve Talbott in his book Devices of the Soul: Battling for Our Selves in an Age of Machines.” Read below for the rest of Michael and Dan’s review.
Read more of this story at Slashdot.
Link: Anyway Tech Women
Goes with the recent DevChix article (which is linked in sentence #1 for easy reference)
I’m generally interested in UI issues. This one one seems pretty interesting, so I might even read it.
“Linux users can, at times, be the worst kind of ingrates, whining and complaining about what they perceive as missing features in a free operating system. My advice to all such whingers: spend 10 days using the latest version of Windows and you’ll realise that you are living in a world of relative bliss.”
Â Probably worth reading. If not, just enjoy that lovely lead paragraph. :)
This article describes in details how to create password protected PDF files on Mac OS X by using a freely available command line utility, as well as an Automator Workflow.
Blogosphere wins for me…
I’d like to see this show. Perhaps it’s online somewhere…
The study is saying that image authentication systems aren’t effective. However, they’re ineffective because users ignore them. Seems to me the image system isn’t the problem, here.
…as usual. ;-)