Category: Social
-
Offline: avatars and alts
Offline: avatars and alts: In Neuromancer, Snow Crash, Johnny Mnemonic, Hackers, and just about every other chilling pseudo-cyberpunk vision of the future, there are two worlds. One is physical, where Real Death is possible, and where you choke on the pollution of New Tokyo-Beijing or whatever. The other world is virtual. […] Cyberpunk always presents…
By
Markus Perdrizat
·
-
Def Con XX: twenty years of hacker evolution
Def Con XX: twenty years of hacker evolution: Twenty years ago, the world of consumer technology was a very different place. In the early 1990’s, cell phones were still expensive devices slowly making their way out of Gordon Gekko’s high-rise office and into the hands of well-heeled customers like, for example, Zach Morris. Ah the…
By
Markus Perdrizat
·
-
The one big thing that newspaper visionaries didn’t foresee
The one big thing that newspaper visionaries didn’t foresee: It’s easy to forget sometimes that the world wide web has been around for more than two decades now, or that it has caused massive and ongoing disruption of almost every form of content from books and newspapers to music and movies. Interesting read!
By
Markus Perdrizat
·
-
Addiction to Familiar Systems
Addiction to Familiar Systems: The fear of making the “wrong” choice actually makes the familiar, mastered PHP more attractive. I guess that also depends if you’re more a stable or volatile type.
By
Markus Perdrizat
·
-
Stables and Volatiles
Stables and Volatiles: I believe a healthy company that wants to continue to grow and invent needs to equally invest in both their Stables and their Volatiles. Your Stables are there to remind you about reality and to define process whereby large groups of people can be coordinated to actually get work done. Your Stables…
By
Markus Perdrizat
·
-
Are Enterprise Social Networks the Cure for Information Overload?
Are Enterprise Social Networks the Cure for Information Overload?: Many organizations are implementing enterprise social networks to improve communication between their employees, customers, and partners. If only it was as simple as that…
By
Markus Perdrizat
·
-
Making the users accountable
Making the users accountable: We all know that information security relays on a layered approach. It´s about people, process/programs and technology. And we all know about Advanced Persistent Threats. How they work, attack vectors, etc. Shows the problem well, chooses the cheap way out by saying that resolving it will be specific to each company.
By
Markus Perdrizat
·
-
The Internet’s Best Terrible Person Goes to Jail: Can a Reviled Master Troll Become a Geek Hero?
The Internet’s Best Terrible Person Goes to Jail: Can a Reviled Master Troll Become a Geek Hero?: On a gray Wednesday morning in October, the car headed west on the Lincoln Highway Bridge hit 100 miles per hour and I started to worry it might hurtle off into the tangle of rusted-out warehouses and smoke…
By
Markus Perdrizat
·
-
Gun Control
“Gun” “Control”: Please note that this is a post about technology, not politics. The tech industry cheerleads the displacement and reconfiguration of huge institutions like the music industry and telecoms. Added via Pocket.
By
Markus Perdrizat
·
-
A Players
A series of articles about A players in IT. I guess in Enterprise IT, we can be glad if we see B players at least from remote 😉 We all talk about recruiting “A Players,” but that’s not how the Valley actually works. Why Zuckerberg was Right. The Coming Collapse of Average.
By
Markus Perdrizat
·