matth65

23 Added | 2 Magazines | 4 Likes | 11 Following | 1 Follower | @matth65 | Keep up with matth65 on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “matth65”

#TheDress and the Rise of Attention-Policing

An optical illusion may lead us to question the nature of reality, but it shouldn't make us question each other.<p>It caused Taylor Swift to feel “confused and scared.” It caused a rupture in the Kardashian-West household that might never be repaired. It caused Chris Murphy, a Democratic …

Matthew McConaughey

Startup Pitch Decks: Free Templates from VCs

Today, NextView Ventures is excited to release a pillar project in our Growth Guides series: pitch deck templates for raising seed capital. These …

Responsive Web Design: A Brief History

In the last few years, the number of mobile users and devices has grown exponentially. As a result of this, providing a seamless, high-quality user …

Yahoo, Alibaba And Why Mayer Can Keep Buying Whatever She Wants

A quick glance at Yahoo’s balance sheet might have you worried: Only $1.14 billion in cash and equivalents, and the company just dropped $1.1 billion on Tumblr? It seems profligate.<p>But happily for Yahoo investors, the company is not low on funds in the slightest. In fact, given its current balance …

NSA Project XKeyscore Collects Nearly Everything You Do On The Internet

Further leaks have revealed an NSA project called XKeyscore that, with a few keystrokes, can give a data analyst access to nearly everything a user does on the Internet – from chat sessions to email to browsing habits.<p>The system requires an email because many behaviors online are completely …

Avaaz - website optimizations proposal

Overview Add a clear CTA to the top nav to encourage petition creation. Simplify the sign form Simplify the “start a petition” page Reorganize the …

An 18-Minute Plan for Managing Your Day

Yesterday started with the best of intentions. I walked into my office in the morning with a vague sense of what I wanted to accomplish. Then I sat down, turned on my computer, and checked my email. Two hours later, after fighting several fires, solving other people’s problems, and dealing with …

How To Use CSS3 Media Queries To Create a Mobile Version of Your Website

The Media Queries in CSS3 take this idea and extend it. Rather than looking for a <i>type</i> of device they look at the <i>capability</i> of the device, and you can …

fluency03 comments on The Architecture Twitter Uses to Deal with 150M Active Users, 300K QPS, a 22 MB/S Firehose, and Send Tweets in Under 5 Seconds

Error in part High Level For Pull Based Timelines:This is not correct:Only your home timelines hit disk.The correct one is:Only your user timelines …

2018 CBS Interactive Inc. All rights reservedMon, 12 Feb 2018 22:53:03 +0000Mon, 12 Feb 2018 22:53:03 …

Rights & Freedoms

2018 CBS Interactive Inc. All rights reservedMon, 12 Feb 2018 22:53:04 +0000Mon, 12 Feb 2018 22:53:04 …

Rights & Freedoms

Creating a Certification Authority and a Server Certificate on Ubuntu

The following steps will walk you through the creation of your own CA, which is necessary to sign certificates. Signed certificates can then be used …

Android Lost helps you recover your lost phone or wipe data from it

Android Lost is an easy to use app which allows you to find your phone or to remove sensitive data from it in order to prevent it from falling into the wrong hands.<p>The app is easy to use, and the web interface provides a lot of useful features, without much of a learning process necessary. Of …

Apps

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)

You know those people who put tape over their laptop’s webcam to keep digital peeping toms at bay? They’re not crazy.<p>A new proof of concept is making the rounds today that demonstrates how a hacker can snap pics off your webcam, right through the browser, with no consent required.<p>Well, technically, …

Moxie Marlinspike >> Blog >> We Should All Have Something To Hide

• Blog >><br>• We Should All Have Something To Hide<p>Suddenly, it feels like 2000 again. Back then, surveillance programs like Carnivore, Echelon, and Total …

On cellular encryption

But this led to another interesting discussion. What if we forget local phone eavesdropping and focus on an ‘easier’ problem: tapping only cellular …

The wide world of hacking in China

The Chinese have been known to be experts at hacking for quite some time. But what might surprise some is that it's epidemic across the country in all levels of society.<p>China has been cited as allegedly hacking into U.S. government and corporate networks for years now. Generally, the thinking has …

China