Cyberbullying
Technology review recently provided another example of cyberbullying. When people take their disagreements online and use identity information to smear someone’s reputation or attack them it is not a joke.
Technology review recently provided another example of cyberbullying. When people take their disagreements online and use identity information to smear someone’s reputation or attack them it is not a joke.
Beckstrom’s law says the value of the network is not the square of the number of nodes, it is the difference between the value of the transactions and the costs. as a formula: V = B – C’ – SI – L where V is Value B is Benefit C’ is the remaining Costs SI
Example in the cleantech field where new technology is being deployed before fundamental security issues have been addressed. Fixing the problems after a security compromise is a lot more expensive. Some of the more dangerous new features should be delayed until there are better protections against misuse. Smart Meters Not Ready for Primetime (Via Technology
Smart Meters Not Ready for Primetime Read More »