There’s a lot about network security that’s in the hands of unseen engineers. But the part that may be the most vulnerable is in our hands, the everyday (phone, tablet, computer) user.
Twitter just made it a little easier for us to protect our accounts, if we choose to. It’s a system called two-factor or two-step authentication. It means that logins have two steps, not just one. Continue reading
Notes for discussion – ethics in digital/social media. PPT Continue reading
A friend of mine had a nasty case of food poisoning earlier this year. So nasty that Washington state health department folks were calling to check on her.
Update 1: Sarah Schacht (@sarahschacht) alerted me to this challenge when she was sick back in March. She did a lot of research on how other cities are making their inspection reports easier to use, even making it possible to integrate the information with Yelp reviews. KING5 did a story on her advocacy that runs at 10 and 11 pm on Thursday May 16. I’ll link to the story if KING5 puts the video online.
Update 2: Thanks to Dinegerous, I discovered that I should have searched for KFC and thus that the facility has a history (3 of the past 6 inspections) of failing to maintain hot holding temperatures for food.
That’s when I learned that King County restaurant inspection reports may be inaccessible to the average consumer because restaurant name and business name might not match. Guess which one you need to know to access the inspection report in King County? Then once you find it, can you decipher it?
Fast forward to this past weekend, when I found myself down for the count with fever and chills within four or so hours of eating at a Kentucky Fried Chicken in Kirkland, one that I patronize almost every time that I teach a motorcycle safety class. (Because I’m not a morning person, I choose not to get up early enough to make a lunch. Instead, I dash over for three fried chicken strips and a biscuit; I am, after all, a Georgia girl.)
The events of Boston this week — from the bombing to apprehending a suspect — brought into stark relief the role of non-traditional news sources and highlighted weaknesses in traditional media systems.
The search query was innocent enough: new technologies introduced in 2011.
But look what greeted me (a first, really) at the bottom of page 1:
Of course I clicked the link! And of course it was a music company (EMI) with a long-list of “allegedly infringing URLs.”
How my search query came to be identified with a record title/artist is beyond my imagination!