article thumbnail

Images of the Week: Vote, Voting, Voted!

Unwritten Record

Original Caption: “Members of the United States Air Force with their ballots in hand, are ready to exercise their freedom to vote under field conditions. 15, 2005, an Iraqi Family proudly poses with ink stained fingers after casting their vote. Examples of preferred credit lines are as follows: National Archives photo no.

article thumbnail

A Berkeley Commencement Speech, Some Years Ago…

John Battelle's Searchblog

—– Back in 2005, as Web 2.0 Every few years, if you’re not leaping into a new project, a new and challenging startup, or a new challenge at a larger company, then you’re not really exercising the skills you all so clearly demonstrated with your Masters projects. I want it to be on my own site as well, just for the record.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

While vague vendor Web language was nothing new to us, this immersive exercise left us astounded by just how hollow and unclear much of the vendor promotional language is. For example, I recently attended a webinar for a software product that most of us would recognize by name. It’s almost ubiquitous.

article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

So in 2005 the Defense Advanced Research Projects Agency or DARPA started a series of challenges to push the technology. Tyler: So for example, you know the network traffic that we got. Ned: The canonical example not to go too technical, but generally you want to be corrupting something like a pointer.

IT 52
article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

So in 2005 the Defense Advanced Research Projects Agency or DARPA started a series of challenges to push the technology. Tyler: So for example, you know the network traffic that we got. Ned: The canonical example not to go too technical, but generally you want to be corrupting something like a pointer.

IT 52
article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

So in 2005 the Defense Advanced Research Projects Agency or DARPA started a series of challenges to push the technology. Tyler: So for example, you know the network traffic that we got. Ned: The canonical example not to go too technical, but generally you want to be corrupting something like a pointer. Request Demo Learn More.

IT 52
article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Mikko had read some of my reporting on Netsky, which Skynet backwards, a virus also known as Sasser, was a typical virus-of-the-day back in 2005. Vamosi: So this is an example of what’s news and what’s not. So back in 2005, Microsoft offered, you know, $25,000 to have somebody turn in a malware writer back.