article thumbnail

Twitter verifies fake Cormac McCarthy account (again)

The Verge

In 2012, Twitter verified an account supposedly belonging to illustrious author Cormac McCarthy, which was in reality started by an unpublished novelist. Many Twitter users were instantly skeptical about the authenticity of the account. “We . | Photo by Jim Spellman/WireImage.

article thumbnail

Meet the 8 startups that just pitched at a virtual Demo Night hosted by Female Founders Alliance

GeekWire

FFA is a social purpose corporation , a type of profit corporation the state of Washington created in 2012, and is funded primarily through corporate partners. The pitch: “Fix Fake delivers risk-scoring software to automate authentication and find fakes for e-commerce marketplaces. ” Company: Health In Her HUE.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using network perspectives to visualize changing culture and meaning

Trends in the Living Networks

Culture Networks (SXSW 2012). Applying cultural intelligence allows innovators to understand how meaning is changing, especially in regard to unique aspects of trust, authenticity and progress. The slides to his presentation at SXSW today on Culture Networks and the codes that drive them are available below.

Network 133
article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. Jackson 2012 ). ► 2012. (27). Join us April 30 at 1pm EDT, 10am PDT. Register now at ibm.co/17sZlL8. at 3:30 AM. Email This BlogThis!

IBM 107
article thumbnail

Security attacks and countermeasures

Cloud Musings

The majority of these attacks are due to hacking, fraud and social engineering. Social engineering is a methodology that enables a perpetrator to persuade or induce an individual to provide sensitive information or access to the unauthorized perpetrator. Jackson 2012 ) Follow me at [link].' Most Active Malware Today.

Security 159
article thumbnail

How an all-girls high school prepped this exec for the male-dominated field of software engineering

GeekWire

She presented her authentic self, not hesitating to ask questions when she didn’t understand a speaker. “I In 2012, a friend at Seattle-based Qumulo tried to recruit her to the newly launched cloud company, which was building a file data platform to help organizations store and manage digital files at massive scale.

article thumbnail

Father-daughters team launches Chances to attract Gen Z to new type of ‘social relationships app’

GeekWire

is co-founder of The Chances App , a new social relationships app he’s spent a year creating with daughters Vanessa Lipschutz, 23, a Seattle University grad, and Noelle Lipschutz, 19, a student at UCLA. Chances is a social relationships app created for and by Gen Z. Have you seen “The Social Dilemma” )?

Social 107