Home / Tag Archives: code (page 2)

Tag Archives: code

Feed Subscription

Developing a Disruptive Product

One of the world's oldest publishing companies brought in a ringer to revolutionize the way the company does business.

Read More »

Rumor Patrol: Apple And The iPhone 5

iPhone 5 Release Date A source inside Apple has indicated to Fast Company that the iPhone 5 launch event may be in the week of the September 19th, or possibly the 26th--giving a short period for pre-orders before the device is launched in multiple countries at once on a date in the first week of October (a rumor that's increasingly been believable). Speculation about the release date has reached fever pitch, and Deutsche Telecom has taken the extraordinary step of announcing a pre-order service without having official confirmation of the delivery date to give to its customers

Read More »

Apache Killer Is The Biggest Little Internet Threat

This week news broke that an exploit had been published that affected the Apache Web server. You probably glanced past the item in the usual flow of tech news, perhaps swamped by Apple news, and didn't think anything of it. But if anything the exploit is bigger news than most other items because this Apache vulnerability has a wicked sting in its tail: It's simple, it's easy to weaponize, and it could shut down about 60% of websites online.

Read More »

What Do Angry Birds and TED Have In Common?: Interview with MailChimp

Ben Chestnut, CEO of MailChimp, described in the last post how the freemium model has dramatically increased business for his company. Below, Ben describes his pricing model and the types of customers his company prefers. Curt-I reviewed your company’s pricing structure and think it’s really smart how you have tailored your pricing for each buyer persona, such as the customer with high volatility in the number of emails he’s going to send or the customer with a huge volume of subscribers

Read More »

How The Murdoch Email And Website Hacks Could Happen To You

This week News Corp. execs James and Rupert Murdoch were dragged before a investigatory committee of Parliament over the U.K.'s phone-hacking scandal. Meanwhile hacktivists LulzSec decided to take matters into their own hands, and targeted the website of News Corp

Read More »

How Hackers Stole 24,000 Files From The Pentagon

We're all human, you know? That's roughly the trick that the hackers most likely relied on when, earlier this year, they managed to steal over 24,000 files from a defense contractor

Read More »

Breach Of The Week: The Simple Tech Behind The U.K.’s Tabloid Phone-Hacking Scandal

British journalism made headlines this week for all the wrong reasons, namely hacking. Tabloid paper News Of The World, which broke into dozens of voicemail accounts of prominent or newsworthy public figures in pursuit of scurrilous dirt, most recently crossed the line again by hacking into--and even deleting--voicemail messages of a murder victim.

Read More »

Can You Make Your Own App?

Tech Trends columnist John Brandon gave two DIY app building tools a whirl. Here are the results. Over the past few months, I've been getting loads of PR pitches about software that lets you create your own smartphone applications—no coding or design skills required

Read More »

Your Business Card Is A Billboard For Your Brand–What Does Yours Say?

If a brand can describe its core values and philosophy on its business card without a detailed description, the brand becomes a full representation of its vision. I heard a story that a few years ago Ingvar Kamprad, the founder of Ikea , happened to drive past one of his stores.

Read More »

Cheeky Little Underage Hackers Are Getting Their Very Own DEF CON Event

Hacker conference DEF CON is, in information-security circles, a big deal--which is why it's pretty astonishing that in August it will launch its first event targeted at the younger hacker . You know, the kind who's still in school and may not yet be old enough to drive, but is quite adept at managing SQL injections, DDoS, and password cracking. The kind of hacker who may be as young as 8

Read More »
Scroll To Top