Summly's presumed boy-genius founder and its $30 million sale to Yahoo got global media attention, thanks to classic dodgy startup-culture myth making. Time for a reality check.
The Full Tilt
Stilgherrian delivers an undiluted dose of criticism and analysis of the ways digital technology is changing our world and the spin that goes with it.
Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust. He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.
Demanding that people use their real names to access internet services, except in special circumstances, is a dramatic, but largely undiscussed shift of power away from individuals to corporations and governments.
When someone starts warning you of "cyberthreats", check your wallet and keys. You're probably about to be conned.
If you think hacktivists are a problem now, just wait. The tools are becoming increasingly easy to use, and the hacktivists increasingly stupid — making everyone a target.
With PlayStation 4, Sony joins the cavalcade of companies sacrificing your privacy to replace the profits lost thanks to plummeting hardware prices. Fun, but at what cost?
Science-free vanity metrics from Kred, LinkedIn, and all the rest are gamifying you and your business -- and you're the loser.
Sir Tim Berners-Lee's visit to Australia drew out the same cultural cringe that drives that eternal, daft question, "how can we create our own Silicon Valley?"
Discussions about Australia's National Broadband Network (NBN) has long since departed the realm of rational existence to become purely symbolic--and it'll stay like that until the election in September.
The Australian Cyber Security Centre that was announced yesterday may be useful, but seems more like an election-year gimmick that will tempt governments to increase surveillance and control.
Students at North Sydney Girls High School recently spent six weeks away from normal classes to work on projects of their choice that were somehow related to the smartphone.
Cyberwar is overhyped. The clear and present danger is the increase in criminal activity. And while mobile devices are vulnerable, they may also represent our chance to get information security right.
Last year, we decided that 2011 had been IT's year of consolidation. Now, it seems like 2012 has been about vendors setting up their strategies for 2013, beyond cloud and BYOD and into big data.
Once all manner of everyday objects become equipped with processors and connectivity, we'll have the Internet of Things. Futurist Mark Pesce thinks the smartphone will be its remote control.
The website for last week's Click Frenzy online sale collapsed under an unexpectedly high load. It didn't have to; techniques do exist for building highly elastic web infrastructure.
Classic information security defences aren't up to the task of facing the latest fashions in attacks, according to Sourcefire founder and CTO Martin Roesch.