"The cybersecurity expert who shared the list with Mother Jones says he could find no legitimate use for the subdomains. He notes that the full scope of the attackers’ breach of the Trump Organization domains remains unclear, but he adds that the hackers who have launched attacks from this block of IP addresses have the … Continue reading Kandidate Kompromat
Category: articles
Card Catalogs
"In Control Through Communication, her study of 19th century information management, JoAnne Yates identifies five breakthrough technologies. There’s the telephone and telegraph, which handle external communication. For internal communication, the big three are the typewriter, carbon paper (and other duplication technologies), and filing systems, especially the vertical file and card catalog. The others made information … Continue reading Card Catalogs
