Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, weeks-long exchange with a spammer who offered to cut him in on a hot deal.
1st Part: "Prof. Bruns, Prof. Burguess & Dr. Woodford: Mapping Online Publics: New Methods for Twitter Research"
2nd Part: "Robert Jäschke: Identifying and Analyzing Researchers on Twitter"
Imagine you can know the air quality along your journey and adapt it to avoid local pollution peaks! EveryAware project engages people in monitoring their environment: with mobile sensor boxes and vi
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
Human computation systems are often the result of extensive lengthy trial-and-error refinements. What we lack is an approach to systematically engineer solut...