/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Jonathan Schulenberg

@collabjonathan
4 posts
2022-01-14
A vulnerability this catastrophic. The skill to find it, and report it. To patch that fast, at that scale. Just stunning. https://twitter.com/...
2022-01-14 View on X
PCMag

Amazon patches two AWS flaws discovered by Orca Security that could have exposed information managed by Glue users and leaked sensitive files via CloudFormation

Nathaniel Mott / PCMag :

2021-10-02
This is probably a good thing for Five9 in the end. The moment this was announced in July there was an assumption, despite what the press release said, that Five9 would become the CCaaS platform for Zoom Phone customers - and maybe not the best choice for everyone else. No more. https://twitter.com/...
2021-10-02 View on X
CNBC

Zoom says it no longer plans to acquire cloud-based call center software maker Five9, following the FCC's review of the $14.7B deal on national security grounds

13% — Zoom was paying. Zoom and Five9 abandon $14.7 billion acquisition https://www.cnbc.com/...

2018-01-02
This is simultaneously very clever and alarming. Let's see how long it takes for every browser & password manager to change their behavior and whether the solution is more elegant than requiring user acknowledgement before auto-filling. http://twitter.com/...
2018-01-02 View on X
Freedom to Tinker

How third-party scripts on websites exploit a flaw in browsers' built-in password managers to identify and track users

In this second installment of the No Boundaries series, we show how a long-known vulnerability in browsers' built-in password managers is abused by third-party scripts for tracking...

2018-01-01
This is simultaneously very clever and alarming. Let's see how long it takes for every browser & password manager to change their behavior and whether the solution is more elegant than requiring user acknowledgement before auto-filling. http://twitter.com/...
2018-01-01 View on X
Freedom to Tinker

How third-party scripts on websites exploit a flaw in browsers' built-in password managers to identify and track users

In this second installment of the No Boundaries series, we show how a long-known vulnerability in browsers' built-in password managers is abused by third-party scripts for tracking...