Funky Weird Blog Spot

Just a basic blog—snagging random stuff that catches our eye—nothing else, really...

Wednesday, July 15, 2015

The government found a smart way to connect the poor to the Internet: Put it in public housing - The Washington Post

https://www.washingtonpost.com/blogs/the-switch/wp/2015/07/15/the-government-found-a-smart-way-to-connect-the-poor-to-the-internet-put-it-in-public-housing/

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Disclaimer:

This is an old-fashioned blog wherein we clip little pieces of text and the URL they come from. We claim no copyright or ownership. And we really don't think you should draw any conclusions from the mix of stuff you find here. It really is mixed up, but that doesn't mean we are.

Blog Archive

  • ►  2025 (328)
    • ►  June (21)
    • ►  May (75)
    • ►  April (51)
    • ►  March (91)
    • ►  February (46)
    • ►  January (44)
  • ►  2024 (208)
    • ►  December (11)
    • ►  November (13)
    • ►  October (24)
    • ►  September (17)
    • ►  August (23)
    • ►  July (19)
    • ►  June (13)
    • ►  May (13)
    • ►  April (16)
    • ►  March (22)
    • ►  February (13)
    • ►  January (24)
  • ►  2023 (397)
    • ►  December (40)
    • ►  November (29)
    • ►  October (35)
    • ►  September (20)
    • ►  August (35)
    • ►  July (37)
    • ►  June (49)
    • ►  May (34)
    • ►  April (21)
    • ►  March (37)
    • ►  February (33)
    • ►  January (27)
  • ►  2022 (523)
    • ►  December (31)
    • ►  November (38)
    • ►  October (34)
    • ►  September (35)
    • ►  August (35)
    • ►  July (38)
    • ►  June (45)
    • ►  May (47)
    • ►  April (53)
    • ►  March (55)
    • ►  February (44)
    • ►  January (68)
  • ►  2021 (700)
    • ►  December (48)
    • ►  November (57)
    • ►  October (45)
    • ►  September (49)
    • ►  August (40)
    • ►  July (62)
    • ►  June (66)
    • ►  May (39)
    • ►  April (50)
    • ►  March (104)
    • ►  February (67)
    • ►  January (73)
  • ►  2020 (946)
    • ►  December (77)
    • ►  November (80)
    • ►  October (59)
    • ►  September (52)
    • ►  August (68)
    • ►  July (97)
    • ►  June (90)
    • ►  May (89)
    • ►  April (70)
    • ►  March (69)
    • ►  February (98)
    • ►  January (97)
  • ►  2019 (689)
    • ►  December (73)
    • ►  November (54)
    • ►  October (65)
    • ►  September (44)
    • ►  August (33)
    • ►  July (46)
    • ►  June (63)
    • ►  May (46)
    • ►  April (56)
    • ►  March (58)
    • ►  February (73)
    • ►  January (78)
  • ►  2018 (920)
    • ►  December (79)
    • ►  November (75)
    • ►  October (48)
    • ►  September (47)
    • ►  August (41)
    • ►  July (69)
    • ►  June (96)
    • ►  May (101)
    • ►  April (62)
    • ►  March (85)
    • ►  February (139)
    • ►  January (78)
  • ►  2017 (593)
    • ►  December (49)
    • ►  November (51)
    • ►  October (30)
    • ►  September (44)
    • ►  August (51)
    • ►  July (59)
    • ►  June (62)
    • ►  May (59)
    • ►  April (49)
    • ►  March (54)
    • ►  February (41)
    • ►  January (44)
  • ►  2016 (839)
    • ►  December (53)
    • ►  November (69)
    • ►  October (87)
    • ►  September (27)
    • ►  August (89)
    • ►  July (104)
    • ►  June (86)
    • ►  May (74)
    • ►  April (59)
    • ►  March (40)
    • ►  February (53)
    • ►  January (98)
  • ▼  2015 (804)
    • ►  December (119)
    • ►  November (102)
    • ►  October (57)
    • ►  September (50)
    • ►  August (68)
    • ▼  July (64)
      • So how do we identify phishing emails? - ITsecurit...
      • network security Articles : United Airlines hacked...
      • CISA: the dirty deal between Google and the NSA th...
      • PCI June 30 compliance deadline looms; big fines p...
      • Chris Valasek on Car Hacking | Threatpost | The fi...
      • Researcher says can hack GM's OnStar app, open veh...
      • CISA: the dirty deal between Google and the NSA th...
      • 1/6 Female: Action Figures | eBay
      • Beyond Malware: Detecting the Undetectable - DR - ...
      • SecurityWatch NZ - ESET: How your business can rec...
      • Chrysler Fiat vulnerability handling
      • The Neanderthal Parallax - Robert J. Sawyer
      • About the iPad Side Switch - Apple Support
      • Take a look at the future of IT Security - YouTube
      • Small Business and PCI Cost vs. Benefit | PCI Comp...
      • PCI DSS Self-Assessment Questionnaire (SAQ)
      • PCI June 30 compliance deadline looms; big fines p...
      • Fiat Chrysler Faces Record $105 Million Fine for S...
      • Small Businesses Unprepared for EMV Compliance
      • Oracle ID Graph Helps Marketers Target Customers A...
      • FBI Reportedly Makes Arrests in Massive JPMorgan H...
      • Digital Misfits Link JPMorgan Hack to Pump-and-Dum...
      • Car Manufacturers Want To Protect Your Data From A...
      • How to Make Beats - The Beginners Guide - Platinum...
      • Automakers again at odds with cyber-security resea...
      • As cars rely more heavily on computers, risk of ha...
      • Finland enlists convicted Lizard Squad hacker to f...
      • Vietnamese cops nab Chinese credit card hacker wan...
      • Vietnamese hacker sentenced to 13 years in prison ...
      • 'Silk Road' Founder Is Given Life Prison Sentence
      • How the feds brought down a notorious Russian hacker
      • Tannhäuser | Mesmerize Records
      • Call Forwarding - AT&T Wireless
      • iPhone 5 Sleep/Wake Button Replacement Program - A...
      • Mass Loaded Vinyl Barrier, Noise Barriers, Acousti...
      • Ovum research shows privileged users are highest r...
      • Malware And Hacking Forum Darkode Is Shut Down; Do...
      • Automakers again at odds with cyber-security resea...
      • The government found a smart way to connect the po...
      • FT investigation: Cyber insecurity - FT.com
      • Artists Blow the Whistle on Their NSA Whistleblowe...
      • 14" Checkpoint Friendly Laptop Case - Case Logic
      • Car Manufacturers Want To Protect Your Data From A...
      • SiteGround WordPress Hosting - Full Feature List
      • Unlocking the potential of the Internet of Things ...
      • Managing the Data Security Risks of Patient Portals
      • XKEYSCORE: NSA's Google for the World's Private Co...
      • Scientists say five-day fast-mimicking diet is saf...
      • How to Reset a Dell BIOS Password
      • Hacking Team sold spy software to blacklisted Suda...
      • OM-D E-M5 Mark II Digital Camera, Wi-Fi, Weatherpr...
      • Hacking Team hacked: firm sold spying tools to rep...
      • SoylentNews Comments | Major Cyber Attack Will Cau...
      • Pre-Installed ‘Bloatware’ Proves to be the Achille...
      • The Dark Side of Computing: SRI International and ...
      • cultural theory and perceived risk of crime - Goog...
      • The Purge (2013) - IMDb
      • Studies — CyberGreen Project
      • How much does cybercrime cost? | University of Cam...
      • Crooks Use Hacked Routers to Aid Cyberheists — Kre...
      • Endnotes with square brackets
      • The One Attitude Every Successful Person Has | Jef...
      • Samsung S5 Heating issue
      • Bureau of Justice Statistics (BJS) - Criminal Vict...
    • ►  June (34)
    • ►  May (60)
    • ►  April (68)
    • ►  March (34)
    • ►  February (81)
    • ►  January (67)
  • ►  2014 (603)
    • ►  December (53)
    • ►  November (54)
    • ►  October (38)
    • ►  September (30)
    • ►  August (52)
    • ►  July (23)
    • ►  June (50)
    • ►  May (66)
    • ►  April (53)
    • ►  March (45)
    • ►  February (71)
    • ►  January (68)
  • ►  2013 (697)
    • ►  December (76)
    • ►  November (85)
    • ►  October (46)
    • ►  September (88)
    • ►  August (91)
    • ►  July (111)
    • ►  June (61)
    • ►  May (37)
    • ►  April (24)
    • ►  March (18)
    • ►  February (19)
    • ►  January (41)
  • ►  2012 (309)
    • ►  December (9)
    • ►  November (30)
    • ►  October (33)
    • ►  September (23)
    • ►  August (40)
    • ►  July (49)
    • ►  June (28)
    • ►  May (28)
    • ►  April (14)
    • ►  March (18)
    • ►  February (29)
    • ►  January (8)
  • ►  2011 (360)
    • ►  December (48)
    • ►  November (55)
    • ►  October (67)
    • ►  September (18)
    • ►  August (25)
    • ►  July (31)
    • ►  June (20)
    • ►  May (29)
    • ►  April (26)
    • ►  March (14)
    • ►  February (13)
    • ►  January (14)
  • ►  2010 (66)
    • ►  December (7)
    • ►  November (21)
    • ►  October (1)
    • ►  September (2)
    • ►  August (4)
    • ►  July (15)
    • ►  April (5)
    • ►  February (1)
    • ►  January (10)
  • ►  2009 (9)
    • ►  November (1)
    • ►  April (2)
    • ►  January (6)
  • ►  2008 (262)
    • ►  December (42)
    • ►  November (17)
    • ►  October (62)
    • ►  September (39)
    • ►  August (20)
    • ►  July (2)
    • ►  June (7)
    • ►  May (34)
    • ►  April (3)
    • ►  March (7)
    • ►  February (17)
    • ►  January (12)
  • ►  2007 (64)
    • ►  December (11)
    • ►  November (4)
    • ►  October (11)
    • ►  September (8)
    • ►  August (11)
    • ►  July (19)

Search This Blog

THANKS FOR STOPPING BY -- Please support Doctors Without Borders
Copyright @Zcobb. Watermark theme. Theme images by fpm. Powered by Blogger.