Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share This URL With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

Links 1 through 10 of 1581 by @nm tagged Blogs

in the comments davidkarp said:
To anyone unfamiliar: This writeup explores a subset of Tumblr and deeply mischaracterizes the broader network.

There are certainly reclusive communities living on Tumblr, but it's also home to millions of very extroverted (and very talented) creators who have built an audience of 170 million people.

There's certainly a busy (and hilarious) corner full of memes and GIFs, though you'll find topics like fashion, music, or illustration with bigger footprints.

It's easy to generalize Tumblr. With 43 billion posts, whatever you find you'll find a lot of it. But the diversity (of people, genres, and media) is something we cherish and do everything we can to support. It's easy to miss if you spend all your time hanging out in one corner. So, yes – it's not what you think!

Also, it's "tumblelog", though we just call'em blogs these days. :]

Share It With Others!

Enter your description here (optional)

Share It With Others!

Share It With Others!

Share It With Others!

Welcome to FT.com. FT blogs are free: just register to read them

Share It With Others!

Share It With Others!

Software architect and Microsoft MVP, you’ll usually find me writing about security concepts and process improvement in software delivery.

Share It With Others!

This blog will feature posts on a number of recurring themes , including:

Online Crime Investigations: A major focus of my work over the past half decade has been to highlight individuals, networks and entities that — according to multiple sources — appear to facilitate or directly participate in illicit activity online. This blog will continue that tradition.

Latest Threats: Every now and then, the bad guys work out a clever new wrinkle in an old scam, or an ingenious way of attacking Internet users. Count on these types of entries to pop up quite a bit, including tips on how to protect yourself.

Security Updates: Like it or not, security is a process, not some set-it-and-forget it task. Malicious hackers by and large are an opportunistic lot: They prey on the lazy, casual and uninformed users, such as those who neglect to update their PDF reader software, or routinely play audio and movie files with media software that hasn’t been updated in a while. In the spirit of the Securit

Share It With Others!

Share It With Others!

Share It With Others!