Connected

Connected

By
October 1, 2016
Connected

Follow    Who Will Decide if You are Entitled to an Address?   Where do you live? What is your address?  Who picked north or south, Elm or Maple, Washington or Lincoln as your street address? In the non-digital world, our address is significant, playing a role in determining everything from...
Read More »

Connected

By
September 1, 2016

Follow  How’s the Weather? Ask IBM In the autumn of 2015, IBM, initials which initially stood for International Business Machines, made what might be considered a rather odd purchase, for a company today known as a leader in technology. IBM actually bought The Weather Company. The plan is to put the...
Read More »

Connected

By
August 1, 2016
Connected

Follow  Do You Care?   Do you care about the cyberattack against the Democratic National Committee’s (DNC) computer system? And do you think the attack was a deliberate attempt to ensure Donald Trump’s victory in the coming election?   Or have we become desensitized to these data breaches, and this was simply...
Read More »

Connected

By
July 1, 2016
Connected

Follow Cognitive Security     Recently I was watching CNN: The Eighties; which had a show called; The Tech Boom. The show featured the digital revolution, including personal computers, very large cell phones, the space program, and the internet. It is almost hard to believe, where we started and where we...
Read More »

Connected

By
June 1, 2016
Connected

Follow Ransomware Have you been hearing about Ransomware and wondered if you should worry? More than likely, you have not been affected by Ransomware, but many businesses and government agencies are being held hostage by Ransomware. Ransomware is a type of computer virus, but instead of causing a computer to slow...
Read More »

Connected

Follow  Securing Critical Infrastructure   Securing our Critical Infrastructure is an ongoing process that is a priority for both the public and private sector. The threats continue to evolve and gain in sophistication and impact on society in general. Threat vectors will continue to evolve within cybersecurity, as will the targets....
Read More »

Connected

By
April 1, 2016

Follow Electronically Fit or Tracked Recently, I saw a social media post, which mentioned exactly how many steps someone had taken while on a vacation. When asked by someone else, how the individual knew how far they had walked, the person commented that their companions’ smart phone had kept track of...
Read More »

Connected

By
March 1, 2016

Follow Thirteen There are presently thirteen iPhones that federal law enforcement would like Apple to unlock. On February 29th, 2016, a New York judge sided with Apple, and has denied the Department of Justice (DOJ) request to override the security measures of the iPhone, in a case involving Jun Feng, a...
Read More »

Connected

By
February 1, 2016

Follow Is Energy a Profitable Market?   One of the many questions plaguing the Energy and Utilities Industry is the development of bi-directional energy; the notion that if you and I, as consumers, have, for example, solar panels in our home, which produce more energy than we use, under what conditions...
Read More »

Connected

By
January 1, 2016

Follow   Cybersecurity Checkup© A Year in Review As 2016 begins, we will face many wanted and unfortunately unwanted changes; however, something which will not be changing in any of our lives is our interaction and dependency on technology. Whether we want to be Connected or not, we are; it is...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.