Connected

Connected

By
October 1, 2016
Connected

   Who Will Decide if You are Entitled to an Address?   Where do you live? What is your address?  Who picked north or south, Elm or Maple, Washington or Lincoln as your street address? In the non-digital world, our address is significant, playing a role in determining everything from what schools are children...
Read More »

Connected

By
September 1, 2016

 How’s the Weather? Ask IBM In the autumn of 2015, IBM, initials which initially stood for International Business Machines, made what might be considered a rather odd purchase, for a company today known as a leader in technology. IBM actually bought The Weather Company. The plan is to put the technology, called Watson AI...
Read More »

Connected

By
August 1, 2016
Connected

 Do You Care?   Do you care about the cyberattack against the Democratic National Committee’s (DNC) computer system? And do you think the attack was a deliberate attempt to ensure Donald Trump’s victory in the coming election?   Or have we become desensitized to these data breaches, and this was simply another story, in last...
Read More »

Connected

By
July 1, 2016
Connected

Cognitive Security     Recently I was watching CNN: The Eighties; which had a show called; The Tech Boom. The show featured the digital revolution, including personal computers, very large cell phones, the space program, and the internet. It is almost hard to believe, where we started and where we are actually today. Everything...
Read More »

Connected

By
June 1, 2016
Connected

Ransomware Have you been hearing about Ransomware and wondered if you should worry? More than likely, you have not been affected by Ransomware, but many businesses and government agencies are being held hostage by Ransomware. Ransomware is a type of computer virus, but instead of causing a computer to slow down to an unusable...
Read More »

Connected

 Securing Critical Infrastructure   Securing our Critical Infrastructure is an ongoing process that is a priority for both the public and private sector. The threats continue to evolve and gain in sophistication and impact on society in general. Threat vectors will continue to evolve within cybersecurity, as will the targets. But there are basic...
Read More »

Connected

By
April 1, 2016

Electronically Fit or Tracked Recently, I saw a social media post, which mentioned exactly how many steps someone had taken while on a vacation. When asked by someone else, how the individual knew how far they had walked, the person commented that their companions’ smart phone had kept track of the distance covered. At...
Read More »

Connected

By
March 1, 2016

Thirteen There are presently thirteen iPhones that federal law enforcement would like Apple to unlock. On February 29th, 2016, a New York judge sided with Apple, and has denied the Department of Justice (DOJ) request to override the security measures of the iPhone, in a case involving Jun Feng, a drug dealer. The DOJ...
Read More »

Connected

By
February 1, 2016

Is Energy a Profitable Market?   One of the many questions plaguing the Energy and Utilities Industry is the development of bi-directional energy; the notion that if you and I, as consumers, have, for example, solar panels in our home, which produce more energy than we use, under what conditions do we sell it...
Read More »

Connected

By
January 1, 2016

  Cybersecurity Checkup© A Year in Review As 2016 begins, we will face many wanted and unfortunately unwanted changes; however, something which will not be changing in any of our lives is our interaction and dependency on technology. Whether we want to be Connected or not, we are; it is vital that technology not...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.