Known for his current role as Spencer Reid on TV's Criminal Minds, Matthew Gray Gubler is also known as the voice of this animated creature (put your answer in the comments).
After your guess click HERE
Known for his current role as Spencer Reid on TV's Criminal Minds, Matthew Gray Gubler is also known as the voice of this animated creature (put your answer in the comments).
Sorry folks…. their focus should not be “who” but “how”.
Who cares who hacked their systems, but what actions have they taken not to let it happen again.
Will the day come that some hacker is so smart that they can bring the entire US to a halt because we networked our automobiles?
Computer security breach sends Honda scrambling | CanadianBusiness.com
Your kidding me.
As a stupid retired knucklehead from the US Army Signal Corps this is totally unacceptable.
Report: Major weapons makers see networks breached by hackers | Security - CNET News
In 2006 Microsoft introduced the Ultra PC to the world.
The hand held device had a touch screen, ran Windows XP, was under two pounds and would accommodate a 60 GB hard drive.
It had a ton of other features.
The downside was the battery life and the price.
According to article on The Hill our House of Representatives will begin debating the pros and cons of a Cybersecurity law.
It will be aninterestingg debate. Just how much power (or responsibility) does the federal government want to give the Department of Homeland Security?
There is a wide variety of considerations:
Having been in the business of programming Internett applications for over twenty years now I have witnessed a number of attacks. I can tell you from this experience that the attacks come from places where our federal government has no jurisdiction.
I personally believe that although their hearts are in the right place, there is really little if anything the federal government can to to protect our technical infrastructure by just passing a law.
It is up to network engineers to secure their networks and programmers to write code to ward-off attacks.
I’ve done my best to put a step-by-step method for building a Web Service using ColdFusion.
This will allow other websites to make queries against the data you have and display it on their website as their own.
This is the technology web based companies like eBay can display items for sale on their website and have it appear on your web page.
If your web application manages data that can be used by others take a look at the guidelines I’ve written.
According to the Business Insider website IBM has surpassed Microsoft as far as their market cap is concerned.
Those in the know say that the reason is directly reflected in the move of bringing in Lou Gerstner as their CEO and are wondering if Microsoft should consider changing Steve Ballmer.
Personally, I think a lot of it had to do with a game show called Jeopardy and the inclusion of the Watson computer. I think that one week of television coupled with the fact that IBM did a wonderful job of making sure everyone knew about it that it returned to the thoughts of decision makers.
This is not new, regardless of what the article says.
Please folks, any time you open a webpage and it starts acting like it is checking your ‘system’ stop… believe me it can’t be reading your hard drive – it’s a trick to get you to give them permission to install something (like an ActiveX control) onto your computer so they can look at your system.
If ever you click on a web link and the next web page that opens says something like….
Windows Security Center Alert!
Stop… don’t fall for it …. close your browser.
It isn’t really running a security scan… it is just some images that make you think they are reading your computer’s hard drives and such.
Any company that needs to resort to something like tricking you so you’ll buy something from them does not deserve your money.
People fall for this all the time.
Ask anyone who repairs buggy systems – if you computer is running slow and not responding don’t install multiple virus protection programs, that is just going to make it run even buggier and slower (but that is a subject for another day).
I’ve been programming applications for the Internet for over 25 years now. I know that seems like an exaggeration to some but it’s true.
I put together a ‘how I got into ColdFusion’ story on my “I love me” site: www.cf-toolbox.com .
Oh the picture? It’s from the page, thought I’d use it here too.
I was so “cute” then… wonder what happened.
This is perhaps the most comprehensive web color pallet you’ll see. I put it together not as a simple list or graphic showing all the colors and their codes, but I wanted to also show how the progression of the alpha-numeric values could be used by those who are programming web sites to ‘tweak’ the look of their designs.
Click the link below and bookmark the page.
With all the information about password managers being hacked over the past few weeks I thought I would take a moment and and ask my friends and neighbors if they have a personal password policy.
A personal policy you ask?
Of course....
Think about all the things you have passwords for - email, your company intranet, your computer sign-in, and many, many more.
So what are your password policies? Here are a few thoughts:
I realize that some of these are simple, but the purpose of this post is not to suggest how you make-up your passwords, but to encourage you to create your own system, one that is yours. Decide what parts should capitalizedzed and where you are going to put a number or two (beginning, middle or end).
So if you have an idea for others take a moment and comment on this blog entry. Maybe your idea will help others.
I realize that not a lot of people who read this blog know what eDiscovery is, but I thought some of you might find it interesting why all the big data companies are buying software that does something called “eDiscovery”.
Those of you who work in large corporations will hear this term more and more.
“eDiscovery” uses technologies that are constantly crawling all the computers on your company network and indexing all the documents, emails, databases, everything.
Think of it as Google for your company.
This gives those who manage your company the ability to search for anything.
The ability to index all this stuff is a result of lawsuits (believe it or not). During these court procedures the person or persons suing your company has the ability to do what is called “discovery”.
So let’s say it is a '”wrongful termination” suite.
The lawyers representing the person suing has the right to ask for their employment agreement, all the employee reviews, emails between the person, their supervisor(s) and co-workers.
The ability to use the technologies used to pull all that information together quickly is called “eDiscovery”.
So all these large data companies are buying the technologies so they can sell the services of not only the software to do the searching, but the data storage stuff to. Or to reverse that, companies who use their data storage services will want to buy the eDiscovery software as an add-on product.
I’ve seen this consolidation first had.
Two years ago the number of eDiscovery vendors at the New York LegalTech were too numerous to count. Last year the consolidation of this space alone was a part of the reason the amount of space for all the vendor booths went from three floors to two.
Anyway, a link about one of the big software companies buying an eDiscovery company is below.
Symantec spends $390M for Clearwell, discovery - Storage Soup
Just an introduction to a bit of programming some might find interesting, at least those of you in the legal industry.
A while back the owners of my company were approached and were offered a ‘service’ to have live news headlines appear on the LAWTRAC.com website and inside the LAWTRAC application.
I thought the cost was something that was really out of this world, so I threw this together over a weekend to show them that the technologies that were being offered for something that was over $200 a month could be done for free.
This site brings in news targeting the legal industry from many sources around the internet and taps into government news and regulations information releases.
Check it out… perhaps you can suggest an improvement or two.
Jon Evans wrote on May 7th an interesting piece for TechCrunch essentially talking about hireing practices by large companies.
A picture of my mother. I didn't have a picture until last year. The last time I laid eyes on her was the summer between kindergarten and first grade. She passed in 2010.
I encourage any and all to take advantage of knowing your mother, father, siblings, anyone; not just on a special day, but everyday.