Tek-Tips | Identity RSS feed for this section

If We Forget to Look Out of the Window

A window out Every year has its moments, and 2016 was no exception. Various significant shifts occurred, including changes in the political landscape in the United States, United Kingdom, and Turkey. And the horrors of war, civil strife, terrorism and an underlying global tension have been constantly fed into our digital lives from the comfort […]

Read full story Comments { 0 }

Disrupt Me.

Disruption for many people generates discomfort, shakes the status quo and breaks routines. We all have an emotional response to this process: for some hesitation, doubt, confusion, fear, anger, bewilderment, and for others excitement, rejuvenation, inspiration, motivation and energizing or a combination of the above. The Digital Disruption Has Already Happened” image on twitter challenged […]

Read full story Comments { 0 }
… leave the kids alone?

… leave the kids alone?

There is a belief that children nowadays are natural, “Digital Natives”, and that we adults on the sidelines are “Digital Immigrants”.  The dexterity and comfort many children demonstrate when interacting with digital devices and social media tools generates this image of them being “naturals”. This in turn contributes to the sense of disconnect between the […]

Read full story Comments { 0 }

Good Survey Session of Network Security Software @MacITConf – Part 2

This is a continuation from Part 1.   Network utilities ŸBasic security module (BSM):a security audit API and file format originally developed by Sun. ŸOpenBSM: portable, open source implementation of Sun’s BSM. ŸTcpdump: common packet analyzer that runs under the command line and works on most Unix-like operating systems, including OS X. ŸNetwork utility: available […]

Read full story Comments { 0 }

Good Survey of Network Security Software @MacITConf – Part 1

I wish I could handle MAC, but I’ve been a PC guy since abandoning Unix (not Linux) in 1995. Because MAC OS X is based on Unix, I would like to move my computing platform there some day. That won’t be an easy task, never mind the additional investment on hardware. However, iPhone and iPad […]

Read full story Comments { 0 }
Our Connected Data

Our Connected Data

  Over the last few weeks, an outstanding series produced by ARTE called “Do Not Track Me” has become available and is getting quite a bit of social media attention. The different episodes explore and highlight the technologies, algorithms, data mining and aggregation of our online information through digital devices, tools, ecosystems and environments. Each […]

Read full story Comments { 0 }
SDN and IoT, Two Big Trends Discussed at Fujitsu North America Technology Forum 2015, Part 1

SDN and IoT, Two Big Trends Discussed at Fujitsu North America Technology Forum 2015, Part 1

Both Software Defined Networking (SDN) and the Internet of Things (IoT) are hot topics these days. There was an interesting panel discussion of these two topics together at the recent Fujitsu North America Technology Forum 2015 at Levi’s stadium. The session was titled SDN and Next Generation Communication Infrastructure for End-to-End Connectivity in the IoT […]

Read full story Comments { 0 }

The Death of “Digital”

Words are a powerful vehicle for meaning and understanding, connected to individual or group perspectives, interpretations, and connections. The word “Digital” has been part of our vocabulary landscape for a long time. It was only after reading Nicholas Negroponte’s  book, “Being Digital” in 1995, that I began to be aware of the term and its […]

Read full story Comments { 0 }
There is a needle in the haystack, Ground Control.

There is a needle in the haystack, Ground Control.

All of us are engaged daily in the process of looking for information on the Internet, or “searching”. Sometimes, we search for clarification, facts, confirmation, projects, solutions, while other times our searches help us broaden our views, come to terms with a concept, make a plan, find a definition, or cross check a fact. Watch yourself […]

Read full story Comments { 0 }
Securing Emerging BYOD Trends

Securing Emerging BYOD Trends

The Bring Your Own Device (BYOD) and IT consumerization trends are growing, and enterprises are starting to embrace rather than fight them. Accepting these trends means facing several new problems and requirements to make sure these devices behave as trustworthy end devices in the corporate network. Under these new trends, an employee’s device will contain […]

Read full story Comments { 0 }