-
Continue reading →: Is encryption a tool for terrorists?
Keywords: Candidate competence, Voter competence Neither Republicans or Democrats have a lock on technical ignorance. I loved the term “staggering ignorance” in a December 2015 article on Venture Beat. “Loved” in terms of being vivid and accurate; not in terms of it being good that the candidates are so ignorant.…
-
Continue reading →: Duet Display
Duet Display Duet lets you use your iPad as a second monitor on your Mac or Windows computer. Subtitle: I carry a second monitor in my bag… Every now and again you find a tool that is so useful you need to share. When that happens you OWE it to…
-
Continue reading →: Stick to your guns; or, WHY would we EVER need THAT data?!
Note to my colleagues: this blog post is a reminder to myself that I need to stick to my guns. 🙂 I’ve long believed there are interesting and non-obvious patterns in human behavior. Uber recently shared their discovery that Uber passengers are willing to pay higher surge pricing when their phone…
-
Continue reading →: Innovation in authentication
BYOD and off-premise access to on-prem and/or behind-the-firewall resources is a huge problem for IT security. Google has been testing new/different/alternative ways for their customers to authenticate (i.e., identify themselves). The addition of your phone into multi-factor authentication (MFA) is not new. What is slightly new is how the phone…
-
Continue reading →: Software has eaten the car and it’s NOT good
Not sure how I missed this… On Jul 21, 2015 Wired Magazine ran a story by Andy Greenberg titled “Hackers Remotely Kill a Jeep on the Highway—With Me in It.” According to the story, hackers were able to remotely take control over only instrumentation and “dashboard functions” but operational components like steering, brakes, and the…
-
Continue reading →: If a tree falls in a forest; If a packet crosses a network
Some observations of late: The only reason to have a network is so that application traffic can traverse it. The days of network engineers being able to keep up by typing IOS commands are quickly coming to an end Network engineers are, out of necessity, learning to write software to…
-
Continue reading →: Seriously – SDN is going to explode
I recently joined CFN Services (check it out – despite my new bias – cool stuff :). At CFN Software Defined Infrastructure (SDI) is a massive topic. Our CEO, Mark Casey (LinkedIn), talks about how prevalent dematerialization is. Below, Peter Diamandis (Mr. Dematerialization) talks about how many things we used…
-
Continue reading →: SDI, SDN, NFV, SDWAN (or Lions and Tigers and Bears, OH MY!)
I was a networking person as an intern in college and during my time in the Marine Corps. When I left active duty I crossed over to the software side of things. I’m pretty good at technical things and a reasonably quick study. I recently started a new thing at…
-
Continue reading →: The Pyramid Was Built in a Summer
The Fawn Lake Ski Club produces a ski show each summer. Usually held on Labor Day weekend the show is an opportunity for the club to highlights the skills our members have developed that summer. One of the many highlights of the ski show is the pyramid. The ski club…
-
Continue reading →: Ski Club Video
In the summer weekends I help with the Fawn Lake Ski Club. During a recent week we took some GoPro footage of our Slalom Ballet Squad and stitched it together to make a video. It’s linked below. I hope you enjoy it! Thanks!
