The most recent content from our members.
In the previous article I discussed Facebook’s trove of tagged user photos as a powerful source of information for advertising and law enforcement purposes. Here I want to discuss an irony about efforts to access data and keep it off limits. Minority Report: Addendum In Philip K. ***’s original story “Minority Report” face…
Resolving WAN issues can be time consuming and challenging—especially at enterprise companies with distributed networks. A common approach could look like this: The network administrator troubleshoots the problem with a local, disconnected management tool or logs into a router remotely and then checks logs. Another…
In the early part of this series I discussed face recognition technology, Big Data storage and findability, privacy protection and encryption with reference to the movie Minority Report. Let’s return to the future in Minority Report as a way to understand some implications of NYPD's Domain Awareness System (DAS). You may…
If you guessed that, among US government agencies, the Central Intelligence Agency would be likeliest to employ the most advanced cryptography in their telecommunications, then the story of CIA Director David Petraeus’ lapses in security during his affair with his biographer, Paula Broadwell, most surely will surprise you.…
It looks like you're new here. Sign in or register to get started.