security

See the following -

The Biggest Cyberthreat To Companies Could Come From The Inside

Seth Rosenblatt | CNET | January 8, 2015

A recent attack against Morgan Stanley that exposed hundreds of thousands of customer accounts was an inside job, a threat experts say is nearly impossible to stop...

Read More »

The Blockchain Is the New Google

William Mougayar | Tech Crunch | May 11, 2016

At its core, the blockchain is a technology that permanently records transactions in a way that cannot be later erased but can only be sequentially updated, in essence keeping a never-ending historical trail. This seemingly simple functional description has gargantuan implications. It is making us rethink the old ways of creating transactions, storing data, and moving assets, and that’s only the beginning. The blockchain cannot be described just as a revolution. It is a tsunami-like phenomenon, slowly advancing and gradually enveloping everything along its way by the force of its progression. Plainly, it is the second significant overlay on top of the Internet, just as the Web was that first layer back in 1990. That new layer is mostly about trust, so we could call it the trust layer.

Read More »

The Brave New World Of Unmanned Vehicles

Vivian Wagner | TechNewsWorld | July 27, 2013

While the FAA, other legal and regulatory agencies, and privacy advocates catch up in terms of the legality and ethics o,f such uses of unmanned vehicles, manufacturers are envisioning a future in which UAVs will be a prevalent part of everyday life. "It's going to spark a lot of creativity," said UAV manufacturer Zenon Dragan. Read More »

The Coming Push For Open Source Everything

Paul Venezia | InfoWorld | July 22, 2013

When we can no longer trust proprietary hardware or software, open source becomes the only option Read More »

The Data Divide

Sean Martin McDonald | FrontlineSMS | February 5, 2013

[T]he digitization of interactions means that every time we carry a smart phone, send a text message, or buy something online, we’re creating value for someone. A lot of it, as it turns out. These days, information isn’t just power, it’s big money.

Read More »

The Future of File Sharing: Integrating Pydio and ownCloud

The open source file sharing ecosystem accommodates a large variety of projects, each supplying their own solution, and each with a different approach. There are a lot of reasons to choose an open source solution rather than commercial solutions like Dropbox, Google Drive, iCloud, or OneDrive. These solutions offer to take away worries about managing your data but come with certain limitations, including a lack of control and integration into existing infrastructure. There are quite a few file sharing and sync alternatives available to users, including ownCloud and Pydio...

The High Cost Of Poor Software Quality

Staff Writer | WireHarbor Security, Inc | January 8, 2013

We recently highlighted how a bug in the Stockholm Stock Exchange caused an errant trade of more than 4.2 billion index futures contracts (a value equal to 131 times Sweden’s GDP) to send the trading network into a tailspin and forced trading to a halt. A spokesperson for the exchange blamed the mistake on a parsing error... Read More »

The History Of Surveillance And The Black Community

Nadia Kayyali | Electronic Frontier Foundation (EFF) | February 13, 2014

February is Black History Month and that history is intimately linked with surveillance by the federal government in the name of "national security."  Indeed, the history of surveillance in the African-American community plays an important role in the debate around spying today and in the calls for a congressional investigation into that surveillance. [...] Read More »

The Impact (Or Lack Thereof) Of Mobile Computing On Life Science R&D

Alex Clark | Pistoia Alliance | August 29, 2012

The computing transformation being effected by mobile computing may not be one we fully appreciate while burying our heads and thumbs in the latest cool app or game. Yet this transformation is likely the most important since the introduction of the personal computer... It’s that the transformation marks a complete change to the underlying platform. Read More »

The Internet, SMS, and Participatory Health

mstem | Global Voices | July 3, 2012

Serina Kalande (@serina_k) is a volunteer with Rising Voices, where she has lead the Blogging Positively project. The project began almost as soon as Global Voices itself. It’s a collection of HIV-positive bloggers and those blogging about HIV AIDS. You can view a map of this network here... Read More »

The Joy of Mentoring

Since 2016 is the 20th year I’ve served as CIO, I’ve given a great deal of thought to the various careers I’ve had and the roadmap for the 20 next years of my working life. In my late teens and 20s I was an entreprenuer running a 35 person software company while doing my medical and graduate school training. I was also a winemaker, home builder and engineer. In my early 30’s I was an Emergency physician, software coder, and data analyst. In my mid 30’s as a CIO, I focused on architecture, high reliability computing, and centralization of IT service delivery. In my early 40’s, I focused on disaster recovery, interoperability, and educational technologies..

The Linux Foundation Announces Project to Build Real-Time Operating System for Internet of Things Devices

Press Release | The Linux Foundation | February 17, 2016

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the Zephyr™ Project. This open source collaborative effort will unite leaders from across the industry to build a real-time operating system (RTOS) for the Internet of Things (IoT). Early support for the Zephyr Project includes Intel Corporation (including its acquired business groups Altera Corporation and Wind River), NXP Semiconductors N.V. (including its recent merger with Freescale), Synopsys, Inc. and UbiquiOS Technology Limited. Zephyr Project is inviting others interested in this technology to participate.

Read More »

The New Bioterrorism? The Hacked Medical Device

Jane Sarasohn-Kahn | The Health Care Blog | October 23, 2012

A time-and-technology challenged FDA, proliferation of software-controlled medical devices in and outside of hospitals, and growth of hackers have resulted in medical technology that’s riddled with malware. Furthermore, lack of security built into the devices makes them ripe for hacking and malfeasance. Read More »

The NSA Is Commandeering The Internet

Bruce Schneier | The Atlantic | August 12, 2013

Technology companies have to fight for their users, or they'll eventually lose them. Read More »

The NSA-Reform Paradox: Stop Domestic Spying, Get More Security

Bruce Schneier | The Atlantic | September 11, 2013

The nation can survive the occasional terrorist attack, but our freedoms can't survive an invulnerable leader like Keith Alexander operating within inadequate constraints. Read More »