by david | Apr 19, 2017 | Clouds, Privacy, Security, Technology, Training, Web presence
Ads are exploit gateways. Most ads convey a product promotion or endorse someone or something. Frequently the browser based kind are used as data collectors used to invade ones privacy. The worst kind of ads called malvertising are not legitimate ads but a con to get...
by david | Apr 16, 2017 | Clouds, Privacy, Security, Training
Managing critical systems Managing critical sytsems is a huge concern for big business and governments. Despite the media frenzy over the NSA data release about potential Microsoft exploits, this data is widely known among hackers and IT professionals. Many owners and...
by david | Apr 8, 2017 | Anthropology, Technology, Training
Coffee shops replace shopping malls as a social destination. Some of my thinking in this regard derives from popular TV cultural. The representations that people saw in Frazier’s Cafe Nervosa and Central Perk where Friends went for a forum can be denied. photo...
by david | Apr 1, 2017 | Privacy, Security, Technology, Training
A thin majority in the US House voted to repeal broadband privacy. They decided yesterday to give our personal information away. President Donald Trump now stands between you and your browsing privacy. The vote broke along party lines, with most Republicans voting...
by david | Mar 28, 2017 | Anthropology, Privacy, Security, Technology, Training, Web presence
Net neutrality is necessary for our privacy. This article encourages taking action now to let your Congressperson know that you care and are aware. If you are in the sixth district of North Carolina Mark Walker’s Greensboro office info is at the bottom of the...
by david | Mar 25, 2017 | Anthropology, Security, Technology, Training
Loving kindness meditation May I be safe and protected from inner and outer harm. May I be happy and contented. May I be healthy and whole to whatever degree possible. May I experience the ease of well being – loving kindness meditation The posting of the...