Technology

NET NEUTRALITY PRIMER

0 comments

There are three ways to have high speed internet. You can get high speed Internet via cable, telephone, and cell phone. The issue is in many areas you only have one provider of high speed internet and rarely more than a few. This means that there is no real competition. Their monopoly was built with the help of the government. Counties and municipalities signed exclusive franchise agreements with cable companies. Phone companies provided lines with numerous government incentives including the Universal Service Fund.

Hernando County School District Technology Refresh

Hernando County School  District Technology Refresh

The Hernando County School District is upgrading some of their technological equipment. They upgraded student computers, other equipment, and laptop tops for the teachers. A majority of the money for this upgrade came from the state of Florida in the form of Digital Classrooms Program (DCP) Plans & Allocation and a portion came from the School District's General Fund.

Tech Talk: Securing your Internet Connected Devices

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

More and more, we are seeing the results of many devices connected to the Internet with little to no security. We now have security cameras, refrigerators, televisions, and other devices that all connect to the Internet.

Photos tell where you have been

'Map' by Aram Bartholl, part of the show 'From Here On' during Rencontres Arles, France 2011 via Wikipedia

Apple and Google phones now add location metadata by default to every photo taken with them. Social media apps then use this data when you share these photos.

Not only are you telling anyone who sees the photo and knows how to view metadata where you took the photo, but now several companies know where you have been if you give them access to your photos. If you share your photos on Facebook, Facebook can determine where you went on vacation, where you hang out with your friends, and where you take your kids to eat.

Relying on public key encryption for business

0 comments

Many years ago, we lived and worked in the same town. Everyone knew you and business was conducted because of your reputation. As time went by, people were able to do business across longer distances and, today, we conduct business with people from all around the world.

We don’t personally know the people we are working with and they do not know us. We rely on public key encryption to verify from whom we are receiving information and to whom we are sending information.

Pages

Subscribe to RSS - Technology