Home > Blogs > Data > Access

Blog Posts about Access

RSS Feed Subscribe  RSS details

1830 wasn't so long ago

John  Traenkenschuh

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

Continue reading...

Iโ€™m ready, but the United Stateโ€™s infrastructure is not.

John  Traenkenschuh

I’m outside the Cades Cove visitor’s center, hearing acoustical instruments like bangos and hammered dulcimers play.  I have my MacBook Pro, alive—charged and ready.  My phone is charged and ready and has a tethering plan, just begging to be used.

I am signal-less.

Continue reading...

By John TraenkenschuhCommentsSeptember 17, 2014
Topics: Access, Data

Gone with the passwords

John  Traenkenschuh

How much can Digital Cryptography do?

Continue reading...

Everything You've Heard is True

John  Traenkenschuh

With TrueCrypt in the Crypt of its own making, what is the True story?

Continue reading...

Should You Share Your Fitness Information?

John  Traenkenschuh

Whether using a Fitbit or Jawbone UP, many are recording their fitness information and sending the changes to the Cloud.  


Continue reading...

It was 20 years ago today: Data Migration Strategy II

John  Traenkenschuh
Is your information ready for the next 20 years?  Traenk gives more information on what you must understand when creating a Data Migration Strategy, something all organizations, businesses, and people must create.

Continue reading...

What is your data migration strategy?

John  Traenkenschuh

Traenk wonders how we should manage our data when so many formats come and go so rapidly.

Continue reading...

New Operating System Upgrades--And the winner is . . .

John  Traenkenschuh

Traenk recently upgraded to the free Windows 8.1 and Mac OS X Mavericks updates.  Which of the two was the better, more effortless upgrade?

Continue reading...

Email Compromised; What Now?

John  Traenkenschuh

What is your response plan for your email being compromised?

Continue reading...

InformIT's 17 Days of Giveaways

Rachel Bayless

Get ready for a month full of giveaways. From July 9 through the end of the month, InformIT will be having 17 days of giveaways. Each week has a theme to make sure that there’s something YOU will be excited to win!

Continue reading...

Great password information at a small price

John  Traenkenschuh

Where can cash-strapped security pro's get great information on security basics??

Continue reading...