Home > Blogs > Data > Access

Blog Posts about Access

RSS Feed Subscribe  RSS details

John  Traenkenschuh

Hide N Seek: A Game I Do Not Want To Play

By John TraenkenschuhOct 10, 2015

New Mac OS X Means New Tricks...

John  Traenkenschuh

Windows 10: All That & A Bag of Chips

By John TraenkenschuhOct 5, 2015

Wow, who abducted our Windows 10 assumptions and left this smooth running and easy-to-use Operating System in their place?

John  Traenkenschuh

Is Windows 10 Enough: Not Missing Much

By John TraenkenschuhSep 21, 2015

It's time to consider the foibles of Laptop Life...

John  Traenkenschuh

Is Windows 10 Enough: The Potential Market, Part II

By John TraenkenschuhAug 13, 2015

Smartphones on sale! Heavily discounted! Get a smartphone free with your dataplan two-year contract! And an order of fries!!

John  Traenkenschuh

Is Windows 10 Enough: The Cloud, Part I

By John TraenkenschuhAug 12, 2015

The Cloud is mighty!  All Hail the Cloud, The Slayer of PCs!

John  Traenkenschuh

Windows 10: Is It Enough?

By John TraenkenschuhAug 10, 2015

Windows 8 was envisioned as a desktop OS capable of fighting the consumers' fling with Tablets. Now that the war is against Tablets AND PC's, can Windows 10 draw consumers to it?

John  Traenkenschuh

The Enemy Within

By John TraenkenschuhFeb 8, 2015

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

Brad Yale

How the Internet Works: The Deep Web

By Brad YaleOct 21, 2014

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Brad Yale

How the Internet Works: A Call for Personal Security

By Brad YaleOct 13, 2014

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

John  Traenkenschuh

1830 wasn't so long ago

By John TraenkenschuhSep 18, 2014

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

John  Traenkenschuh

I’m ready, but the United State’s infrastructure is not.

By John TraenkenschuhSep 17, 2014

I’m outside the Cades Cove visitor’s center, hearing acoustical instruments like bangos and hammered dulcimers play.  I have my MacBook Pro, alive—charged and ready.  My phone is charged and ready and has a tethering plan, just begging to be used.

I am signal-less.

John  Traenkenschuh

Gone with the passwords

By John TraenkenschuhJun 22, 2014

How much can Digital Cryptography do?

Page 1 2 Next >