Home > Blogs > Data

Blog Posts about Data

RSS Feed Subscribe  RSS details

John  Traenkenschuh

The Enemy Within

By John TraenkenschuhFeb 8, 2015

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

Brad Yale

The Rise of Communication through Haptic Feedback

By Brad YaleJan 14, 2015

For most of us, haptic feedback takes two forms - a vibrating phone in your pocket alerting you to an incoming message and key stroke vibrations when typing a text message/playing a game on your smart device. This though, is a shame because as Apple and Google engineers know, haptic feedback could be and should be used for so much more.

Brad Yale

Mobile Security: Physical Location Tracking

By Brad YaleDec 5, 2014

On the level of global commerce, we are addicted to devices. By the start of 2015, it is estimated there will be 3 billion Android devices in circulation around the world. Of those, there are roughly 19,000 distinct devices in operation. On the same accord, there are roughly 550 million active iOS devices globally with another few hundred million being phased out. As a global culture we love our mobile devices. Yet here is the thing, by all measures, our devices aren't all that secure. In both data and physicality, our devices have an operational tendency to betray us. 

This said, a question: what is more worrisome, mobile data security risks or mobile device physical security risks? 


Brad Yale

How the Internet Works: The Deep Web

By Brad YaleOct 21, 2014

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Brad Yale

How the Internet Works: A Call for Personal Security

By Brad YaleOct 13, 2014

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

John  Traenkenschuh

Which new phone is best?

By John TraenkenschuhSep 21, 2014

How do you evaluate the many new mobile device choices?

John  Traenkenschuh

1830 wasn't so long ago

By John TraenkenschuhSep 18, 2014

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

John  Traenkenschuh

Iโ€™m ready, but the United Stateโ€™s infrastructure is not.

By John TraenkenschuhSep 17, 2014

I’m outside the Cades Cove visitor’s center, hearing acoustical instruments like bangos and hammered dulcimers play.  I have my MacBook Pro, alive—charged and ready.  My phone is charged and ready and has a tethering plan, just begging to be used.

I am signal-less.

Brad Yale

InformIT Labor Day Programming Event

By Brad YaleAug 28, 2014

Welcome to the InformIT Labor Day Event.

From August 28th - September 3rd,  the following deals apply to all ebooks, books, video learning lessons, interactive learning lessons, software and practice tests:

- Purchase three or more titles. Save 55%. 

- Purchase two titles. Save 45%. 

- Purchase one title. Save 35%.

**Free Shipping to all locations in the United States*

*30 Day Trial to Safari Books Online**

Coupon code (Case Sensitive):  LABORDAY

Emily Nave

The IT List: What You Missed This Week on InformIT [8/1/14]

By Emily NaveAug 1, 2014

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Emily Nave

The IT List: What You Missed This Week on InformIT [7/25/14]

By Emily NaveJul 25, 2014

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Brad Yale

Why Open Source Matters: Musings from OSCON

By Brad YaleJul 22, 2014

With OSCON taking place in Oregon from 7/20/2014 – 7/24/2014, the Open Source community will come together to discuss everything new in the Open Source world. From OSS to Java, Python to PHP, Cloud Computing to Perl and emerging programming languages to mobile platforms, the Open Source community has a lot to chat about.

This said, I wanted to take the time to discuss why the Open Source initiative matters by highlighting a few key elements of the protocol which help to make it so powerful.

Page 1 2 3 4 5 Next >