Archive | Security RSS feed for this archive

I Remember When…

October 10, 2011

0 Comments

…remote control was either difficult or expensive. You could choose the Microsoft approach.  You could use the RDP solution from any client.  But if you wanted to actually connect to a desktop, that system needed to be running a “professional” version of the OS.  That meant that you could have remote control from Microsoft if […]

Continue reading...

Which One Will I Choose?

May 30, 2011

0 Comments

Over the past several weeks, I’ve spent time and money on assessing a variety of streaming audio solutions. My assessment has considered many factors. But chief among those factors was the mobile experience. When I was at home, I used iTunes. It’s not that iTunes is necessarily the best. Indeed, I’ve used dozens of tools […]

Continue reading...

Google Music Is A Real Beta

May 28, 2011

1 Comment

I have spent a great deal of time this week working with the new Google Music Beta.  And I am finally at a point where I can speak with a degree of confidence.  What do I think of the new Google service?  I think it is a real beta.  It has some very rough edges. […]

Continue reading...

Clouds: Just Water and Particulates

May 8, 2011

0 Comments

What is cloud computing?  There are so many definitions.  I won’t trivialize the subject by recounting a litany of terms.  But I’ve been in computing for over thirty years.  And “the cloud” looks a lot like data center computing in the mainframe era or data center computing in the client-server era. I find it curious […]

Continue reading...

Amazon Cloud Drive Musings

April 2, 2011

1 Comment

After uploading all of my Amazon MP3 purchases to my Amazon Cloud Drive, I used almost all of the 5GB that Amazon provided.  I felt a little cheated because I made these purchases through Amazon.  Amazon is even making you offers of additional storage for new MP3 purchases.  Since I can see the record of […]

Continue reading...

The Egyptian Crisis Proves the Need for Anonymity

January 29, 2011

0 Comments

I had a very interesting conversation at work yesterday.  Someone I work with asked me about the “cool tools” that I really believe in.  After thinking long and hard about the question, I told him that I believe in freedom of speech and I believe in anonymity as a bulwark to ensure both the freedom […]

Continue reading...

Why Root Your Android Phone?

December 21, 2010

7 Comments

Over the last three months, I have repeatedly told myself that I would not root my Droid 2.  I made this choice because I wanted to use the same kind of phone that the average customer would use.  After ninety days, I am completely satisfied that the “average customer” can have a warm, inviting, robust […]

Continue reading...

Why Use Tor?

December 19, 2010

1 Comment

So why should you use Tor? That’s a good question.  First, you need to know what Tor does.  I find that simple descriptions are often the best.  So here is my simple version of what Tor is: Tor is a means of tunneling specific messages (i.e., traffic) through an anonymous (and reasonably secure) network.  Wikipedia […]

Continue reading...

Not So Seamless – But Oh, So Delicious

December 19, 2010

0 Comments

Sometimes, you have way too many balls in the air.  I saw the shiny bauble (Tor on my Droid 2) and I had to chase it.  Here is what happened: I tried to download the tool from the Tor site.  That proved fruitless.  I was connected via 802.11 to my home network.  And my home […]

Continue reading...

It’s About Time – In So Many Ways

December 19, 2010

0 Comments

This week was quite surreal.  I’ve spent almost thirty-five years working with computers.  [Note: That includes a few years as a teenager.]  I’ve built computers from scratch.  I’ve held practically every job you can imagine in the software industry.  But I have never been officially certified in anything.  So I’ve been confronted with one of […]

Continue reading...