"Bob, what phrase best describes you today?"
"Bull in a china shop."
It's July 4, and we all know why that date is significant... Show more
"Any change in a digital business process will introduce one or more new security vulnerabilities."
--Young's Axiom of Cybersecurity
This means that the process of creating business change must include a process for identifying new risks.
The most important attributes of a Cybersecurity worker? Never stop learning. Insatiable curiosity. Interest in a variety of business topics: finance, law, medicine, HR, automated systems, psychology. What would you add?
#business #finance #automation #cybersecurity
Happy Birthday, Norman Rockwell, and thank you for filling the world with your art.
Introducing Windows 95 Mobile. The best smartphone you've been waiting for.
https://youtu.be/D0DDQumaaCg
What's wrong with this picture?
Past me didn't document a thing that should have been documented, so present me spent an hour re-figuring everything out and documenting it.
Past me is a jackass. Don't be like past me. Document your things.
The IoT (Internet of Things) has some unintended consequences.
https://mobile.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.html
Cleared security at PDX. Headed to Orlando to do a network evaluation, and make design and policy recommendations on a fairly complex system. The company has three locations, with a fourth one being built. Requirements include real-time streaming audio and video conferencing, multiple layers of access rights, lots of PII (Personally Identifying Information), protection of data about minors, remote access, and more. I don't like being bored, and this project will keep me entertained nicely.
Every three years?
Somebody sells servers for a living.
Here's the source article from Time Magazine, that shows that Southwest Key Programs will be paid $458 million to warehouse the stolen children.
http://time.com/5316722/nonprofit-paid-458-million-trump-administration-detain-migrant-children-family-separation/
Here's a couple of phone numbers and an email address to complain to Southwest Key Programs, which will make $458 million this year warehousing these stolen children.
I was connecting to the Wi-Fi at Outback Steakhouse. They required an email address, so I gave them one: info@outback.com.
"I will not treat the user's device as if I own it."
Software Developer's Code of Ethics
http://www.fifonetworks.com/ethics/code_of_ethics.pdf
Venn Diagram.
"Just because politicians have done something evil before, doesn't give us license to do it now, with greater vigor."
The tribal warlords of Android are warring
I follow Jesus. Therefore I flatly reject and renounce popular American Christian mainstream politics. I am not like them. And they aren't like Jesus.
I wrote some books.
http://www.amazon.com/author/bobyoung