Security Theater: USB Everythings

USB is a wonderful technology — it allows us to be platform-agnostic, gives us compatibility, ease of use, and more durability than some previous connectors we have used in the past. It also presents a very difficult security challenge to security professionals. USB devices have become so ubiquitous, we don’t think twice about just pluggingRead… Read more »

PTI Webinar: Utilizing Appreciative Inquiry as a Tool for Collaboration and Innovation

From the Public Technology Institute website: Webinar Dates For Governments: Tuesday, January 24, 2012, 2:00–3:00 PM ET For Non-Profits: Thursday, February 2, 2012, 2:00–3:00 PM ET Offered by PTI and Rutgers School of Public Affairs and Administration. Led by James Davy, Director of the Rutgers Center for Applied Appreciative Inquiry and a former public officialRead… Read more »

Tech of #OccupyWallStreet

A social movement with a hashtag in its name is obviously heavily reliant on technology. Here are a few technologies and approaches that Occupy Wall Street used to expand rapidly. Mesh networks: localized Internets, set up for rapid and secure internal communication. The People’s Skype, a distributed voice and voting system that enables the peculiarRead… Read more »

TSP Talk – Santa Claus Rally Shows Up

Stocks spent the week in a steady, low volume, holiday rally. For the TSP, the C-fund gained 3.80% on the week, the S-fund was up 3.48%, the I-fund added 2.27%, while the F-fund (bonds) lost 0.62%, and the G-fund was up 0.03%. For the month, the C-fund is now up 1.63% in December, the S-fundRead… Read more »

Rainmaker #9 Convey Your Business Personality – Easy, Simple, and Free

Definition: A Rainmaker creates a significant amount of new business for a company. The Sales Lab Rainmaker Series is one rainmaker technique for technologists during the first 300 seconds (five minutes) of the monthly Capital Technology Management Hub Meeting. This is the handout for our December meeting. At the beginning of this Rainmaker presentation inRead… Read more »

Less Obvious Threat of Hidden Software – Software Records Keystrokes on Smartphones

The Public Eye with Eric Chabrow In a world where employees demand that they can access corporate networks via their mobile devices, news that software embedded in millions of Android smartphones can record every keystroke users make is troubling. What’s really scary, beyond the obvious, is the risk this hidden software poses to organizations tryingRead… Read more »