Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- GOVERNMENT CONTRACTS



  Bad code plagues business applications, especially Java ones

A new study examining 365 million lines of code in 745 applications identifies bad coding practices that affect security, performance and uptime, with Java Enterprise Edition applications having the greatest number of problems. Cast Software, which makes tools that automate the analysis of business applications, examined programs written in Java-EE, .NET, ABAP, C, C++, Cobol, Oracle Forms, and Visual Basic, used across a wide range of industries from energy and financial services to IT co...

   Program,Security,Defects,Java     2011-12-09 07:42:51

  Jackie the smart quadcopter to launch at Robotics Week

Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...

   Startup,Quadcopter,Security camera,Jackie Wu     2015-04-05 20:56:11

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29

  What was the Internet like in 1995?

The Internet evolves very fast since its birth. In 1995, a TV program called Computer Chronicles made an episode about new technology "The Internet". Now let's check out what the Internet looks like in 1995 through some video screenshots. First the host Stewart Cheifet appeared in the video where he was in a network cafe. There you can meet the real people and virtual person. That's a good thing. The first guide of us is the technology journalist from New York Times John Markoff. He said his f...

   Internet,History,1995,Computer Chronicles     2013-04-10 06:30:28

  The Story of W&L: China’s Great Internet Divide

Here’s an introductory quote from The Story of W&L, a tale of China’s great internet divide: China does not have one so-called “national internet,” instead there’s a great divide. It encompasses the elite with ThinkPad laptops and also the grassroots with MTK Shanzhai mobile phones. Our elites are on par with America, while our grassroots are on par with Vietnam. This is the story of W&L, two representatives of China’s great internet divide. T...

   China,Internet divide,Elite,Grassroot,Laptop,Mobile phone     2011-12-05 12:23:56

  What is encryption? Its role in the modern age

“Messages and calls are end-to-end encrypted.” If you are a WhatsApp user, you must have read this statement at the top of chats you open. Now, what does it mean? The statement signifies that all the messages or voice notes shared between users are encrypted, and no one can read or listen in on them. As mostly all of us use messaging apps and emails, information security has become a major concern. Moreover, we don’t know how many digital footprints we leave on the web can be t...

   DATA SECURITY,VPN     2021-01-21 08:04:16

  5 Things You Can Do to Protect Your Data

The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...

   DATA SECURITY     2019-08-20 08:35:54

  It’s Not China; It’s Efficiency That Is Killing Our Jobs

The majority of wealth is now concentrated at the top of the social ladder. This is particularly true in the US, and the gap is widening every year. This, I believe, is because of efficiency, not China. Today the best ideas can efficiently and quickly propagate worldwide, and everyone can efficiently find them and buy them. This makes the owners of these ideas filthy rich, and those ideas that are not the best, can hardly survive. It’s not just transfer of information that is fast; wealth...

   China,Efficiency,Job,Opportunity,Wealth     2011-10-23 11:43:18

  For Google CEO Larry Page, a Difficult Premiere Role

When Google Inc. co-founder Larry Page announced that he would take over as chief executive earlier this year, he promised that he would shake up the Internet search giant to speed up decision making. Instead, much of the shaking up has happened to the new CEO.Challenges have piled up for Mr. Page since he assumed his post in April. They include a broad U.S. antitrust probe of the company's practices; the settlement of a long-running criminal investigation into Google's adver...

   Google,CEO,Lary Page,Motorola,Role     2011-08-31 08:55:43

  Tips for Putting a Price on Your Work

WHEN I first started as a freelance writer, I was eager to sell myself — but not eager to have to discuss money. So I more or less took whatever was offered. Then I read somewhere that no matter what price a new client states, you always say in a polite but firm tone, “I expected more.” The first time I tried it, I was sweating and I doubt my tone was firm — it probably sounded more like pleading — but to my great surprise, it worked. With th...

   Development,Price,Worl,Negotiation     2012-01-29 04:37:17