6 Steps for Data Confidence in a Digital World

Companies today are critically dependent upon their data.  It is the lifeblood of operations and is relied upon for strategic […]

Full Details

Mobile Cybersecurity Tips for the Holidays

Katie Niemi and Eric Vanderburg While being diligent with your online shopping is important and necessary, there are a few […]

Full Details

IoT Security is Living on the Edge

As the size of the Internet of Things (IoT) continues to grow, so too do the potential security risks for […]

Full Details

The Future Workplace of Augmented and Mixed Reality

Virtual reality has received a lot of attention lately, but there is much to be said for Augmented Reality (AR) […]

Full Details

Mac Users Face Increased Ransomware Threats

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users […]

Full Details

DevOps FastTrack – From How to Wow

Pavan Belagatti and Eric Vanderburg Early DevOps adopters have proven DevOps to be more than just a cultural shift or […]

Full Details

Smart printers require smart security

For decades, the printer has been the intermediary between the digital and physical worlds.  Through it, our creations become tangible […]

Full Details

The Future of DevOps

I recently did an interview with JAX Magazine on DevOps and here is the transcript of the interview. Some people […]

Full Details

Protecting against APTs with Machine learning

Machine learning is a science that uses existing data on a subject to train a computer how to identify related […]

Full Details

Cloud 2.0 – Built on security refinements from cloud technologies

In the world of technology, paradigms shift quickly.  Not long ago, we focused organizational security efforts on the perimeter of […]

Full Details

Newest Ransomware has Polished, Professional Look

Criminals are raising the bar in the fight for your money.  It’s natural to expect that competition would follow success—and […]

Full Details

Geolocation technology helps ransomware deliver targeted message

It might surprise you to know that ransomware uses geolocation technology to customize payloads and target individuals. You probably already […]

Full Details

Preserving Value in Designing Lasting Storage Solutions

Storage solutions make or break the systems they support and yet these same systems are routinely seen as a cost […]

Full Details

The human brain vs. computers in the identity challenge

The concept of identity is core to the protection of data.  Data and other computing resources exist to be used […]

Full Details

Big Data ROI – How to use what you already have

We may not be using more of our brains but we can probably use more of our data. Did you […]

Full Details

In-wall Transducers that Turn Your Walls into Musical Instruments

Spoiler alert for all my regular cybersecurity readers: this is a post about audio, not security.  Check back in a […]

Full Details

FashionLens – A virtual dressing room for Microsoft HoloLens

You probably remember Microsoft’s announcement for their augmented reality or mixed reality hardware called HoloLens which occurred around the announcement […]

Full Details

2015 #Techsgiving at CDW

CDW asked me what my must-have products were for #Techsgiving sweeps and I have to say the choice was rather […]

Full Details

No compromise with the hybrid cloud

This statement may be familiar to many who have considered cloud services and it was both the start and end […]

Full Details

Cloudsizing: Finding the right fit for your cloud

The maturation of the cloud is fascinating as it continues to adapt, providing more opportunities for companies and consumers to […]

Full Details

Screen your calls in the cloud

I used to be agitated by the sound of the phone. My wife and I both have cell phones but […]

Full Details

Become a Windows 10 Power User with Keyboard Shortcuts

Shortcuts, as the name implies, are key combinations that you can press on your keyboard to perform semi-complex actions.  These […]

Full Details

Preserving email integrity in eDiscovery

I was recently asked the question, Can eDiscovery systems prove the integrity of the email that they discover? If so, […]

Full Details

The missing leg – integrity in the CIA triad

Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are […]

Full Details

Protecting consumer data in the Internet of Things

The Internet community grows larger everyday as more and more devices are attached to it. These devices increasingly include not […]

Full Details

Windows 10 Privacy Concerns and Enhancements

Microsoft officially launched its successor to Windows 8.1, Windows 10, on July 29, 2015, and millions have already downloaded this […]

Full Details

Interesting questions on virtual reality and gaming

We are getting closer and closer to virtual reality.  Some companies such as Google and Oculus have already produced virtual […]

Full Details

Future ready cloud security

In 5 to 10 years, the cloud will be as ubiquitous as the Internet is today. It is predicted that […]

Full Details

Cloud security empowerment

The cloud has received a lot of negative press from security professionals and, I have to admit, we’ve come off […]

Full Details

What to expect in 2015 in security and technology

As hard as it is to believe, 2014 is almost at a close. While some think about Holiday gatherings and […]

Full Details

The Value of Big Data

The Value of Big Data Accenture released the findings of their big data study on September 10, 2014, and it […]

Full Details

Retrieving a tape from a dead Dell PowerVault 124T

The power supply and control panel for this Dell PowerVault 124T tape autoloader failed with a tape in the drive.  […]

Full Details

IT Career Steps for Success and Satisfaction

I was recently the keynote speaker and the IT professional development event hosted by Cuyahoga Community College and the Helpdesk […]

Full Details

My thoughts on Xbox One

I watched the XBOX One launch video today on my XBOX 360 console dashboard.  It is impressive in some ways […]

Full Details

Social networking strategy

Social networking is my thing this year and I just wanted to share my strategy with you in case you […]

Full Details

Cyber Forensics: Collecting evidence for today’s data breaches

I will be presenting at the ISACA CPE & Social Event – Cyber Forensics & Cleveland Cavaliers vs. Miami Heat […]

Full Details

VandyLAN 8 Memories

I had an awesome time with you all. Thanks for making it a great LAN party.  Here are a few […]

Full Details

Ready for VandyLAN 8?

Are you ready for some great PC gaming? Bring your computer to VandyLAN 8 where we will game all day […]

Full Details

Friday Fun – Which workspace do you prefer?

Our Security Operations center keeps track of a lot of information.  Here are two workspaces in the SOC.  Let me […]

Full Details

Windows Password Reset

Many people have asked me how to reset their Windows password so I decided to write this blog about it.  […]

Full Details

Is Your TV a Security Risk? IoT May be the Next Threat

The latest televisions and Blu-Ray players come equipped with more than HD video and audio.  Internet access and a host of […]

Full Details

Defending Against DDoS (Distributed Denial-of-Service)

The site is down!  These are haunting words for most businesses, and today’s topic: the DDoS (Distributed Denial-of-Service) attack. This […]

Full Details

Free Programming Conversion Scripts

If you want to create an EXE, executable file, from a batch file or VBS file, these two programs will […]

Full Details

Security and Compliance Synergies with DLP, SIEM, and IAM

The use of SIEM, DLP, and IAM can significantly enhance the capabilities of information security departments. SIEM allows a company to […]

Full Details

iPad Enterprise Security

“Thinner. Lighter. Faster. Facetime. ” That is the catchphrase from the Apple page dedicated to the iPad. While Apple is […]

Full Details

Fail Secure – The Correct Way to Crash

Do you think there is a right way to crash?  A system crash sounds like a bad thing all around, […]

Full Details

Cisco Access Controls and Security

Many organizations use Cisco devices to interconnect, protect, filter, and manage networks so it is important to understand ways to […]

Full Details

Developing a Virtualization Security Policy

Since many organizations are rapidly virtualizing servers and even desktops, there needs to be direction and guidance from top management […]

Full Details

Business Continuity and Backups in the Virtual World

Virtualization has really become a mainstream technology and an effective way for organizations to reduce costs. Virtualization simplifies processes but […]

Full Details

Critical security considerations for server virtualization

Virtualization is an excellent way to make better use of existing IT resources but utilizing them for multiple tasks.  It […]

Full Details

DPM and Exchange Server 2007 SP1 x64

For those of you using Microsoft’s Data Protection Manager and Exchange Server 2007 SP1 x64, you will definitely want to […]

Full Details

Star Trek Biofilters and Terahertz Ray Technology

The biofilters from Star Trek may some day become reality.  The Star Trek biofilter is a device that scans for […]

Full Details

Virtualization business continuity with snapshots

Snapshots are a valuable feature virtualization offers business continuity. Organizations can create point-in-time recovery points numerous times a day by creating […]

Full Details

Dolby TrueHD comes to HTPC’s

Aimee and I use my home theater a lot and so when my DVD player started skipping on disks I […]

Full Details

Windows 7 and the Microsoft Strategic Commander

Microsoft released one of the greatest gaming controllers with the Strategic Commander back in 2001.  The controller fits perfectly in […]

Full Details

Virtualization at hot, warm, and cold sites

Business continuity plans are designed to define the processes necessary to protect organizational assets and to keep the business running in […]

Full Details

ASP AJAX and IIS7

I have been struggling with some ASP AJAX code.  I moved a .NET site from Server 2003 32-bit IIS6 to […]

Full Details

VandyLAN 7

I wanted to remind you that this Saturday, July 25 from 12:00 Noon till 12:00 Midnight is VandyLAN 7.  I […]

Full Details

Kinetic Recall – Where did this knowledge come from?

Have you ever completely forgotten how to do something until you just started? As a cybersecurity professional, I find that […]

Full Details

Pipe Dream: Data migration with batch files

So I was working on a problem at work today.  We can only copy 4000 files at a time and […]

Full Details

Interviewing Tips from Microsoft

In a 2008 blog entry by Steve Clayton at Microsoft, he mentions the five things he looks for in candidates when […]

Full Details

Full-Text Catalog Organ Transplant: Moving SQL Server full text indexes

Full-text searching allows more complex searches such as word or phrase searching, inflection matching, proximity searching, and relevance matching to […]

Full Details

Arcade Update

It has been a while since I posted anything about the arcade machine and for good reason.  It has been […]

Full Details

Creative labs Live Cam Optia Review

I haven’t used a webcam for years but I have never been on to follow the trends. It might seem […]

Full Details

Upcoming Articles and Presentations

There are quite a few upcoming things on the agenda. My article”Implementation to Instruction – Is teaching next in your […]

Full Details

Formatting Your System Drive Using Your OS X Install DVD

Even Macs age and eventually need to be replaced.  If you are planning on giving your Mac away, it is […]

Full Details

ISO Recorder, MagicDisk and CD Burner XP Pro

I am always on the lookout for new programs that can solve my problems for free.  My copy of Nero […]

Full Details

Odd form of Communication

I wanted to comment on an odd form of communication.  I looked at the writing inside the bathroom stall today […]

Full Details

Domain Schema Sequence Numbers

I have not posted in a while because things have been so busy.  I think I will change the direction […]

Full Details

Four Firefox Extensions You Should Evaluate

This is the list I am starting of good Firefox extensions.  Each of these is one I would highly recommend. 1. […]

Full Details

Microsoft Certified Database Administrator MCDBA

I am happy to announce that I passed another certification test – actually two of them.  I took the MCDBA […]

Full Details

Search Activity Correlation

I looked at my Google search history today.  Google tracks each search that you make when logged in with your […]

Full Details

Top 10 Strangest Japanese Gadgets and Accessories

Tech Blog has compiled a list of the top 10 strangest Japanese gadgets and accessories. Check it out. It is […]

Full Details

New Vista Beta Review

Ian gave me the latest Beta of Windows Vista. I have the 64-bit edition and I hope it will work […]

Full Details

Source Force – Microsoft Action Figures

Ian got me the four Microsoft guys from the Source Force. I gave a few of them different names when […]

Full Details

Vista Update on Aero Glass

I found the issue with Aero Glass that I reported earlier. The reason why Aero Glass fails sometimes is that […]

Full Details

MSN Messenger Live Beta Review

When I first tried Vista last week I wondered why MSN Messenger was not bundled with the operating system.  I […]

Full Details

Sync your data freeware style

I always try to promote free programs if I can.  When I have a need, I usually check online for […]

Full Details

Microsoft Windows Vista Updates

A while back I did a review on Microsoft Windows Vista.  I am now running into an issue.  I do […]

Full Details

Additional Google suggestions

I posted a while back about possible improvements to the Gmail system.  Here are some additions to that post. Nested […]

Full Details

Microsoft Windows Vista Review

Thanks to Ian and a new laptop, I am now running a copy of Microsoft Windows Vista so I figured […]

Full Details

SQL Server Issues

I put SQL Server on a Windows Server 2003 virtual machine on my new 64-bit laptop but Enterprise Manager would […]

Full Details

New Laptop

I bought a new laptop today.  It is a Compaq v2000z.  Here are the specs. AMD Turion 64 ML-28 (1.6GHz) […]

Full Details

Database Patch Management with SQL Server 2000

I haven’t blogged in a while because I was busy upgrading my MCSE and MCSA certifications. I took the tests […]

Full Details

Exchanging my junk for your junk

I am back on eBay for a while to exchange my junk for someone else’s. I am selling my Mac G4 Cube, […]

Full Details

Upgrade your Phone to a Skype Phone

Skype now allows you to make calls from your PC to phones located in the US and Canada for free. […]

Full Details

Gmail Improvements – importing, digital signatures, group filters

In recent months I have submitted a variety of suggestions for improvement to the Gmail system. I figured I would […]

Full Details

Physics Card

Physics in games has grown rapidly over the last few years. Characters are interacting with their virtual environments in many […]

Full Details

Mac Viruses

Apple’s recent ads talk about how there are no viruses written for Mac. That statement is not entirely true. Viruses […]

Full Details

Cryptography Rap

MC Plus+ has created a rap about cryptography.  It mentions encryption algorithms such as DES, AES, Blowfish, RSA, SHA-1, and […]

Full Details

802.11n Wireless-N devices

It is not out. Dlink and Netgear have some 802.11n wireless devices out. Wireless-N devices are capable of higher transmission […]

Full Details

Apple Displays with built in cameras

Apple recently patented a display that includes thousands of tiny image sensors that will allow the screen to act as […]

Full Details

750 GB Drives

Seagate just announced the release of their 750 GB hard drive.  They also state that I should see 1 TB […]

Full Details

Moving from Kyocera Finecam SL400R to Nikon Coolpix S4

The battery on my digital camera does not last all that long.  I really like the camera. I bought it […]

Full Details

Windows on the Mac Update

I got the latest Intel update for Mac OSX. It was about 150MB, but now I can see my NTFS […]

Full Details
SQL Server 2000

Microsoft SQL Server 2000

I am always trying to learn something. I really enjoyed learning about programming yesterday and now I want to shift […]

Full Details
Diary

Code Camp Programming Diary

Ian and I left for Code Camp in Pittsburgh early this morning. We were on the road by 5:30 AM. […]

Full Details
Lionhead Studios

Microsoft Acquires Lionhead Studios

This is a quote from Penny-Arcade about Microsoft’s recent acquisition. “I would sooner acquire crabs, but Microsoft has decided to […]

Full Details
Boot Camp

Boot Camp enables Windows on a Mac

If you read the Wall Street Journal, you will know that on Wednesday, Apple released software called Boot Camp that […]

Full Details
Apple Mac Mini

Apple Mac Mini

I bought an Apple Mac Mini a few weeks ago. I have had my eyes on one for quite some time. […]

Full Details

Adesso Handwriting Tablet

Last week I picked up an Adesso Handwriting. It is a tablet for my Mac.  I did not have the […]

Full Details
Microsoft Office 12 Beta

Microsoft Office 12 Beta Compared to Open Office

I was given a copy of Microsoft Office 12 Beta to try the other day. I plan to compare it to […]

Full Details
Open Office 2.0

Open Office 2.0 Review

It has been a while since I last tried Open Office. I have used it in the past on both […]

Full Details

Inherent weaknesses of DRM and possible solutions

Digital Rights Management (DRM) is a set of technologies designed to restrict the use of digital files and media to […]

Full Details
SQL Server

SQL Server Event

Richard Hale and I took my classes on a field trip to the Microsoft offices here in Cleveland for a […]

Full Details
Microsoft .net

Microsoft .net at the Southwest PA Code Camp

I signed up for Southwest PA Code Camp on Saturday, April 8, 2006. I have taught a programming class but […]

Full Details
Blog

Posting blogs to MSN Spaces via email

I am happy about the new features added to MSN Spaces, but I am unhappy that I had to reset […]

Full Details
Hard Drive

New Equipment

We got some new equipment for the classroom.  I am missing hard drives on the parts because they were taken […]

Full Details
Internet Explorer

Internet Explorer 7 beta review

I installed the Beta 2 of Internet Explorer 7 yesterday. It is buggy as one might expect from a beta. […]

Full Details
Netiquette

Netiquette

The Internet has its own set of norms and acceptable behaviors.  We know these collectively as netiquette.  Please take a […]

Full Details

Troubleshooting

I found this on thenetworkadministrator.com.   Q: My Etch-A-Sketch has funny little lines all over the screen. A: Pick it […]

Full Details
RFID

Emerging Technologies, RFID, VoIP, Wireless, SOA, and EAI

I am busy writing things lately. I am working on a professional statement and on writing an article on emerging […]

Full Details

802.11n WiFi technology

I was admiring the new switch with my brother and I thought about the 802.11g router that is sitting on […]

Full Details
Wifi Rabbit

Nabaztagtag WiFi Rabbit

I was made aware of this little creature on the CWNP forums and it seems quite cool.  The Nabaztagtag WiFi […]

Full Details

CWSP

I am really cutting this close.  The CWSP test changes on January 1 and I just scheduled the test for […]

Full Details
CWNA

CWNA

I am studying to take the CWNA (Certified Wireless Network Administrator) exam.  I plan on taking it in 3 weeks […]

Full Details

Cisco certification and Star Trek

I plan to take the next Cisco test soon.  It will be nice to have the Cisco preparation over and […]

Full Details
Apple Cinema 23

Apple Cinema 23 Display

As some of you know, I bought an Apple Cinema HD 23″ widescreen display about 6 months ago.  I still […]

Full Details
Networking

Protocols – Getting to the “meat” of networking

This week I am teaching on protocols in my networking class. I love the topic and I got excited when […]

Full Details

The International Market for Robotics

The International market for personal and mobile robots is about $5 billion and could grow to $5.4 billion this year.  […]

Full Details
Technology Management in Japan Robotics

Technology Management in Japan: Robotics

I gave a presentation on robotics today and it went very well. The presentation was supposed to be 45 minutes […]

Full Details
Computer Hardware

Dell and AMD

A few years ago Dell started selling only machines with Intel processors. I have been a fan of AMD processors […]

Full Details

Panasonic Advanced Technology

I visited the Matsushita (Panasonic) technology center in Osaka today with some friends.  At Matsushita, I got to see a […]

Full Details
Video Games

Dungeon Siege 2, game modding, and other video games

Ian, Chris, and I have all been waiting for a game called Dungeon Siege 2 to be released. The game […]

Full Details
Google Privacy

Google Gmail advertising, privacy and other considerations

I was using Gmail the other day and I noticed that the ads kicked in. I did not have ads […]

Full Details

The rise of robotic pets

Robot pets are the latest thing in Japan.  Take, for example, the Robosapien.  This robot is making the average person […]

Full Details
Sony Minidisc

Will Apple supplant Sony in the Japanese music market?

I see that Apple iPods are getting popular in Japan. It makes me wonder if iPods will eventually supplant the […]

Full Details

Mac fans fantasize over new hardware

This is the new Apple iMac. Everything is built into the monitor. It has a slot-loading DVD burner, a large […]

Full Details
Apple ibook

Disproportionate Apple Mac use from foreigners in Japan

It is really interesting to see how many people have Apple computers here. Apple Macintosh computers are really popular among the […]

Full Details
PCI Express

PCI Express is coming

I am not going to buy a computer anytime soon but I still get excited about new things in the […]

Full Details
RSS

RSS Feed Aggregators

For those of you using RSS aggregators, Smartbar XP, News Gator, and select browsers that support it, here is the […]

Full Details

Japanese Robotics Companies

There are quite a few robotics companies or well-established companies that are heavily involved with robotics in Japan.  I would […]

Full Details
Japan

Kobata to the Rescue: No more conflicts with the Internet install and the Shinkansen

I talked to Kobata and he was able to get the NTT (Nihon Telephone and Telegraph) installers to come a […]

Full Details
Internet

Internet in Japan…Finally

NTT will set up my Internet tomorrow at 2:00. I wish they could set it up today. It is going […]

Full Details
Broadband

Blazing Internet speeds are almost here

Last night I tried the various wireless networks around my area but I could not get a decent connection all […]

Full Details
Keitai

Living without Keitai (Cell Phone)

Did I ever mention how expensive cell phones are here, or Keitai as the Japanese call them? I had this […]

Full Details
Japan Broadband

Japanese Broadband Internet 100Mbps

I went to the Internet connection meeting last night. It was a long meeting. Here is what is going to […]

Full Details

Tokyo Researchers Designing Robot Skin

Takayasu Sakurai, a professor at the University of Tokyo’s Institute of Industrial Science and his team has developed artificial skin […]

Full Details
Copyright Protection

Copyright Protection and Infringement Technologies ebook

Copyrights exist to protect creative works. This protection is given so that authors of these works can continue to create […]

Full Details

Costing for Internet Companies

The Internet changes everything it touches and touches almost everything.  Worldwide e-commerce revenues are expected to reach $2.7 trillion.  $721 […]

Full Details

Memory Primer

Definition of RAM A computer is made up of many components.  One of these components is RAM which is short […]

Full Details

A Guide to Binary Numbers

How to convert Binary to Decimal 128 64 32 16 8 4 2 1 Total Value 1 1 1 1 […]

Full Details

Criteria for Selecting a Desktop Processor

Desktop processor heavyweights, Intel and AMD are fighting battles across the laptop, desktop, and server markets.  The desktop and server […]

Full Details

Dynamic Host Configuration Protocol (DHCP) Primer

DHCP is a networking protocol that provides safe, reliable, and simple TCP/IP network configuration and offers the dynamic configuration of […]

Full Details

A Pixel’s worth a thousand words

I was out for a birthday lunch today and a friend asked what a pixel is. After fumbling around for […]

Full Details

Steve Jobs as a rebel or revolutionary

Steve Jobs has been instrumental in the evolution of the computer as we know it today.  Steve Jobs co-founded Apple […]

Full Details

What’s Behind Microsoft’s Windows NT

Microsoft Windows NT was first released in 1993.  NT stands for New Technology.  Windows NT was Microsoft’s platform of choice […]

Full Details