Tag Archives: technology

Businesses today can’t exist without data. They feed on it, breathe it, and those that understand how to most effectively harness it, achieve competitive advantage. Not only will those companies see returns today but tomorrow as well since they will be well-poised to seize future data storage opportunities and better leverage their data to make decisions and glean insight. As you know, companies and consumers alike are producing data at a rate never seen before and this continues to increase. Those companies looking to the future know that they will…

Continue reading

In 2014, the Identity Theft Resource Center (ITRC) tracked 783 data security breaches with 85,611,528 confirmed records exposed. This year appears even more dismal. The ITRC Data Breach Reports1 for July 7, 2015, captured 411 data incidents with 117,678,050 confirmed records at risk. Because data breaches are a common occurrence in today’s information security threat landscape, it’s going to become de rigueur for companies to pump up security preparedness within their incident response plan. “The plan cannot simply be static and gather dust; it requires upkeep. The incident response plan should change as requirements and environments change.” — Edwin Covert, Norse…

Continue reading

In childhood I dreamed of a world quite grand Where my name and face were far from mystery A life far removed from one boring and bland Popular, famous, in fact, pure fantasy How could I know that my dream would become real My name and identity are known far and wide Governments, stores, and thieves don’t need to steal I’ve given it freely, when asked, I provide Now everything is different, complex, distorted Reportedly the data on me is vast All that I do is electronically recorded Much of…

Continue reading

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” the organization feels rather than on objective measures such as the number of cyberattacks, vulnerabilities or data breaches. An organization may put technical controls in place, educate employees and establish new policies immediately following a breach, but over time the technology becomes outdated and no longer protects the organization as it should. Memory of the breach fades, causing exceptions to be made to the firm's policies and leading to forgetfulness…

Continue reading

The biofilters from Star Trek may some day become reality.  The Star Trek biofilter is a device that scans for harmful biological substances and it was primarily used as part of the transporter system.  This technology that seemed so fantastical might soon be seen in airports, hospitals, postal offices, and ports.  The technology is called a terahertz scanner.  Terahertz ray technology is being researched as a way to identify bioterrorism agents in amounts as small as parts per billion.  Terahertz scanners operate on a different area of the spectrum from…

Continue reading

I will be joining Pei-Ying Lin at Cleveland State University today to present on Virtualization for Competitive Advantage.  Virtualization can easily transform your IT infrastructure, making your business more agile and give you better ROI on your IT equipment.  You can view the presentation below. Virtualization for competitive advantage – Eric Vanderburg from Eric Vanderburg

Continue reading

In a 2008 blog entry by Steve Clayton at Microsoft, he mentions the five things he looks for in candidates when hiring.  This information is useful for both job candidates and those looking for qualified people.  Here are his five tips: Hire for diversity, not consistency – I wanted people in my team as diverse as I could. Having twenty brilliant but unmanageable tech wizards in the team don't work. Balancing out the wizards with the delivery guys worked out well. Hire Delivery Guys (and girls) – I don’t mean postal…

Continue reading

It has been a while since I posted anything about the arcade machine and for good reason.  It has been a while since I have done anything with the arcade machine.  Last Friday, Aimee and I had a little party for some friends and Chris and I were playing King of Fighters on the arcade machine when he made a comment that the screen was fuzzy and that I should replace it with a new LCD screen.  This got me thinking.  The next day I opened the case and found…

Continue reading

Tech Blog has compiled a list of the top 10 strangest Japanese gadgets and accessories. Check it out. It is quite informative and entertaining. See the gadgets in this link. 
Seagate just announced the release of their 750 GB hard drive.  They also state that I should see 1 TB drives by the end of the year.  There is a SATA and an ATA (PATA) version for sale.  The drive is 7200 RPM and it has a 16 MB cache.  I am a hard drive fanatic so I am excited about the announcement and I may pick up one of those terabyte drives in December.