Daily Archives: October 26, 2012

Databases

Hadoop and SQL worlds are converging 2012.10.26.18:20 Guest blogger Tony Baer looks at the slew of Hadoop-related news coming out of multiple conferences centering on it’s convergence with SQL in handling big data. Five common database development mistakes 2012.08.30.10:36 Here … Continue reading

Posted in Databases | Comments Off on Databases

The Hobbit

The Hobbit: An Unexpected Journey A Second TV Spot is Here 2012.10.26.12:29 The first part of the trilogy arrives December 14. Set Visit 2012.10.25.09:04 A journey into Middle-earth. Running Time Revealed 2012.10.24.07:17 And the characters are featured on five Empire … Continue reading

Posted in Media | Tagged | Comments Off on The Hobbit

Iron Man

In General: NYCC: Hasbro’s New Toys 2012.10.10.20:05 But who is that new character in greenish armor? Hot Toys All New Iron Man Mark VII Figure 2012.07.26.07:18 Hot Toys is proud to present the 1/6th scale Mark VII Limited Edition Collectible … Continue reading

Posted in Media | Tagged | Comments Off on Iron Man

Use Ninite to give Windows 8 a classic Start menu

For more than 20 years, Rick Broida has written about all manner of technology, from Amigas to business servers to PalmPilots. His credits include dozens of books, blogs, and magazines. He sleeps with an iPad under his pillow.More by Rick … Continue reading

Posted in Microsoft Windows 8 | Tagged , , | Comments Off on Use Ninite to give Windows 8 a classic Start menu

Tips for Staying Safe Online

National Cyber Security Awareness Month: Tips for Staying Safe Online October is National Cyber Security Awareness Month.  This is an effort coordinated by the U.S. Department of Homeland Security, the Multi-State ISAC, and the National Cyber Security Alliance along with … Continue reading

Posted in Cyber Security | Comments Off on Tips for Staying Safe Online

Using Encryption to Protect Data

Using Encryption to Protect Data According to the Privacy Rights Clearinghouse, more than 19 million records have been involved in a data breach so far this year.  Protection of data requires multiple layers of defense, and the use of encryption … Continue reading

Posted in Cyber Security | Comments Off on Using Encryption to Protect Data

Securing Your Wireless Network

Wireless networks are not as secure as the traditional “wired” networks, but you can minimize the risk on your wireless network (at home or at work) by following the tips below. How Does it Work? The standard setup for a … Continue reading

Posted in Cyber Security | Tagged , | Comments Off on Securing Your Wireless Network

Securing Your Web Browser

Securing Your Web Browser What is a web browser? The web browser is a software application that allows you to view and interact with content on a webpage, such as text, graphics or other material. Internet Explorer, Firefox and Safari … Continue reading

Posted in Cyber Security | Tagged | Comments Off on Securing Your Web Browser

Cyber Security Emerging Trends and Threats for 2012

Cyber Security Emerging Trends and Threats for 2012 During 2011, cyber security incidents included theft of intellectual property and government data, hacktivism, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these … Continue reading

Posted in Cyber Security | Tagged | Comments Off on Cyber Security Emerging Trends and Threats for 2012

Staying Safe On Social Networking Sites

Volume 6, Issue 12 Staying Safe On Social Networking Sites —pdf The popularity of social networking sites — such as MySpace, Facebook, Twitter and others — has expanded tremendously in recent years, with nearly two-thirds of Americans using these sites … Continue reading

Posted in Cyber Security | Tagged | Comments Off on Staying Safe On Social Networking Sites