I am.   This is an interesting read, as a libertarian who didn’t vote for Trump, I agree with this author Cassie, let’s give the new administration a chance and see what happens.

I am not racist. I am not homophobic. I am not sexist. I am not a misogynist. I am for free market. I am for stronger foreign policy. I am for small business. I am for my family. I am Republican. W… Source: I am. Advertisements

Read more "I am.   This is an interesting read, as a libertarian who didn’t vote for Trump, I agree with this author Cassie, let’s give the new administration a chance and see what happens."

Hacking Wars

Watch the global hacking war in real time with a weirdly hypnotic map QZ.COM at http://qz.com/224618 Well-organized hackers from China have been blamed for everything from crippling pro-democracy websites in Hong Kong to stealing corporate secrets from US companies in recent months. The US and China are locked in an escalating war about online spying […]

Read more "Hacking Wars"

The Next Big Thing….

The Next Big Thing…. It has been awhile for the Next Big Thing, nothing like the period between 1960 and 2000 when we experienced the Next Big Thing, roughly every 18 to 36 months….. If we look around, we see the Next Big Thing brewing…..the convergence of on-premise computing and cloud computing.  As I look […]

Read more "The Next Big Thing…."

Yes We Can: United States Declared “Enemy of the Internet” With Iran, North Korea, and Other Bad Actors

Originally posted on JONATHAN TURLEY:
We previously discussed the rapid drop of the United States in the protection of the free press. Now, the respected Reporters Without Borders has produced a separate report on Internet freedoms. In yet another dubious distinction for President Obama, the United States is now listed with such “Enemies of the…

Read more "Yes We Can: United States Declared “Enemy of the Internet” With Iran, North Korea, and Other Bad Actors"

Data discovery does not have to be just about security.

Originally posted on Tom Olzak on Security:
Sitting back, looking at his security controls matrix, George felt comfortable with the trustworthiness of systems on which he expects sensitive information to reside.  His database servers are located on segments locked down and monitored by unified threat management (UTM) devices.  The NAS where he expects unstructured data…

Read more "Data discovery does not have to be just about security."