Computers Can Really Smell

IBM has long had one of the best research and development teams in computing.  The IBM Fellows are highly regarded as some of the best and brightest prognosticators in the profession.  In IBM’s most recent predictions they are suggesting that [...]

Computers Can Really Smell2023-08-10T22:43:08-07:00

Obama Admin Releases Massive New HIPAA Rules

So, as if healthcare practitioners didn’t already have enough to focus on with Obamacare, HITECH and the Flu epidemic, the Obama administration through the Department of Health and Human Services, has released a massive pile of new regulations in a [...]

Obama Admin Releases Massive New HIPAA Rules2013-01-18T21:52:02-08:00

The Java Vulnerability May Not Be Fixed; A Tale for Two Browsers

It has been suggested that this update does not end the problems for Java. In fact, some experts on Java are recommending that Java not be used unless necessary.  If you require Java, here are two suggestions: Turn Java on [...]

The Java Vulnerability May Not Be Fixed; A Tale for Two Browsers2013-01-16T16:38:59-08:00

BYOD: Are You Bringing Your Own Disaster

With the incredible proliferation of mobile devices that allow anyone with network credentials to gain nearly unlimited access to internal network resources, we have opened the proverbial Pandora’s Box. The ironic thing in this fast growing story is those with [...]

BYOD: Are You Bringing Your Own Disaster2013-01-11T19:45:10-08:00

Fast Fun At The Race Track – Alvaka Networks Client Appreciation Day

We had another successful day at Auto Club Speedway for our second annual client appreciation day at Auto Club Speedway in Fontana. In attendance were 40 drivers getting driving instruction and taking fast laps around the road course.

 
Fast Fun At The Race Track – Alvaka Networks Client Appreciation Day2023-08-10T22:47:53-07:00

Who Is Guilty In A Hack? The Perpetrator Or The Victim?

This article is interesting not because the hacker is convicted, but because of the reader comments at the end. The first post defends the hacker and blames AT&T for their system not being secure enough and allowing a breach. The next poster says that is akin to blaming a bank if they are robbed because their doors are not secure enough. Another poster points out that both are to blame.

Who Is Guilty In A Hack? The Perpetrator Or The Victim?2012-11-22T05:02:00-08:00

Opinion Piece By CompTIA Member And Alvaka Networks EVP Kevin McDonald

I’ve noticed a lot of gratuitous talk by our legislators about being all for small business and protecting the individual. They bandy about rhetoric about the Constitution and consistently are finding rights that are not spelled out or even vaguely contained in its language. Then they blatantly violate a key provision that is in fact clearly spelled out.

Opinion Piece By CompTIA Member And Alvaka Networks EVP Kevin McDonald2017-09-18T01:00:14-07:00

The Dangers Of Posting Your Photos Online

Be careful when posting photos on-line. Almost all new smart phones record where and when you took a photo. Many of the new high-end dedicated cameras do the same thing. Beyond the photo that you see and innocently post is a wealth of data you may not want to publish. That data is called EXIF, for Exchangeable Image Format.

The Dangers Of Posting Your Photos Online2023-08-10T22:49:46-07:00

Make It Work Abruptly Closes

A few years ago when the economy was stronger and investment capital more readily available I remember hearing advertisements on the radio from a company called “Make It Work.” They were advertising IT services that appeared to be targeted at SOHOs (small offices and home offices) and individuals. The advertisements were good and they talked about little red Mini Coopers the techs traveled in. I even saw a few.

Make It Work Abruptly Closes2023-08-10T22:53:20-07:00