A continuation of an earlier discussion on Fake News. How is the best way to identify it and to fight it?
Category: Tech Blogs
Collection of articles on technology.
Passwords – the Gremlins of Cyberspace
Passwords. They may be too weak, whatever that means. They may be too many, each having to conform to a password standard of a particular web site. They are forgotten, confused and yet hacked by somebody out there. What is it with passwords? Can we master these little devils?
Spam Filtering: Mastering Your E-mail
It is now a fact of life that e-mail traffic is largely spam, unwanted solicitations for your time and money, if not worse. Spam cannot be avoided, but it can be controlled.
E-mail: A Method to the Madness
I had finished writing this piece when the latest blow-up over the Clinton e-mails grabbed the headlines. I’ll speak on that later because what I wrote below pertains to them as much as to you. Needless to say, whether you are Sarah Palin or Hillary Clinton, how you handle e-mail has significant repercussions.
…. And Another Certification — Confessions of an old computer professional
I just obtained another certification (officially), which joins the numerous unofficial certificates that I earned through corporate training courses. Whenever I go through this experience I have to wrestle with the justification of the certificate process. Is it really worth it? What does it prove? Originally posted on LinkedIn on February 16, 2016, this article…