Mar 28, 2020 | Applications, Big Tech, Biological Viruses, Business, Computers, Coronavirus, Covid-19, data sharing, FDA, Google, Google, Government, Internet, Internet Infrastructure, Quarantine, Radio Show, Radio_Show, Scalability, Security, Software As A Service, Technology
Inability to Scale Plagues Google’s Pandemic Information and Diagnostic Site The entire Covid-19 pandemic has caused every business to question its capabilities whether from a business continuity standpoint or a complete re-imagining of its business practices. Some...
Mar 14, 2020 | Apple, Apple, Applications, Applications, Apps, Big Tech, Business, Congress, Court Challenges, Data, Data Assets, Data Records, data sharing, Data Storage, Databases, Dragnet, FBI, GeoFence Warrants, Google, Government, Internet, Legislation, Location Data, Radio Show, Radio_Show, Security, Security First, Technology
Have Your Phone — It Might Get You Questioned About A Crime! You come home from a long day at work and sit down at your computer to check your email to find an email from Google’s legal investigations support team informing you that local police were demanding...
Mar 7, 2020 | Big Tech, Business, data sharing, Family, Geek, Hollywood, Humor, Internet, Media, Nostalgia, Radio Show, Radio_Show, Security, Technology, Technology, Wayback Machine
Getting Your Fix of Nostalgia Have you ever found yourself nostalgic for some of the commercials, tv shows, and videos from your youth? If so, you will love The Internet Archive, VHS Vault that has more than 20K recordings for you to go through and relive your past....
Mar 7, 2020 | Asset Management, Attack Vectors, Audit Logs, Best Practices, Business, Compliance, Critical data, cyberattacks, Data, Data Assets, data sharing, Data Storage, Databases, Disaster Recovery, Hard Disks, Intricate Data Systems, Policies and Procedures, Privacy, Radio Show, Radio_Show, records, Security, Security, Technology, Unsecured
Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Mar 7, 2020 | Artificial Intelligence, Asset Management, Attack Vectors, Best Practices, Biometrics, Business, CEO, Clearview AI, credential stealing, Critical data, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Executives, Facial Recognition, Facial Recognition, Hackers, Hacking, Hacking, Hacks, Images, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Nationstates, Online, Organized Crime, Patches, Patching, Patents, Photo Database, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, third-world, Updates, Updates
Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Page 1 of 5123...5...»Last »