Jun 1, 2019 | Internet, Radio Show, Radio_Show, social media mobs, Social Networking
Our New Society: Social Media Results In Judgement By Mobs Today everyone has a smartphone and videos; Instagram and Snap Chat are a common communication source. The growth of social media has given birth to a more underhanded form of mob mentality that responsible...
Jun 1, 2019 | Business, Coding, Open Source, Radio Show, Radio_Show, Technology
Open Source Is Changing The Way We Approach Everything Software engineers for decades have relied on open source components to enhance their programs, speed development, and deliver them more rapidly. The use of open source software meant that these engineers...
Jun 1, 2019 | Artificial Intelligence, automation, Automotive, Cars, Consumer_Reports, Cybersecurity, Radio Show, Radio_Show, Security, Technology, Tesla, vehicles
Autonomous Cars — Are they ready for Prime Time? While some companies are moving headlong into autonomous vehicle design, is it time to ask are we moving to fast on this front? The driving force for many of these advancements in technology is artificial...
Jun 1, 2019 | Data, Data Storage, Google, Passwords, Privacy, Radio Show, Radio_Show, Resources, Security, Software, Technology, Web Tools
Why Are We Still Trusting Google? Can you believe that a technology company that sells companies the ability to use a suite of their services — failed to protect their login credentials? Yes, that’s right. You pay us, and we will leave your login’s and...
Jun 1, 2019 | Business, Computers, Cybersecurity, Legal, Microsoft, Radio Show, Radio_Show, Technology, Windows (Microsoft)
Running Windows? Be Sure You Patch! Another week and another Microsoft critical vulnerability! Yea they fixed it and have a patch, but how many of you have applied it? Except for their newest Windows OS releases (Windows 8 and Windows 10), this vulnerability...
Jun 1, 2019 | bluetooth, Cybersecurity, gadgets, hardware token, Laptops, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, WiFi
You know that I advise people to use 2FA. But Google’s token has a problem that might affect you. Just this week Google announced that their two-factor authentication FOB, called Titan, has a vulnerability that allows it to be hacked by anyone who is within 30...