Aug 10, 2019 | Big Tech, Facebook, Facebook, Fines and Penalties, FTC, Government, Internet, Legal, Radio Show, Radio_Show, Social Networking, Technology, Tracking
FTC Backward Decision Gives Facebook Everything It Has Always Wanted So, as was leaked a couple of weeks ago, the FTC has now made its $5 billion settlement with a Facebook official. There’s quite a bit that’s interesting in the stipulated order...
Aug 10, 2019 | 100 years, Aging, DNA, Gene Editing, Health, Medical Research, Radio Show, Radio_Show, Technology
Your Disease Cure May be Right In Your Genes It’s only been seven years since scientists first learned how to precisely and reliably splice the human genome using a tool called CRISPR, making it possible to think about snipping out disease-causing mutations and...
Aug 10, 2019 | Bees, Environment, Insects, Pesticides, Pollinators, Radio Show, Radio_Show
Toxic pesticides causing an Insect ‘apocalypse’ in the U.S. America’s agricultural landscape is now 48 times more toxic to honeybees, and likely other insects, than it was 25 years ago, almost entirely due to the widespread use of so-called...
Aug 3, 2019 | Applications, Business, Microsoft, Radio Show, Radio_Show
Changes Coming to Skype for Business Online Customers Today we’re announcing that Skype for Business Online will be retired on July 31, 2021. This post provides details on the retirement plan, a brief explanation of why we’re making this announcement now, and a...
Aug 3, 2019 | Biography, Book, Data Storage, Databases, Encryption, Government, Memoir, Monitoring, Privacy, Radio Show, Radio_Show, Security, Surveillance, Technology
Edward Snowden the Book Edward Snowden, the former CIA employee and National Security Agency contractor who spilled some of the deepest secrets of the US government’s electronic surveillance operations, has written a memoir. Permanent Record, published by...
Aug 3, 2019 | Business, Cybersecurity, Employees, Employees, Radio Show, Radio_Show, Security
Retain Employees Increase Security People, processes, and technology: the three most important components of security operations. Processes can be designed and documented, technology can be purchased and implemented, but people are most often the X...