The new business models enabled by the Internet is highly effective platforms designed to manipulate us. We offer ourselves up for manipulation every day. Even if you think you are immune, the people around you are also being exposed to these manipulation platforms, and they have a very real vote in your life.Read More
Potato vine flower under the microscope.Read More
Looking at my network traffic reminds me that almost all North-South traffic is encrypted these days.Read More
Activating IPv6 on my eero Wi-Fi network.Read More
Sometimes a walk across a college campus can be a great productivity enhancer.Read More
Look in a mirror. There is a good chance you are looking at more than one “person”. It turns out that human chimeras exist. In fact, there are many different degrees of chimerism, and it is far more common than you might imagine. You may very well be one yourself.Read More
Photo stacking addresses the challenge of very limited depth of field in microscope photography. This post shows the result of my first experiment using this technique.Read More
Ciliates are protozoans that, despite being single cell critters, are surprisingly fast, large, and complex.Read More
Early experiments with microscope lighting - looking at coffee grounds lit from above and above.Read More
Combining an old hobby (photography) with a microscope to create a new hobby (microscopy).Read More
Cyber attacks have taken on a new and dangerous dimension. The goal of these attacks is to manipulate people to believe a certain thing, increasingly identify with that belief, and ultimately to take actions based on that belief.Read More
On July 21, 1969 the first human walked on another world. On December 14, 1972 the last human walked on another world. Will we reach a time when no living human has walked on another world?Read More
A second live action version of “The Jungle Book” is coming out just 2 years after the last live action version.Read More
Streaming analytics for analyzing endpoints and users for intrusive behavior has been around for about a quarter century, probably most heavily promoted by SRI with their extensive publications on their NIDES intrusion detection system. These 1998 notes show how I made SRI's statistics more understandable to me.Read More
1998 notes on streaming analytics with an obvious handwritten "typo"Read More
Friday evening, 16 March 2018, Attorney General Sessions fired Deputy FBI Director Andrew McCabe. McCabe was set to retire on Sunday. Jeff Sessions in a statement explained that he fired McCabe in part for "lack of candor - including under oath - on multiple occasions."
Note that Sessions did not say McCabe "lied" but that he "lacked candor".
That reason makes this video of Session's testimony under oath seem extra special.
While the Bloomberg title and much of the article focuses on fingerprints of professional hackers, I want to highlight two other aspects of the story - the differences in rewards and experience between the executive staff and the IT and cyber security staff.Read More
Last year I bought a new Sony TV with 4K and HDR anticipating a new 4K HDR Apple TV box. Last week my HDR Apple TV finally arrived, but I was disappointed when I apparently could not use the HDR capability.
After several days of experiments, I finally resolved all my issuesRead More
My entire career has been based on developing new cyber security technologies and products, and I would love to sell everyone the latest & greatest tech. But first, any potential user or customer should take care of many of the basic (and often cheap or free) things.Read More
On September 7 Equifax announced it had suffered a major breach exposing very sensitive information (names, Social Security numbers, birth dates, addresses, and, in some instances, driver's license numbers) on almost all Americans who participate in the economy. Unlike passwords or credit cards, this is information that cannot be changed.Read More