Profile

Cover photo
Jim Willeke
Works at services.willeke.biz
892,522 views
AboutPostsPhotosYouTube+1'sReviews

Stream

Jim Willeke

Shared publicly  - 
 
Stop Typing in Long Commands in Linux! - coderwall.com http://nzzl.us/B8UeVQu via @nuzzel
Coderwall is a space for tech's most talented makers to connect, share, build, and be inspired
1
Add a comment...

Jim Willeke

Shared publicly  - 
 
Xinjiang, home of the China's muslim Uighur minority, has long been the world's laboratory for Internet repression.
1
Add a comment...

Jim Willeke

Shared publicly  - 
 
Microsoft, Google and Facebook are urging U.K. officials not to undermine encryption as they work on laws that would authorize forcing communications service providers to decrypt customer traffic.
1
Add a comment...

Jim Willeke

Shared publicly  - 
The Department of Homeland Security and the FBI are reportedly investigating the 'rouge code' in Juniper Networks products which could allow attackers to take over machines and decrypt VPN traffic.
1
Add a comment...

Jim Willeke

Shared publicly  - 
1
Add a comment...

Jim Willeke

Photos Help  - 
 
Get rid of duplicate photos.

With the several iterations of DOCS/DRIVE/Picasa/Photos/??? and that MOST people use more than one device, I have many copies of the same photo (some more than one copy) .

Any hope of how to get these cleaned up?
1
Add a comment...

Jim Willeke

Shared publicly  - 
 
A video from my newest camera.
1
Add a comment...

Jim Willeke

Shared publicly  - 
 
"Medicare is generating an enormous unfunded obligation (over the next 75 years) of between $28 and $37 trillion."
1
Add a comment...

Jim Willeke

Shared publicly  - 
Access to your information. This site gives you access to your contact data and some of its other data identified with you. How to resolve privacy-related disputes with this site. Please email our customer service department. bell.com 5000 Forbes Avenue Pittsburgh, PA 15213 United States ...
1
Add a comment...

Jim Willeke

Shared publicly  - 
 
Make a difference.
http://billionsinchange.com/Join 
Watch the Billions in Change film and learn more about our movement to build a better future through the creation of solutions in water, energy, and health.
1
Add a comment...
Collections Jim is following
Basic Information
Gender
Male
Work
Occupation
Business Process Consulting
Employment
  • services.willeke.biz
    Consultant, present
Links
Contributor to
Jim Willeke's +1's are the things they like, agree with, or want to recommend.
Gartner IAM Six Principles of Resilience - The Identity and Access Manag...
blog.avatier.com

Avatier uses the keynote at the Gartner IAM summit to advocate how identity and access management solutions mitigate risks in an era of digi

Cryptography: The Risks of Key Recovery, Key Escrow, and Trusted Third-P...
www.schneier.com

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption. Hal Abelson [1], Ross Anderson [2], Steven M. Bellovin [3], Josh

The rise and fall of the unicorns
www.economist.com

Some private technology firms are having trouble justifying their lofty valuations

How to Implement OAuth2 w/ OpenID Connect & UMA | Gluu | Blog
www.gluu.org

Learn how to use the OpenID Connect and User Managed Access (UMA) profiles of OAuth2 to centralize client registration and token issuance.

OIDF touts OpenID Connect certification | Gluu | Blog
www.gluu.org

Gluu provides feedback on the OpenID Connect certification programs, questioning whether the OIDF is serving the OpenID Community or its cor

What in the world is Digital Transformation? « Discovering Identity
www.discoveringidentity.com

Digital: “of, relating to, or using data in the form of numerical digits“. Transformation: “change in form, appearance, nature, or character

Opening Windows
www.economist.com

“WHAT are you on? The ‘fuck Windows’ strategy?” Back in the late 1990s, when Bill Gates was still Microsoft’s boss, any employee who had the

UMA for Access Management | Gluu
www.gluu.org

Learn more about the UMA specification. Enterprise UMA is used for JSON/REST API and web access management.

IoT Security
www.eejournal.com

Security is the last unsolved problem of the Internet of Things (IoT). Really; all we have to do is make a security and it will all be good.

Poverty and Welfare in the American Founding
www.heritage.org

The real difference between the Founders’ welfare policies and today’s is over how government should lift the poor out of poverty and preven

Robert Shiller: Unlike 1929 This Time Everything - Stocks, Bonds And Hou...
www.zerohedge.com

Q. How else does this period of apparent equity overvaluation compare to equity booms in the past? Robert Shiller: This time around, bonds a

Understanding the different types of BLE Beacons | mbed
developer.mbed.org

Bluetooth Low Energy (BLE) Beacons - there are several types available (URIBeacon, AltBeacon, iBeacon), each with their own standards and ad

Turing Test (Reversed) « Discovering Identity
www.discoveringidentity.com

a test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. Alan Turing propose

Reach Deep, Find Warmth
widowsvoice-sslf.blogspot.com

I have been nestled inside the winter for months, it seems. It has been so cold and dark. Even today, at the end of April, spring struggles

Senate creating secret encyclopedia of US spy programs
www.apnewsarchive.com

Associated Press historical news archive articles dating back to 1985

Why It's So Hard for the CIA to Hack Your iPhone
www.tomsguide.com

The CIA has been trying to hack iPhones, the latest Snowden documents reveal, but by all appearances, the agency has largely failed.

Steve Jobs: Genius? Of Course. But Selfish Egomaniac, Or Kind, Patient, ...
www.forbes.com

New Jobs biography appears to paint a more sympathetic picture of Apple's co-founder.

Meet Cyanogen, The Startup That Wants To Steal Android From Google
www.forbes.com

A brazen startup has a very real shot AT busting up the world's smartphone duopoly.

One of the best places for comfort food.
Public - a year ago
reviewed a year ago
Great food. Try the garlic salad and the Walleye.
Public - a year ago
reviewed a year ago
Great food at reasonable cost.
Public - a year ago
reviewed a year ago
An excellent lunch and dinner spot on the water. Well prepared, well presented and friendly.
Public - 3 years ago
reviewed 3 years ago
24 reviews
Map
Map
Map
Good food and local popular spot
Public - a year ago
reviewed a year ago
Great place for Coffee. A "real" coffee shop in downtown Mansfield. Who would have thought.
Food: Very GoodDecor: Very GoodService: Excellent
Public - 2 years ago
reviewed 2 years ago
This is "our" preferred Chinese for dining out in the Mansfield area.
Food: ExcellentDecor: Very GoodService: Very Good
Public - 3 years ago
reviewed 3 years ago