Profile cover photo
Profile photo
Wayne Rash
784 followers -
A writer in Washington
A writer in Washington

784 followers
About
Posts

Post has attachment
Social media can be a powerful tool for engagement, but it can also be a huge risk, as Elon Muck found out by not being careful when Tweeting. So how do you avoid a $40 Million Tweet? You create a social media policy. Here's how: https://www.pcmag.com/article/364130/avoiding-a-40m-tweet-7-tips-for-making-a-solid-social-medi
Add a comment...

Post has attachment
T-Mobile's acquisition of Sprint is off and running. Whether it actually happens and when that might be is up to several forces beyond the control of the companies, including the US Department of Justice, the FCC and the stockholders. The companies say it will lower prices, improve access and help hasten the deployment of 5G. We'll see. http://www.eweek.com/mobile/t-mobile-sprint-propose-merger-to-create-second-largest-u.s.-carrier
Add a comment...

Post has attachment
Cloud connected drones are only the beginning of what can be done with access to new cloud resources. Now you can get AI, ML and big data analysis just by asking. IBM, Google and Amazon all have powerful new features available. https://www.pcmag.com/article/360614/new-cloud-services-let-it-look-beyond-simple-infrastructure
Add a comment...

Post has attachment
The Review Bunker is for sale. We're selling our home in Fairfax County. It's an easy drive to the Dulles tech corridor, near VRE commuter rail. There's GIGABIT FIBER to the house. This is where product testing and reviews for magazines from Byte to eWEEK have been done, and it's a great place to live and work. Also, you can bring your horses. https://www.realtor.com/realestateandhomes-detail/11711-Amkin-Dr_Clifton_VA_20124_M60740-79489
Add a comment...

Post has attachment
The Facebook AI experiment in which the agents invented their own language was shut down because that wasn't what researchers were looking for, and besides it was interfering with the research. It was not a case of robots running amok or trying to take over. In fact, it was one predicted outcome, and it's something that's happened before. But it was an important step in AI research and how automated negotiation can work. In this case, it worked well enough that when humans were interacting with the AI agent, they couldn't tell it was an AI agent. http://www.eweek.com/it-management/facebook-ai-experiment-shutdown-holds-lessons-for-it-industry
Add a comment...

Post has attachment
Is your organization's encryption good enough to withstand an attack from a quantum computer? The +National Security Agency is working on ways to make sure that your encryption is able to withstand such an attack. Even though quantum computers with sufficient power aren't currently available, the NSA believes they will be, and needs to prepare now. We talked to the man in charge of the NSA's encryption research, who explains and offers some ideas about this. https://insights.hpe.com/articles/quantum-of-encryption-1707.html
A quantum of encryption
A quantum of encryption
insights.hpe.com
Add a comment...

Post has attachment
Net neutrality is doomed, not because of the recent Appeals Court decision, but because both parties see an advantage in using it as a tool to bludgeon the other, but not as a way to provide a useful secure means of communications. Usefulness doesn't stand a chance when it goes against raw, naked, political power. http://www.eweek.com/networking/appeals-court-declines-to-rehear-title-ii-reclassification-challenge
Add a comment...

Post has attachment
There's a general consensus in Washington that if anything in the President's office was tapped, it was his Android cell phone. His obsolete device has little security, to the point that researchers say planting spyware on it is trivial, and it can be done without a trace. We explain, and we can help you make sure it doesn't happen to you. http://www.eweek.com/mobile/unsecured-apple-android-smartphones-are-major-security-threats
Add a comment...

Post has attachment
WikiLeaks founder Julian Assange has offered to provide details of exploits used by the CIA to tech companies so they might improve their products. This course of action is fraught with peril. You could end up losing your secrets as well. http://www.eweek.com/security/wikileaks-offer-to-help-secure-tech-products-fraught-with-legal-risks.html
Add a comment...

The problem for +Uber when it started expanding was how to deal with the depth of corruption in the taxi business, and the equally deep level in the regulators. The taxi companies didn't like having to compete, and the regulators didn't want anything to interfere with their personal cash flow. It's no surprise that Uber figured out how to avoid those officials while also protecting its drivers. http://www.eweek.com/mobile/uber-greyball-looks-prudent-rather-than-evil-in-ride-sharing-industry.html
Add a comment...
Wait while more posts are being loaded