Security
/* BEGIN: Block 2 of 2 Greg Add 2013 (Jan 29) */ ?> /* END: Block 2 of 2 Greg Add 2013 (Jan 29) */ ?>3 Gadgets To Keep Your Dog Safe & Your Car Clean!
by Lady BeeHow often would you like to just pop your dog in the car and go? But, if
you're like me, you don't have enough protection in your four-wheeled
vehicle to keep your four-legged darling safe and your car clean! Well,
Kurgo's come out with with a few gadgets that you might want to look
into. Here are my three favorites....
New Smart Fence Bars The Way For Bad Guys
by Doug BonderudFrom the USC Viterbi School of Engineering comes a new security system called Smart Fence that uses multiple detection platforms in order to differentiate between help and harm.
Is Social Media Stocks An End-Run Around The Securities Exchange Commission?
by Ron CallariSocial media stock that you can purchase before a social network goes
public has become the hot ticket in social media circles. In my post, "Social Media Stock Market Don't Need No Stinkin' IPOs,"
I noted several financial vehicles that sell these types of stocks
direct to pubic, while they are still private companies. However none
have caught as much flack as the Goldman-Sachs-Facebook deal.
Cute Bear Boot Clip Corrals Footloose Winter Footwear
by China.newKeep tall boots from flopping, folding over and going astray with this cute Rilakkuma character clip. Not only will you avoid unsightly boot creases, you'll be able to pick out your boots from the crowd.
China's New J-20 Stealth Fighter Quietly Makes First Flight
by China.newWhen China's homegrown J-20 stealth fighter took to the air on its first test flight, it let the world know – albeit quietly – that China's air force won't take an ejection seat to anyone.
Social Media's Dark Side Casts Long Shadow Beyond Tucson Shopping Mall
by Ron CallariMuch has been written in an attempt to make some sense out of the
shootings involving U.S. Congresswoman Gabrielle Giffords in Tucson,
Arizona and the subsequent deaths of her aid, a judge and four others.
Suspected shooter Jared Lee Loughner's social media footprints are being
examined for clues as to his motives. But perhaps we are following the
wrong trail of evidence. Political extremists who are effective in
radicalizing certain segments of society are also using social networks
to rally support for their causes.
Social Media Under The Gavel When WikiLeaks' Twitter DMs Were Demanded
by Ron CallariOnce again the popular microblogging
site of Twitter is caught at the vortex of a political maelstrom where
human rights are at issue. Differing from the Iranian election protests
of 2009, this time the U.S. is appearing to be the heavy-handed
oppressor. On December 14, the government's Department of Justice issued a court order to Twitter to the attention of its "Trust &
Safety" department.
Acoustic Cloak Hides Objects In Plain Sound
by Doug BonderudProfessor Nicholas Fang of the University of Illinois has created an acoustic cloak that hides objects from standard sonar waves - and it fits in the palm of his hand.
Spy Glasses Allow You To Read Invisible Messages
by John P. BarkerWant to look really good while reading a speech off of a blank sheet of paper? These glasses will allow you to do just that...
Skype To Join China's Internet Graveyard Of Facebook, Flickr, YouTube & Google?
by Ron CallariThe Great Firewall of China is alive and well as companies like Google
have been forced to relocate its operations to Hong Kong, and movers and
shakers like Mark Zuckerberg while allowed to tour the country - is
saddled with his social network being sequestered in "404 Not Found Territory"
on China's Internet. But what about Skype - the
Voice-over-Internet-Protocol (VoIP) provider? Surely, China's Big
Brother doesn't want to censor phone calls, as well?
Crack Mask – Aqua Access Rather Than Addiction Affliction
by Doug BonderudAccess to water during a fire or emergency is a must, but can often be difficult to find. Now, the Crack Mask offers mobile moisture during a panic.
2010's Disruptive Technologies At Odds: Ipad vs WikiLeaks
by Ron CallariThe game-changing technology of the iPad and WikiLeaks fast became part
of the world zeitgeist this year. Under normal circumstances disruptive
technology is a stand-alone innovation setting a new path for technology
that went before. If iPad disrupted the laptop and eReader industries,
and WikiLeaks was a political game-changer in the world of journalism -
how did they cross paths to motivate one to reject the other?
It's Been Leaked Social Media Acronyms Are Being Re-Defined
by Ron CallariOur world was full of acronyms even before social media came onto the scene. In business, someone could be SOL because he was in deep water with his boss. Or a member of the military might be AWOL for taking too much time off for R&R and didn't CYA.
But today, acronyms of all sorts have popped into our lexicon as the
result of smartphones and Twitter - where it became even more important
to find quicker ways to communicate with a limited number of characters
for a tweet or text message.
Fingerprint Gun Aims To Load Up On Safety
by Doug BonderudHandguns are a danger in any industrialized country, and despite active gun registries and police presence, their use only seems to be increasing. Now, designer Sun Xiaotian has come up with a novel way of protecting the peace and the "piece" - the Fingerprint Gun.
Social Media Hackers, Heroes Or Villains?
by Ron CallariAnyone who has seen the movie, The Social Network
is familiar with how in the early years, Mark Zuckerberg pitted young
students against each other in a heated competition as to who could
"code" the fastest. The most savvy cognoscenti won a chance to join
Facebook's start-up team back in 2004. On a recent installment of 60 Minutes,
Lesley Stahl noted that "Hacker" posters papered the walls of FB's HDQ.
Which begs the question - what determines whether hackers are heroes or
villains?