Brainwave Biometrics
I have heard a lot about biometrics - granted, almost everything I know about biometrics comes from action-packed spy movies and T.V. series - but I've only been one place that uses any form of...
View ArticleReducing Master Image headaches
There are long, exhaustive lists of best practices for creating master images. In this post, I have compressed them down to three major areas. So sit back, fiddle with that fancy fob watch, and read...
View ArticleThree Superlative reasons to download the Mobile Admin client
You might not know it, but SolarWinds has a product to manage your IT infrastructure directly from your mobile device called Mobile Admin. Now Mobile Admin comes in two parts-a free mobile client and a...
View ArticleTo Cryo or Not to Cryo?
That is a question. This is probably not relevant for a great number of IT folks, but it is interesting for the implications on server room/server cooling. This year some enterprising researchers...
View ArticleWhat is PRI
A Primary Rate Interface (PRI) is not an esoteric banking term designed to take as much money as possible away from your account. It's a less obscure telecom term that connects your internal PBX to...
View ArticleQuantum Computing - A Reality?
Hats off to Canada! It seems that D-Wave has produced the first commercial quantum processor, or at least they've presented enough evidence that NASA, Google, and Lockheed Martin have purchased, or are...
View ArticleThe Downsides of Quantum Computing
After we have collectively congratulated ourselves for the D-Wave folks producing what may be the first quantum processor-capable of solving computing problems 10,000 times faster than conventional...
View ArticleVoice Over I.V.
No, the title is not a typo. October's wacky, weird, so-new-it-hurts technology is a subcutaneous cellphone that runs off of your blood. The phone rather looks like a prototype for the awesome phones...
View ArticleEmulating Wetware with Hardware
When I hear "wetware," I think of futuristic, cybernetic implants that connect our brains to the Internet, version 10.0, but IBM is using the term to refer to a new form of liquid cooling and energy...
View Article100 Gb/s wireless speeds coming not soon enough
How would you like 100 Gb/s over wireless? In an experiment funded by Germany's BMBF, researchers have transmitted 100 Gb of data per second (the equivalent of 2.5 DVDs) over the grand distance of 20...
View ArticleWafer-thin flash drives
There's a new design concept out there for flash drives the thickness of a sticky note. The company, called dataSTICKIES, uses a relative newcomer material called graphene and a proprietary wireless...
View ArticlePassword 123456
For those of you who can ban certain passwords (such as "password" or "abc123"), you may be interested in SplashData's list of the worst passwords of 2013. Here are the top ten jewels for your banning...
View ArticleAttack of the Cyber Space!
According to a recent Pew poll, American users are more afraid of "cyber attacks" than world-impacting threats, like nuclear weapons. Granted, you are more likely to get your credit card number stolen...
View ArticleIntroducing V2V Communications
You've heard of P2P, but have you heard of V2V? Vehicle-to-Vehicle (V2V) communications Vehicle-to-Vehicle communications is, as the name implies, data exchanged between two vehicles. The NHTSA has...
View ArticleThe price of security breaches
Have you ever wondered what the actual cost of security breaches are? Target, due to its mid-December, 2013, breach can certainly be a case study. As of now, Target's profits are down 46% and down by...
View Article