Blockchain described in one sentence: A blockchain is really a kind of database that’s shared across loads of different computers that are each running the same software; each bit of data is secured using some complicated bits of cryptography that means that only people that are meant to be adding to or editing the data can do that job. WIRED Magazine, 2018 Recently, I had a job interview with a company that builds their business model on providing add-on services for their customers’ databases built upon the open source centralized DB platform known as PostgreSQL. Probably the reason why I was considered to do digital copywriting for them is my previous experience writing for tech companies like PTC, Satcon, and L-1 to name a few. For PTC, I did a ton of writing for their PLM Product Marketing Group. PLM (i.e. product lifecycle management) is a massive technology platform and manufacturing methodology that relies heavily on data-driven digital thread content, product data management, and databases to name a few. So as you can see, I know a thing or two about databases. Also, I have written about Blockchain Technology (or BlockTech as I will be using this portmanteau from now on) in the past; therefore, I am well aware of the hot new trends for this distributed cutting-edge decentralized data-repository/processing platform. During the interview, I asked a simple question: How is your approach to utilizing a centralized DB value-add over the hot new decentralized DB technology trend known as Blockchain? Digital Batman’s Alter Ego, Nick, 2021 Needless to say, the developer that I was interviewing with did not really like the question all that much. His answer was more defensive rather than enlightening: “…centralized DBs are not going away anytime soon, so people need to understand that Blockchain is more like a curiosity right...
software
-
-
February 17, 2021Recently, the US Department of Justice levied an indictment against three North Korean military hackers for their role in cyber-related crimes (see video below). These included (but not limited to): Targeting of and Cyberattacks on the Entertainment Industry: Such as the destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for the farcical movie The Interview. Cyber-Enabled Heists from Banks: Attempts to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta and Africa. Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, and more, which would provide the North Korean hackers a backdoor into the victims’ computers. Spear-Phishing Campaigns: Multiple spear-phishing campaigns that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, and more. Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies involving the theft of sensitive data and deployment of other ransomware. And it is to that last point that I thought a brief discussion on Ransomware would be warranted. Even Digital Batman’s own father was a victim of a ransomware attack that left him $400 poorer! In 2019 over 187.9 million users were affected by this bold malicious threat to online activities such as web‐surfing, e-commerce, gaming, and more. Put simply, this highly‐disruptive form of Internet‐viral malicious software (malware for short), not only infects your computer but holds all of your most precious files (i.e. photos, documents, apps, etc.) completely hostage—via permanently encrypting such files—until the victim is forced to pay a “ransom” to the criminal entity behind the attack for a decryption key to unlock the files. Usually to the tune of $100 ‐ $400 or more for...
-
For all the flack that Apple gets for its proprietary and closed ecosystem of hardware, software, and cloud-based services, there’s a lot of good that comes out of it as well. This article will look on the “bright-side” of why having and using an Apple ID over your Macs and iPhones/iPads/iPods, and AppleTV can be not only a robust tool to help you get things done, and do cool stuff with, but also can be a real life saver—digitally speaking of course! What is an Apple ID? To put is succinctly, an Apple ID is an email address that you give to Apple when you set up a new Apple device such as an iPhone, iPad, iPod Touch, or a Mac computer running the latest Mac OS. Your Apple ID is also linked to your iCloud account, which allows you to integrate all your “Apple i” devices into a single place. Linking your Mac and iPhone macOS (as of this writing: April 2017, OS X, version 10.12, a.k.a. Sierra) just loves your Apple ID! What’s even better is when you get a shinny new iPhone (say the iPhone 7) running iOS 10 (as of this writing, 10.3.1), and you set it up with that same Apple ID, all kinds of good stuff happens! For example: say you’re working on an article for your employer (like an online tech tip and tutorial blog), and you’re working on a Mac mini running Sierra. Your iPhone is currently recharging in the next room. However, you get a phone call (yes, people still do that sort of thing). Whatever do you do? Fear thee not! Let your Mac do the talking… Yes, as long as everything is set up correctly, and you have audio capabilities with your Mac (who wouldn’t?), then when you get a call, a...
-
April 20, 2017Mobile communications such as text messaging, Facebook Messenger, Twitter Direct Messaging, SnapChat, Skype, and FaceTime are all seeking to supplant Email these days as the preferred form of digital communications. Not so for business or for professionals where Email still reigns supreme. Email access essentially comes in two forms: Email Software, or Client-based Email – E.g. Microsoft Outlook (costly subscription fees), Mac Mail (comes with Mac OS X), and Thunderbird (free open-source download) to name a few. Cloud Email – E.g. Google Mail (GMail), Yahoo Email, or AOL Email (yes, it still exists)—all free and accessible via a web browser Let’s delve into the key differences between them with an eye on how each form manages Email in their own unique ways. It should be noted that regardless of what method of accessing your Email is used, all Email actually sits on a server somewhere in “The Cloud” and simply waits for you to get it one way or another. Email Software Client-based (meaning: on your computer) Email still has many years of unparalleled usefulness that other services can’t match—the main advantage being security. Say you’re an employee at Company X and check your email like everyone else does everyday. You can rest assured that the Email sitting behind your company’s firewall is as secure as it gets. Even when logging in from home, you are usually using a VPN (Virtual Private Network) to establish a secure connection between your laptop and your company’s Email servers. There’s very little chance of your Email being hijacked as you send your messages to your fellow employees or out to your clients. Microsoft Outlook allows a massive amount of Email filtering features, rich text (like HTML) messages, Email organization into shared and group folders across the entire organization, remote Email access via a Web-Outlook interface, and comes in cross-platform versions for Mac OS X and Windows (all versions). And the final advantage is group organization capabilities like employee calendars, scheduling...