photo RSMAtnWebAdRed13.jpg
Category archives for: Computer Corner

Office 2019’s One-Time Purchase Model a Sop to “Old Fogy” Computer Users

REG COMPUTERS

By Charles Miller In a recent Microsoft press release, there was some very welcome news for the computer users who PCWorld.com describes as “old fogies who prefer standalone software.” It is no secret that Microsoft and other software makers would like to see all computer programs licensed under the terms of Software as a Service [...]

The Computer Corner

REG COMPUTERS

Geofencing:  the Reason You Can’t Watch Game of Thrones from México By Charles Miller Geofencing is a capability that can be built into a software program that uses the Global Positioning System (GPS) and/or other means to define geographical boundaries. This subject recently came up in a conversation with my friend Robert, who was preparing [...]

Can US Voting Machines Be Compromised?

COMPUETRS

By Charles Miller Last week, I related some of the news coming out of this year’s DEF CON hacker convention, and there is still a bit more to say. Once again, this year the convention featured the Voting Village, through which computer hackers were invited to try compromising the security of voting machines, websites, and [...]

More on Technology and Your Privacy

COMPUTERS

By Charles Miller Last week I noted that privacy and the individual’s right to it is a hotly debated issue. I briefly summarized how under US law in 1928 the Supreme Court ruled that nothing said on a telephone could be private. In 1967, that court reversed itself, declaring that citizens should have a right [...]

The Computer Corner

COMPUTERS

By Charles Miller The acclaimed historian, author, and Librarian of Congress Daniel Boorstin said: “The unintended consequences of man’s enterprises have and will always be more potent, more widespread, and more influential than those he intended.” A recent example of this is the European Union’s new General Data Protection Regulation 2016/679 (GDPR) that came into [...]

The Evolutionary Stages of Computer Hacking

Code

By Charles Miller When it comes to computer viruses or malware, the question is often asked, “Why’d they do that?” Many decades ago, my second-grade elementary school teacher, Miss Lucy Tipton, had the answer to that type of question. She explained that anytime you ask a question beginning with “why did she…,” “when will they…,” [...]

The Computer Corner

REG COMPUTERS

By Charles Miller The Absurd Extremes to Which Legacy Software Can Lead This week marks an anniversary of sorts, one that Microsoft would probably love to forget but at the same time one that perfectly exemplifies the software industry’s “legacy problem.” It was on September 5, 2007 that Microsoft Silverlight was released with much fanfare. [...]

The Computer Corner

COMPUTERS

By Charles Miller Cookies Inherently Sneaky But Not All-Powerful Cookies are among the most misunderstood aspects of computer technology. Depending on who you listen to, cookies may have been explained as evil and intrusive spying mechanisms tracking your every move on the net (actually, that is the NSA) or cookies may have been described as [...]

The Computer Corner

LifeLock-logo

By Charles Miller   Best Identity Theft Defense: Keep Info Need-to-Know   One day, while in the States, I was visiting an office and the receptionist was filling in some obligatory paperwork. “Name?” she asked. “Address? Phone Number?” Then she asked, “What’s your Social Security number?” “It’s private,” I responded. Much to my surprise and [...]

The Computer Corner

COMPUTERS

By Charles Miller A friend of mine told me a joke that made me laugh out loud: All automobiles today are equipped with emergency flashers (also known as I-can-park-anywhere-I-wanta-park lights), but that was not the joke. The joke was that someone asked their mechanic, “Did you fix my flashers, and do they work now?” The [...]

 photo RSMAtnWebAdRed13.jpg
 photo RSMAtnWebAdRed13.jpg

Photo Gallery

 photo RSMAtnWebAdRed13.jpg
Log in | Designed by Gabfire themes All original content on these pages is fingerprinted and certified by Digiprove