photo RSMAtnWebAdRed13.jpg
Category archives for: Computer Corner

The Computer Corner

COMPUTERS

User Beware: That Link in Your Email May Not Be From Who It Appears To Be   By Charles Miller The subject of this week’s column is a rerun, but it has been years since the last time I wrote on this topic. A recent telephone conversation pointed up the need for a refresher. Regular [...]

The Computer Corner

By Charles Miller Every Software Program You Want Has a Free Alternative Out There Last week in this column, I related how more and more software companies are trying to move in the direction of Software as a Service (SaaS), a licensing scheme where the software you use on your computer is something you are [...]

Office 2019’s One-Time Purchase Model a Sop to “Old Fogy” Computer Users

By Charles Miller In a recent Microsoft press release, there was some very welcome news for the computer users who PCWorld.com describes as “old fogies who prefer standalone software.” It is no secret that Microsoft and other software makers would like to see all computer programs licensed under the terms of Software as a Service [...]

The Computer Corner

Geofencing:  the Reason You Can’t Watch Game of Thrones from México By Charles Miller Geofencing is a capability that can be built into a software program that uses the Global Positioning System (GPS) and/or other means to define geographical boundaries. This subject recently came up in a conversation with my friend Robert, who was preparing [...]

Can US Voting Machines Be Compromised?

By Charles Miller Last week, I related some of the news coming out of this year’s DEF CON hacker convention, and there is still a bit more to say. Once again, this year the convention featured the Voting Village, through which computer hackers were invited to try compromising the security of voting machines, websites, and [...]

More on Technology and Your Privacy

By Charles Miller Last week I noted that privacy and the individual’s right to it is a hotly debated issue. I briefly summarized how under US law in 1928 the Supreme Court ruled that nothing said on a telephone could be private. In 1967, that court reversed itself, declaring that citizens should have a right [...]

The Computer Corner

By Charles Miller The acclaimed historian, author, and Librarian of Congress Daniel Boorstin said: “The unintended consequences of man’s enterprises have and will always be more potent, more widespread, and more influential than those he intended.” A recent example of this is the European Union’s new General Data Protection Regulation 2016/679 (GDPR) that came into [...]

The Evolutionary Stages of Computer Hacking

By Charles Miller When it comes to computer viruses or malware, the question is often asked, “Why’d they do that?” Many decades ago, my second-grade elementary school teacher, Miss Lucy Tipton, had the answer to that type of question. She explained that anytime you ask a question beginning with “why did she…,” “when will they…,” [...]

The Computer Corner

By Charles Miller The Absurd Extremes to Which Legacy Software Can Lead This week marks an anniversary of sorts, one that Microsoft would probably love to forget but at the same time one that perfectly exemplifies the software industry’s “legacy problem.” It was on September 5, 2007 that Microsoft Silverlight was released with much fanfare. [...]

The Computer Corner

COMPUTERS

By Charles Miller Cookies Inherently Sneaky But Not All-Powerful Cookies are among the most misunderstood aspects of computer technology. Depending on who you listen to, cookies may have been explained as evil and intrusive spying mechanisms tracking your every move on the net (actually, that is the NSA) or cookies may have been described as [...]

 photo RSMAtnWebAdRed13.jpg
 photo RSMAtnWebAdRed13.jpg

Photo Gallery

 photo RSMAtnWebAdRed13.jpg
Log in | Designed by Gabfire themes All original content on these pages is fingerprinted and certified by Digiprove