Ira Wilsker's archive

Cyber security is a concern and a necessity at all levels. Computers and networks operated by governments, businesses, academia and other associations and agencies have been prime targets of cyber attack, but the number and rate of attacks on privately owned personal computers and smart devices has become explosively endemic.

shadow

Every fall, industry releases its new “year” of models; we see new cars, new appliances — and new security software. Many (but not all) PC, Mac and smart device security software publishers typically allow the user of a 2012 version to upgrade to the 2013 version, often at no charge, for the balance of the original license period.

shadow

Almost all newer laptop computers as well as tablets, smart phones, video game consoles and home entertainment systems utilize WiFi as a primary or secondary method of connecting to the Internet or some other network. According to published reports from several sources, the majority of home Internet users have some form of WiFi in their homes, and WiFi is very commonly used in business, commercial and academic environments.

shadow

During the recent natural disaster known as Isaac, I was busily tracking the progress of the storm and attempting to determine the potential threat to my community near the Gulf Coast. Thirsting for information, I was always searching for additional tidbits that might be of practical use.

shadow

Amazon has developed a well-earned reputation as a seller of goods. Originally an online book seller, Amazon diversified into consumer and institutional goods, digital books and music, and a variety of other services. Recently, Amazon announced what might be the lowest cost, commercially available “cloud” data storage for long-term archival or backup services. Amazon has enormous data capacity, with countless servers and related data storage located in many places around the globe.

shadow