The Invisible Man

The Invisible Man

The concept of the “invisible man” has been written about many times throughout history. Probably the earliest was by Plato in The Ring of Gyges. The story is about a ring that grants its owner the power to become invisible at will. In the story, Plato considers whether an intelligent person would be moral if he did not have to fear being caught and punished.

IT’s Time to Grow Up

IT’s Time to Grow Up

The owners of growing businesses face a very real challenge where their technology infrastructure is concerned.  As your business grows, the IT solutions that once worked so well for you may no longer make sense.  Maybe you put a fantastic inventory management system in place that did everything you needed it to do, but that was when YOU had to take care of the inventory.

Wikileaks details router vulnerabilities

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

What’s Your Firewall Against Extinction?

What’s Your Firewall Against Extinction?

Like it or not, the world’s biodiversity is diminishing.  Fortunately, zoos are playing a greater role in preventing the extinction of species in nature—in effect, they have become firewalls against extinction.  Zoos provide naturalistic habitats for animals that give the illusion of open access, but both the animals and the visitors are protected.