Honolulu Star-Advertiser

Tuesday, July 16, 2024 85° Today's Paper


Technology

 

When traveling far afield, guard smartphone closely

With summer in full swing, many of us are traveling to the mainland and foreign destinations for vacations and business. Along with our toothbrushes, clothes and other traveling essentials, we are bringing our internet-enabled mobile devices such as smartphones and laptops. Read more

Keep in touch overseas via phone carrier or SIM card

The advent of the smartphone has created a state of “always online” in which many folks live today. Always connected, information readily at your fingertips, always reachable. While this situation has its pros and cons, the fact is that many people have become used to this condition as a way of life. Nowadays it is easy to maintain this state virtually anywhere in the U.S. What, then, is one to do when traveling abroad? Read more

star
Unlimited access to premium stories for as little as $12.95 /mo.
Get It Now

Airtight encryption makes cybersecurity a challenge

If I were to choose a word that encapsulates the focus of the cybersecurity industry for the last two years, it would be “encryption.” However, the boon in increased encryption has created new challenges for enterprises. Read more

LinkedIn breach sheds light on password vulnerabilities

Business-oriented social networking site LinkedIn recently disclosed that its 2012 hacking episode affected 117 million users instead of the original estimate of 6.5 million. Chances are good that if you have a LinkedIn account, your password was compromised. Even more chilling is a report that these passwords have been put up for sale by nefarious characters on the Web. What, then, can you do to protect yourself against such evildoers? Read more

Amount of data and budget determine backup solution

With hurricane season coming up, and the ever-present threat of tsunamis and earthquakes around the Pacific Rim, folks are always concerned about their information systems. Businesses and government agencies, large and small, need to be prepared for such disasters. Read more

Institutions must increase dedication to cybersecurity

A recent study analyzing cybersecurity education at top American universities found that none of the top 10 computer science programs requires cybersecurity as a course for graduation. This means that thousands of computer experts who will be building our future technology might have no formal cybersecurity training. Read more

Email users can ease clutter by ‘opting-out’

A few days ago I was the recipient of a polite email from a doctoral candidate at a reputable journalism school. This email asked me to participate in a survey regarding the effects of social media on newsrooms. From this innocuous message, a trail of nearly 50 replies indicated a clear ignorance of the “opt-out” function. Read more

Strong encryption protects customers, builds business

The ongoing legal battle between the FBI and Apple has highlighted an information security capability that experts have advocated for years to be implemented in their enterprises: data encryption. Encryption protects readable data by converting it into data that cannot be understood without authorization or a special key. Read more

Beware the complexity, cost of the celebrated ‘5 9s’

A few weeks ago we ran into a client who stated that he needed to achieve the holy grail of system uptime, commonly known as the “five 9s.” This descriptive phrase is derived from the figure of 99.999 percent. If your goal is five 9s, this means that your system stays up and running 99.999 percent of the time. Ultimately, though, this client had to settle for something less as five 9s was outside of his budget. Read more

Insurance helps companies offset data breach expenses

As data breaches become more common, we tend to pay less attention when we hear about hackers stealing millions of records containing sensitive personal and financial information. It’s becoming just another news story. Read more

Several programs ease path to create and share PDFs

Utility software applications are ubiquitous. Some, however, are indispensable. I would argue the PDF (Portable Document Format) is one of them. Introduced in the early 1990s by Adobe Corp., PDF has become an industry standard. Read more

Analyze dashcam features before installing one in car

In recent weeks, video of car wrecks, road rage, poor driving and even plane crashes has made the rounds in society. Such footage is often captured by a dashboard camera (dashcam for short), which is a small camera mounted inside one’s windshield. The primary selling point of a dashcam is to protect you in case of an accident in which you were not at fault. What, then, are the features to look for in such a unit? Read more

Cyberthreat analysis crucial — maybe too crucial to share

Last year there was a lot of hype around the term “cybersecurity intelligence” from information security service providers and consultants. Behind this buzz were substantive government actions that were intended to increase the sharing of intelligence on cyberthreats between the private industry and federal agencies. Read more

Stronger antenna is 1 fix for a weak wireless signal

A weak wireless signal is a common conundrum, experienced by businesses, government agencies and residences small and large. A once strong signal can get weak as the result of a recent expansion, relocation, interference or other factors. What, then, can folks do to improve the performance of their wireless networks? Read more

Help computer shed bloat with a range of free tools

As anyone who’s ever used a personal computer for more than a few months can attest, machines slow down. While some performance problems are unavoidable, one of the biggestissues nowadays is referred to as “bloat.” The good news is that most folks are capable of combating this on their own. Read more

Having trouble finding what you need? Try using our search feature.