Sungard Files for Chapter 11 Bankruptcy Protection – Again Sungard, the king of disaster recovery and business continuity needs to figure out a new business. They previously filed for Chapter 11 in 2019 and shed $800 million in debt, but they have a fundamental problem. As businesses move from private data centers to the cloud […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First – what are dark patterns? Here is a definition from Wired: The term “dark patterns” was first coined by UX specialist Harry Brignull to describe the ways in which software can subtly trick users into doing things they didn’t mean to do, or discouraging behavior that’s bad for the company. When you want to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It **appears** that Elon Musk is going to take Twitter private. We have no clue what the result of that will be, but it might mean a more wild, wild west version of Twitter. He says that he wants less content moderation, for example. This weekend the EU appears to have agreed to the framework […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cyber Command Says Chip Shortage is a National Security Issue The head of U.S. Cyber Command, General Paul Nakasone, told Congress that China’s continued progress towards domestic chip production is a problem. If China achieves chip independence, that puts them in a position to do what they want and not worry about sanctions. For example, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We often hear stories about people listening to you (eavesdropping) using your phone or PC’s microphone even when you think they are not. We usually attribute that to the “tin foil hat” crowd, but, apparently, that might be a bit optimistic. Researchers at U Wisconsin Madison and Loyola Chicago say that they tested the top […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Trump administration effectively eliminated the cybersecurity role in the State Department several years ago by eliminating its leader and burying the function in the State Department bureaucracy. Their theory was that the White House National Security function could assume the diplomatic role for cyberspace. Ultimately, that strategy failed and towards the very end of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]