Browsed by
Tag: Productivity

Return of the Revenge of the Profiles

Return of the Revenge of the Profiles

I recently wrote about the irritation in maintaining various Internet profiles.  All these accounts that we create on all these Web services…each with a unique user profile that is a royal pain to maintain.  I went through and cleaned up most of my profiles after a recent promotion.  Since then, I went through to make a final edit and noticed just how many are tying themselves to Facebook for authentication.  Really, Facebook. Look at how many Web services we use…

Read More Read More

Is it just me or is Twitter down??

Is it just me or is Twitter down??

I am not a huge twitter user, but I find it interesting that when online services go down, I have an adverse reaction to the disruption. What?? Why does XYZ not work!?! Our lives have become very intertwined with technology, and if you want to be cruel, all you need to do is go and hide someone’s smart phone for a day to see their withdrawal symptoms. I am sure it will be back up before I post this, but all…

Read More Read More

Blogging from the phone

Blogging from the phone

I am sitting in a car waiting to pick up a relative and noticed how slow time goes by while doing nothing. So I am taking the time to really look at my phone and see all that it can do. Guess what!! The modern-day mobile phone can do a ton of things! For example, I am creating this blog post from a phone. Think about how close we are to have a full computer in our pocket! All you…

Read More Read More

Some Thoughts on Information Security

Some Thoughts on Information Security

The Information Technology and Information Security teams have a challenge balancing user productivity and need for information security.  These computer professionals have a duty and obligation to provide both user functionality and data security.  Unfortunately, these two objectives are often diametrically opposed.  One side of the house wants to empower the users to achieve high levels of productivity and the other side needs to keep a watchful eye for threats of accidental or purposeful information destruction, unauthorized modification, and outright theft of digital information….

Read More Read More