Most of my readers know that for years I have blogged about the productive benefits of using Tablet PCs. Although I haven't blogged much about this topic lately, I think this product overview is worth watching...
It's triangular. It's mobile. It's sexy. And now it comes with spice 2.0. It's currently only available in orange. I'm waiting for the guacamole green version.
At ICA, we are creating opportunities for the next generation workforce. And, we are doing it with Lotus Notes. Here's just one example:
As Beta users install the latest release of eProductivity and accept the license agreement, we record the date so that we know who’s really using the software. This gives us an idea of how many people are actually using the new versions and it helps us identify star beta program members so that we can thank them and include them in future special programs. It also allows us to remove people who, for various reasons, choose not to participate in the beta.
This important task is the responsibility of our manager of Beta Program record keeping, Kelly Mack (age 10). In this picture you can see Kelly faithfully doing her job.
P.S. Kelly's been a Notes user for 6 years and has began using eProductivity last year.
My Jewish friends know that Mama can always use an extra pair of hands in the kitchen, and Papa can surely use the help with the Seder. At last, help is on the way...
A group of enterprising engineering students at the R&D Institute for Intelligent Robotic Systems CS Department, College of Management Academic Studies, ISRAEL have created a robot to assist with your next passover Seder. In this practice video, the robot serves his guests with precision.
Where is the first place a burglar checks for a key when he's about to enter someone's home? That's right - under the mat or stone by the front door.
Where's the first place a cyber criminal looks for username and password when he wants to get access to a computer? That's right - on a Post-it Note or label on the computer keyboard or monitor. (If the movies are true, second place is probably in a slide-out return or drawer.)
But what if multiple people share a workstation? Easy. Check for the neatly typed spreadsheet that lists everyone's login credentials; choose someone you want to impersonate, and login. Presto!
Why bother with passwords at all?
This is a real picture and sadly, I see this kind of behavior all too often. I even wrote about this problem and proposed a solution four years ago in a post entitled, "Lower your standards; lower your stress".
Seriously folks, most network admins I know work very hard to secure the information assets of their organization. Yet, their efforts to protect these assets are undermined when people do stuff like this.
Network and computer security requires more than a digital audit. Training and on-site inspections are mandatory to prevent stuff like this from happening. Obviously, in this organization, it isn't happening.
As far as this photo, in the interest of security, I won't name the company where I took this picture. I will, however, send them a link to this blog post.