The topic of “Hacktivism” is one of importance. Hacktivism is a term that can be “credited to the Cult of the Dead Cow”, a hacker group that argued that universal access to the internet is a human right. Hacktivist aim to cause social change, just as many others have done in the past, through the...Read More
If you have ever used API’s before then you are probably familiar with OAuth. If not, no worries, read below and expand your authentication knowledge! OAuth has become one of the emerging as a standard for authorization. Important Terms Lets get you up to speed with a couple of terms: OAuth is an authorization protocol...Read More
Through my graduate school I was fortunate to work with Revitalize CDC on a system analysis project. I worked on this project with several other teammates. Review findings here: Systems Analysis Report and Recommendations Please note that this is a Report that I and my team created during grad school. We were able to accomplish...Read More
Through my graduate school I was fortunate to work with Parker Chomerics on a advertising data project for their marketing department. You can review my findings here: Analysis With revenues greater than 1 Billion, Chomerics Division is part of the Parker Hannifin Corporation Engineered Materials Group, and is a global leader in the development and application...Read More
There are many definitions as to what IT Infrastructure is. It can be formally defined as all of the hardware, software, networks, facilities, etc that are required to develop, test, deliver, monitor, control or support IT. The term IT Infrastructure includes all of Information Technology, but not the associated people, processes and documentation. In general,...Read More
The following is a quick description on Encoding, Encryption and Hashing. This post is to quickly help anyone understand these concepts and the differences with each. Encoding is the act of transforming data from one form into another. This type of transformation does not require a key, as it should be able to decoded by...Read More
The following below is my personal opinion on what the three most significant threats are in regards to the information we are sharing today. Data sharing and data privacy dominate the news these days as companies are being investigating for their policies and people are beginning to crack down on their habits. This is my...Read More
This post showcases a network diagram of an office space with the following arrangements: A reception area, 4 offices for management, 1 conference room, 10 work stations for the project team, a computer room with several servers and at least one printer. I assume that the reception area will have one computer and one printer...Read More
For this post I will be discussing how you can obtain your core body temperature by using estimated minute by minute measurements of your heart rate. These heart rate measurements can be found in my first post: Obtaining Heart Rate from Smart Phone Camera At the moment, there is not a clear way to measure...Read More
Modern Challenge To Information Security Statistics show that a large percentage of security breaches by malicious insiders or compromises resulted from attackers leveraging exploits on mobile devices to launch attacks on more sensitive internal resources. Thus, protecting cell phone usage for companies has to be a priority. Additionally, relying on everyone to secure their smart...Read More