Posts

Showing posts from June, 2017

Trends in Programming

Image
So many languages, which one should you choose?     Like many other technology items, programming languages and their popularity can ebb and flow. Last year's "must-learn" language has been replaced by something new this year. If you're just getting started with programming, this can be a confusing issue. How do you decide which language (or languages) to learn? There's a good chance that your school's computer science department has already done some research on this topic and spoken with various employers to get an idea of which programming languages are in demand in your area, and tailored their programming courses accordingly.   But, if you're looking to broaden your experience and expand the number of programming languages you "speak", the TIOBE Index can be a good spot to start. The index is updated monthly. Not only does it show the top languages, it shows what position that language was in last year, so you can eas

Where Can Programming Take You?

Image
The growing cyber security field needs programmers. Good programmers have lots of options in many different industries. One area that has a growing need for programmers is cyber security. While the ability to create clean, elegant code that is bug-free is always an advantage, if you also have security skills, your career path gets even broader. According to this article from Steve Morgan of CSO, the unemployment rate in the cyber security field was 0% in 2016 and industry experts estimate there will be 3.5 million open positions worldwide by 2021. In a companion article, Bob Violino of CSO discusses what it takes to become a security software developer . Areas such as the cloud, the Internet of Things (IoT) and financial sectors all have a growing need for individuals with these skills. Obtaining industry certifications, such as the Certified Information Systems Security Professional (CISSP) credential, and being able to pass a company's security clearance are cri

Are Biometrics the Answer?

Image
Many believe the use of biometrics can replace passwords. We've all been lectured about the perils of weak passwords, but creating secure, complex passwords is tricky and ultimately, they aren't easy to remember. For some time now, many in security circles have been promoting the use of biometrics. Whether that involves using your fingerprint, iris, ear, face, or heartbeat, or something else that is uniquely yours and yours alone, the choices appear to be endless. Ron Dichter of Forbes notes that there is a growing faction that questions whether the use of these biological bits and pieces is the best way to safeguard our privacy. One of the concerns surrounding biometrics has to do with how securely this information is stored by other agencies. Dichter points out that if your password is compromised, you can simply create a new password. But, what happens if someone finds a way to recreate your iris or fingerprint? We've all seen the movies where the bad

New Devices Ship with Malware

Image
There's a lesson to be learned here. IBM and Lenovo recently issued an alert notifying users of the Storwize storage systems that USB flash drives provided to customers included something besides the initialization tool they may have been expecting. The alert warned users that some of the USB flash drives also contained malware. Kevin Townsend of Security Week explains that the malware on the USB drives is old and would probably be recognized and neutralized by most up-to-date antivirus software. Since the Storwize storage systems are designed for business, individual users should not be affected. The alerts and Townsend's article provide additional information about how to recognize and neutralize the malware. However, as Townsend points out, it is not reassuring when malware is distributed by manufacturers. In this case, the problem has been easy to fix, but that may not always be true in the future. Supporting Web Links IBM Storwize for Lenovo init

I Spy

Image
Google introduces something new. Typically, the Google I/O developer conference always has at least one or two new things that make people say "Wow!" The I/O conference this May was no exception. Over time, Google has gone from being a simple search engine to championing mobile computing. But, this year, Google tells us the future is virtual and augmented reality (VR and AR). With the introduction of Google Lens, it looks like the company is on the right track. Tess Townsend of Recode provides an overview of the things Google Lens can do. Google Lens isn't a physical object, rather it's a feature that uses artificial intelligence (AI) and augmented reality to provide new ways of doing things. When Google Lens is incorporated into Photos, users can not only take a picture of something, Lens will provide more information about what you're viewing. Point your smartphone at a restaurant's storefront and Lens can pull up its menu. Take a pictu

What's Next?

Image
Some people think the smartphone's days are numbered. Every product has a life cycle. In the case of technology, it can sometimes seem meteoric. A product is launched and quickly finds a place with the early adopters. It then becomes popular with mainstream users, but eventually, a product begins to age and falls out of favor. In this ZDNet article, that's what Steve Ranger thinks is starting to happen with the smartphone . Ranger isn't saying that smartphones are dead, or even that they will disappear anytime soon. But, he does think that smartphones are starting to peak and they may have reached the limit of what they can do. They are the poster product for digital convergence - combining features of phones, cameras, GPS devices, address books, and so much more. The question is, what will take the smartphone's place? Ranger thinks the answer may lie in the realm of augmented and virtual reality. But, what form this will take and what new obstacles w

Improving Your Home's Wi-Fi

Image
Sometimes a single router isn't enough. For many people, setting up a home network is as simple as connecting the modem to the router and the router to the computer. In the case of a hybrid or wireless network, the router needs to have Wi-Fi capability. But, if you happen to live in a larger home, or are setting up a wireless network for a small office, a single router may not be sufficient. One solution to this problem is to purchase additional equipment, such as a wireless range extender. Fahmida Y. Rashid of PCMag outlines some steps you can take to help improve your wireless signal . But, if these suggestions aren't cutting it, you may want to consider setting up a mesh network instead. This article from Daniel Falconer of Tested provides some background on wireless networks and explains the concepts of mesh networking . He also takes a look at some of the current devices on the market and discusses the pros and cons of using a mesh network. Supporting We

Fighting to Close the Digital Divide

Image
The battle to provide Internet access to everyone continues. The digital divide isn't just something that happens in third world countries. It's alive and well here in the United States too. One way of measuring the digital divide - those with access to technology and those without it - is by identifying the availability and speed of Internet access. While poor Internet access in rural areas is often attributed to the shortcomings of the physical components, such as old or insufficient infrastructure, more populous areas also have access issues. These problems often correspond with income levels within a community. Areas of cities and other communities with lower household incomes frequently have poorer Internet access too. Wired 's Issie Lapowsky takes a look at the efforts non-profit organization EveryoneOn is making to help provide low-cost Internet access . The group recently worked with the Department of Housing and Urban Development (HUD) to set up access for an a