Classic Big Data Analytics: Exploding Manholes and Fires in Illegal Conversions Exploding Manholes Consolidated Edison, “Con Ed,” an investor owned utility in New York City, has about 250,000 manholes in the City, about 50,000 of which are in Manhattan. The manhole covers are cast iron, a few inches thick, andRead More
AI has become an overnight sensation. But like other overnight sensations, it has taken years to get there; 73 years since 1950 when Alan Turing described The Imitation Game, better known as the Turing Test: “A computer would be said to be intelligent if and when a human evaluator, afterRead More
Phishing is cyber criminals, state actors of hostile governments, sending emails persuading you to provide your personal information, intellectual property, or cash.   Traditional cyber security tools include signature based anti-virus, firewalls, and a Virtual Private Network, VPN, for your mobile workforce. Today we add multi-factor authentication, MFA, and website orRead More
  , , ,
The Americans with Disabilities Act (ADA), enacted in 1990, marked a significant step towards eliminating discrimination based on disability. While initially addressing physical spaces, the ADA’s reach has extended to the digital realm, especially concerning websites. However, as we venture into 2024, the application of ADA regulations to websites remainsRead More
Zero Day Exploit targeting Google Chrome, MS Edge, other Chromium browsers – and Emergency Fix We just learned of a “Zero Day Exploit” targeting Chromium browsers, including Google Chrome MS Edge, and various cell-phone browsers. Google and MS have released patches. This effects computers running MS Windows and Apple MacsRead More