With the recent Heartbleed vulnerability blowing up in the news, it's a good time to remind everyone that good passwords, and good password hygiene, are critical for the long-term protection of you and your online accounts.
Like death and taxes, the rising price of energy of in the Aloha State is a constant that we have to live with. The other day I went over to Home Depot with the good intention of buying some energy-efficient light bulbs and power strips.
Seemingly out of the blue, Microsoft last week unveiled its Office for iPad productivity suite. While clearly a leader in terms of capabilities and functions among its peers, it is yet another salvo in Microsoft's battle to move the universe to its Office 365 cloud computing solution.
Since word broke last month that Target was ultimately breached through a connection it had established with one of its vendors, many businesses are taking a hard look at what kind of access they've granted to their own vendors.
Many folks, especially those who work for large businesses or government agencies, are familiar with sometimes infuriating password policies. While such policies may seem onerous, overbearing or even nonsensical, a good policy significantly improves an organization's information security.
Many folks can't wait for tax season to kick off at the end of January so they can file their tax returns and get their refunds. But there's another group of people who are anxious to get started on your taxes, too: scammers.
It's been six years since the Clean Energy Agreement called for an undersea cable. Since then, progress has been disappointing. We've been talking about the cable and the smart grid since the agreement was made.
Here's the second of our home office upgrade series for the new year. Suggestion No. 1 is to consider a wireless router upgrade. The logical question is, Why even consider a new router if the old one is working? Good point.
Software-as-a-service (SaaS) is now a highly prevalent phenomenon, used by businesses and government agencies large and small. Other information technology-related "as-a-service" offerings are also becoming more and more popular.
For many of us it was a particularly stressful holiday season when Target announced it had been the victim of a computer breach that exposed 40 million credit card numbers and an additional 70 million records containing customer names, addresses, phone numbers and email addresses.
The regents should make College Hill a place for the University of Hawaii faculty, not the president. So far, the keener we are for a president, the more we sweeten the pot. So we've been bidding against ourselves, and we've been paying too much.
It's Christmas, and Ala Moana is bristling with new smartphones with the best consumer technology ever devised. Should you step up or put it off? The iPhone is only 6 years old, but the new apps and sensors have given it functionality beyond even what Steve Jobs might have expected.
We've heard a lot of controversy about genetically modified organisms over the last few months, and this Christmas we thought it appropriate to feature a Maui-hatched company that could revolutionize raising organic food both here and on the mainland.
Cellphones are rapidly replacing land lines across Hawaii and the U.S. A survey by the Centers for Disease Control and Prevention last year showed that nearly 2 out of 5 American homes had cellular phones only. (The CDC tracks these statistics because it affects its health survey samples.)
It is commonplace nowadays for folks to be inundated with updates for their software applications, whether such applications sit on traditional computers or on mobile devices such as smartphones and tablets.
Last year's "Cyber Monday" — the Monday after the Thanksgiving holiday — was the heaviest spending day of the year for the third straight year, ringing up nearly $1.5 billion in online sales. It was the first time that online sales topped the $1 billion mark.
Software applications are numerous. However, there are a few you simply cannot live without. I would argue the PDF is one of them. First introduced in the early 1990s by Adobe Corp., by the end of that decade, the "PDF" (Portable Document Format) eventually became the industry standard.
One of the more popular software-as-a-service (SaaS) options is email. Many organizations, large and small, have moved their email to the cloud, and many more are considering such a migration. There are both business and technical concerns to take into account when making this decision.
This October marks the 10th anniversary of National Cyber Security Awareness Month, which was launched by the Department of Homeland Security and the National Cyber Security Alliance to promote awareness about using the Internet responsibly.
Recently I got wind of a website called thewirecutter.com run by local entrepreneur Brian Lam. The website is a sort of a Consumer Reports that recommends the creme de la creme of consumer and business electronics.
Windows 8 was released just more than a year ago, evoking a collective groan from IT professionals and users alike. While much of the rumbling was due to the restyling of the interface, there were several outright bugs.
More people today are worried about the growing amount of personal information about them available on the Internet, according to a recent study by Pew Internet, a Washington D.C.-based think tank that provides information on issues, attitudes and trends.
I've written about Ancestry.com in the past and think it's a great product for anyone interested in researching and creating a family tree. You can build the tree for free — you're charged only if you use the service's databases.
Our nation is facing a critical shortage of skilled workers in the cybersecurity arena. A recent study discovered that more than 80 percent of the cybersecurity professionals in the U.S. are over 40 years old, and analysts expect that the number of jobs in this field will increase 28 percent in the next seven years. As our aging workforce looks toward retirement, the nation should consider how to cultivate the next generation of cyberwarriors.
It's funny how we get attached to inanimate objects, but at a certain point, computers, printers, etc., outlive their "useful" lives. Recently I helped a colleague with his home office "makeover." It was clear his "appliances," from the computer on down, were in their death throes.
Last week I was in San Diego, helping the National Institute of Standards and Technology develop a framework to secure the nation’s critical infrastructure from cyberthreats. NIST, which is part of the U.S. Department of Commerce, was tasked by President Barack Obama to develop the framework when he issued Executive Order 13636 in February.
Of late, I sense push-back by a lot of people on so-called "technological advances." Once in a while, I'm happy to find technology that really does make life more enjoyable and my work easier to accomplish. I'm going to look at a couple of disparate items — both of which live in the cloud.
With the proliferation of so-called smartphones, folks are more and more dependent upon their mobile devices. In fact, many manufacturers want you to believe that your smartphone is a computer capable of making phone calls, as opposed to a phone with advanced capabilities.
Last week my wife took me to Istanbul for a long-awaited vacation. I was impressed by how advanced the country is and had intended to write a column about tech in Turkey. Soon enough, however, I was caught up in the dramatic events at Taksim Square.
On May 1, the Department of Homeland Security issued an alert warning of a pending cyberattack targeting high-profile U.S. government agencies and financial institutions. The initiative was dubbed "OpUSA" by its instigators,
Ransomware is a type of malware that some analysts predict will be the most prevalent in 2013. Hackers use it for a number of scams, including planting pornographic images on computers and "locking" them, making it impossible to use or shut down the devices without pulling the power cable.
Shannon Pierce is a striking person. She's tall, blond, smart and entrepreneurial. A former attorney with Wilson Sonsini, a top Silicon Valley law firm, she's now at Goodsill Anderson Quinn & Stifel, where she is counsel in the areas of technology transactions and intellectual property.
Cybersecurity threats are becoming increasingly targeted and sophisticated, which means businesses, individuals and government
need to be vigilant and proactive in deterring breaches that could be devastating.
It's time for a look into the future to see what technologies will make it this year. Last year we predicted that LTE, the real 4G cellular technology, would flourish. It's now a growing percentage of cellphone sales.
AMOOC is a free massive open online course. There are hundreds of MOOCs, many coming from the best schools in the country. MOOCs have gone global in the past year, and millions of students are taking them.
Facebook recently generated a lot of buzz when it unveiled its new search function "Graph Search." The new feature, which has been enabled for only a small list of beta customers so far, allows Facebook users to enter queries to find information about friends, friends of friends, or people who have public Facebook profiles.
When the holidays come it's all about family. At this time of year, I can't help but get a little misty-eyed when I think of my parents, grandparents, aunts, uncles and those in the distant past who made me what I am.
By now everyone knows what a phishing email is — one that attempts to lure you to a fraudulent website under the pretense of winning a prize, or claims it can help fix a problem with your online account.
In the fifth year of the Clean Energy Initiative, its progress is now being undermined by contention. Wind and photovoltaic give us 200 megawatts, but they, as well as the undersea cable, agricultural biofuel, liquid natural gas and geothermal, are in contention.
As it turns out, local kids are not only good at surfing. They shine when it comes to creating robots. Honolulu Community College students Harris Okazaki and Ryan Yamada, who participated in the 21st annual International Micro Robot Contest in Nagoya, Japan, made this evident.
The advent of social networking has provided a method for many businesses to advertise on the cheap. A social networking presence, however, is sometimes obtained unknowingly, and can be a dual-edged sword.
Hawaii has some tough problems: traffic congestion, the rail controversy, energy costs, the ravages of obesity and shrinking disposable income. Bicycles could be a broad solution, right under our noses.
As cloud computing matures, it's become pretty clear that the heaviest use of the technology is around Software as a Service, or SaaS. Many business functions are provided by SaaS, chief among those sales management, accounting and human resource management, including payroll.
Have you ever been surfing the Internet, minding your own business, when suddenly a pop-up appears, warning you that you have a virus? And, as luck would have it, the pop-up offers a downloadable tool that will cure your ills — for a small fee, of course.
The word "robot" used to evoke the 1920 play "R.U.R.," "Rossum's Universal Robots," by Karel Capek (from the Slavic "robota" for serf labor) and Isaac Asimov's 1942 "Three Laws of Robotics" (coining the term "robotics").
Imagine your phone rings one evening and the caller addresses you by name claiming to be from Microsoft (or one of Microsoft's partners). He says the company has detected a serious security problem on your computer and asks you to open your computer's event log.
As the University of Hawaii medical school was going up in 2002, Dean Ed Cadman recruited Duane Gubler, a world-famous researcher in tropical and infectious diseases, to come and build an infectious disease laboratory in Hawaii.
This fourth year of the Clean Energy Initiative is a good time for the Hawaii Energy Policy Forum to look at what's working and what's not. That's what HEPF will do at its fourth Clean Energy Day at Laniakea on July 6.
In 1955, student elections at Forest Hills High School were memorable. The front-runner for president was Chester Brewsky. The cheerleaders extolled his virtues; posters and pamphlets praised his name. He was wildly popular, even though no one seemed to know him personally.
The Print Replica of the newspaper is a page-by-page replica of the day's printed newspaper - including all stories, sections, photos and ads - not including advertiser preprints - in PDF like form. It can be viewed on your computer's web browser, iPad, iPhone and some e-Readers.
Let There Be Lei
There is something special about lei that goes beyond the visual and aromatic pleasure they invoke. Lei are living and wearable pieces of art that touch not just our senses, but our emotions. Read More »