Recurrent Patterns
Recurrent Patterns is a venture exploring strategies and insights around leading-edge companies, technology and cultural trends. Vaclav engages with leaders, entrepreneurs, scientists, authors and others who can share their perspectives in long-form conversations.
For regular updates sign up here.
The distance between your wrist and pocket is exactly $300
What just happened? Did we suddenly move to a new universe where spending minimum $300 on a gimmicky technology gadget is normal? Actually that isn’t new at all – the gadgets seem to change with the season. It seems as though the latest “it” gadget with a $300 price tag can easily go to $15,000 for the fancy version – and this device likely won’t last for more than 3 years!! Even if it does, it will have become obsolete.
50 Shades of Samsung – Privacy, Security or Convenience?
Samsung has been very naughty. And not the 50 shades of Grey kind.
Over the last weekend we discovered that Samsung has been playing “peeping Tom” in our homes. Through privacy disclosure, Samsung revealed that its TV sets might listen to our conversations and even share them with third parties. All the pundits and defenders of privacy are now racing to find the right adjectives to properly scold Samsung and demand higher levels transparency from the company.
Cloud Computing A Myth?
For enterprises to move their networks in whole or in large part to the cloud, we will need to see big changes in terms of how organizations can effectively protect their data online through a reliable system.
Getting Rid of the Google Website Warning
Google’s Safe Browsing technology examines billions of URLs per day looking for unsafe websites. Every day, it discovers thousands of new unsafe sites, many of which are legitimate websites that have been compromised. When Google detects unsafe sites, it shows warnings on Google Search and in web browsers. You can search to see whether a website is currently dangerous to visit.
Access Management and Protecting the Network
Access management procedures and tools can help organizations ensure network security as only trusted people have authorized access to specific parts of the network. Ideally, that authorization can be revoked at the click of an IT administrator's mouse.
Marines Attack Social Media Site Security Holes
Price Floyd, the Pentagon's newly-appointed social media czar, seems awfully skeptical of the Marines’social media lockdown, suggesting that security concerns must not trump using social networking tools if the activity will contribute to enable “business”.
If you are over 50, we can't let you die
Data storage isn’t just about filing your documents away and forgetting them. It requires long-term planning. Right now, every upgrade and new development in software and hardware is just taking us further into uncharted territory with no record to show us the way.