Do You Really Think Any of the On-line Services Keep Your Identity Information Safe?

Maybe the TJ MAXX breach didn’t scare you because you don’t shop there. Maybe the Target breach didn’t scare you because you don’t shop there. Maybe the Yahoo breach didn’t scare you because you never opened an account. The RNC data breach probably didn’t scare you, even though Time and other outlets report the information …

Continue reading ‘Do You Really Think Any of the On-line Services Keep Your Identity Information Safe?’ »

How Far We’ve Come – Pt. 6

As I started to get back into this I realized I skipped one final yet critical piece of the system. The backup script. I imagine some of you questioned where I got the csv files to import. As I said, one of the main reasons I went with Postgres all of those years ago is …

Continue reading ‘How Far We’ve Come – Pt. 6’ »

Dominionists Inside the Gates

We’ve all heard the stories about “shadow governments” and “puppet masters” pulling the strings from behind the curtain of Washington. Most of us have been conditioned to believe these stories come from conspiracy theorists who wear armadillo hats, line both dwellings and vehicles with aluminum foil to prevent eavesdropping, and have their fillings removed all …

Continue reading ‘Dominionists Inside the Gates’ »

The Ever Shrinking Definition of Fully Equipped

As a traveling consultant I spend a lot of time in extended stay type hotels. Unless I’m traveling to a client site where I’ve worked previously I tend to spend the first month or more at these types of places. It is best to leave both yourself and the client an escape hatch. Sadly many …

Continue reading ‘The Ever Shrinking Definition of Fully Equipped’ »