Showing 224 results for the search term "John McDermott".
One of my favorite tools to use when I am facilitating a meeting is PO, which is short for provocation operation. Edward de Bono coined the word PO for use in the lateral thinking process. The idea of PO is to help move thinking or a discussion onward by allowing out-of-the-box thinking. It is used to introduce an […]
Amazon announced in a blog post on April 19 that they had made their natural language tool, Amazon Lex, generally available. First of all, Amazon Lex is – according to the Amazon website – “a service for building conversational interfaces into any application using voice and text.” Lex provides natural language understanding and speech recognition; […]
Security expert and writer Brian Krebs was the victim of a distributed denial of service attack that used the Mirai botnet. His site discusses the source code used on the compromised computers. Others have provided analysis of the code. The software is used to infect Internet of Things or IoT devices. Examples include webcams, DVRs, […]
Two-step or two-factor authentication provides better security than a single factor. For instance, a fingerprint and PIN is stronger than either alone. Security professionals generally divide authentication techniques into three categories: something you have, something you know, and something you are. Corresponding examples would be a token or an app on a smartphone, a password, and […]
Recently, I posted about basic permissions for Linux files; now let’s look at how to access those in a shell script. Testing file permissions is an essential part of enforcing an access control policy. Two common ways to test files for readability, writability, zero size and so forth are the if and the test. For […]