Jim Atkins, thedosmann, is a website programmer who started programming in the early 90's. He has worked professionally as a Manager of Technical Services, Website developer, hosting provider, and consultant since 1995.
Within the next few years, we will see an exponential growth in micro touch screen devices that can be unfolded from 3x6 to 12x6 (and other sizes) to form a touch screen. These devices will have no hard drive, no CD/DVD, no memory other than an ultra-thin EPROM, and no external ports.
When talking about the Semantic Web there are a few premises one must acknowledge. One premise is that any data exchange on the internet is originally initiated by a human. There is no information retrieval without a request for that information and that request can be directly tied to a human request for the information.
National Registry Of WI-FI Connections to combat cyber threats that we face in today's ever evolving internet. One of those threats, that has not received a lot of attention, is the growing number of Wi-Fi hotspots that millions of cell phones connect to daily.
Twitter is fighting back against cyber-crime and malicious activity in its recent actions toward Tor users and Isis.
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through PHP applications.
The following is a list of IPs that ignore robot.txt that I have collected over the past year or so.
As the Sony hack investigation unfolds, revelations regarding its possible origin, type of hack used, and the damage it is purported to have caused, are starting to be revealed.
In programming code it is possible to theorize about several aspects of code flow and dependency through coding models. One such model is the Actor Model.
Google is pioneering another innovation which may someday replace the need for passwords. The device they are introducing is a pluggable USB device that acts as the authentication mechanism to login. By inserting the device into a USB port and touching it a process is started that authenticates the user through that physical device.