Her Name is Susan | Daniel Miessler
I lack the words, but I don’t need them. I sometimes realize that I’m hesitant to talk about my love here, and tonight is one…
I lack the words, but I don’t need them. I sometimes realize that I’m hesitant to talk about my love here, and tonight is one…
I inwardly smile when I hear the term “Unified Threat Management”. It means different things to different people, but to me it means consolidating the…
So everyone knows that UTF-8 encodes Unicode code points into eight bits, and UTF-16 encodes Unicode code points into 16 bits (or, two bytes), right?…
A friend of mine (I’ll identify him if he so desires) sent me the following email: I think this is an excellent observation. My first…
The über-tech-geek culture has a problem with tool obsession. Twitter, Friendfeed, Google Reader–these are all basics, but each of these have multiple competitors that the…
This is an exciting protocol. I want to use it to get my various services’ content into Friendfeed, and to Google Feedburner, and to my…
Scenario You have an Asterisk server behind a Check Point firewall trying to contact a VOIP provider located on the Internet Problem SIP requires that…
Evidently I’m not the only one who’s seeing what’s happening. I’ve been writing for years about how we’re approaching a volatile social situation due to…
I recently came up with a concept called Content Potential, which I define as the maximum level of popularity your site/brand can reach based on…
Fiber optic sensors have quickly become a cornerstone of modern technology. Renowned for their precision and versatility, they are used in everything from telecommunications to…
Liberals love to blame poor Black and Hispanic performance in American public schools on the lack of school quality, e.g. lack of updated textbooks, no…
The recent implementation of the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) program in late 2024 raises important questions about its applicability and…