Saturday, January 31, 2015

Tabula Rosa Systems Blog Of The Day - Euqual Internet And Equal Education - They Are Interrelated

Lydia Dobyns 
President and CEO, New Tech Network
Huffingtonpost.com 1/30/2015
In his 2015 State of the Union (SOTU) speech, President Obama said, "My only agenda for the next two years is the same as the one I've had since the day I swore an oath on the steps of this Capital -- to do what I believe is best for America."
What on earth makes us believe there is a reason to "hope" let alone "believe" that in his last years as President, with both houses controlled by the opposite party, the President will be able to see some of his most innovative programs pass through Congress, especially education initiatives?
Obama said:
By the end of this decade, two in three job openings will require some higher education...And yet, we still live in a country where too many bright, striving Americans are priced out of the education they need. That's why I am sending this Congress a bold new plan to lower the cost of community college to zero. Forty percent of our college students choose community college. Two years of college becomes as free and universal in America as high school is today.
Last week, I wrote about the President's Community College proposal (free community college) and asked where the estimated $60B in federal funds for this program will come from.
The President has proposed free community college for students who maintain C+ grades AND make consistent progress towards graduation. I reiterate these questions -- why do we think more under-represented students will enroll and persist in college when tuition is only a portion of the cost of a college education? Could we use this to launch a meaningful policy-centric discourse around the factors that currently impede or prevent students who want to attend college from pursuing this path? How do we know that high school is truly preparing students for college? How are community and four-year colleges ensuring that undergraduate programs are relevant to employers?
The bottom line here: What needs to change so that we ensure all children have access to a quality K-12 education? And what more can be done to make the value of a high school and college diploma relevant and meaningful in today's economy?
Obama's SOTU speech also included mentions of a "free and open Internet" and said, "extending its reach to every classroom, and every community..."
The lack of broadband access for all students is a significant challenge in the United States, and a piece of the "equal access" equation. The promise of equal access to quality public education in 2015 means equal access to high-speed Internet with easy and persistent access to web-based learning resources for students and teachers.
While Internet and technology access by themselves are not silver bullets, the absence of these critical resources are real "barriers to entry" for students around the country. This is especially true for rural communities where students do not have the opportunity to travel or experience diverse cultures. Broadband access allows students to go beyond the classroom and outside borders of their communities. With high-speed Internet, these schools can provide access to resources that give all students a chance to connect to others, to dream, to learn and to imagine.
While we tend to focus on the access issue as critical for students, let's remember that the adults who work tirelessly to facilitate learning for our children also need to be supported with access to technology paths  -- to learn and dream for themselves  -- so they can model what a lifelong love of learning looks like. Maybe our elected politicians could use a little lesson in learning how to learn?
  =================================
**Important note** - contact sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Technical Term Of The Day - 802.11u

 
 =============================================

From whatis.com
802.11u
802.11u is an amendment to the IEEE 802.11 WLAN standards. The 802.11u specification, which was ratified by the IEEE in February 2011, facilitates interworking with external networks by allowing Wi-Fi client devices to learn more about a network before deciding to join it. Network discovery and selection is facilitated by the Access Network Query Protocol (ANQP), which comprises elements defining the services offered by an access point.

An 802.11u-capable device can take advantage of Hot Spot 2.0. Hotspot 2.0, also called Passpoint or Wi-Fi 2.0, was developed by the Wi-Fi Alliance and the Wireless Broadband Association to enable the seamless handoff of traffic between cellular and Wi-Fi networks. If a subscriber is in range of at least one Wi-Fi network, the device will automatically select a network and connect to it. 

Notable features of 802.11u include the transmission of pre-connection information to prospective users that defines the type of network offered (private, free public, chargeable public, emergency, etc.) as well as the venue type (educational, residential, business, vehicular, etc.). Other benefits include an enhanced data transfer rate (DTR) and service on demand.
  =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
 ...........,.






Friday, January 30, 2015

Tabula Rosa Blog Of The Day Net Neutrality; What Does It Really Mean for the Future of the Internet?

The practice of Internet Neutrality is still in question...and still in jeopardy. I will continuing to publish blogs about this as long as this problem exists. It is the responsibility of all netizens to follow these developments and do all they can to maintain a free access Internet. It is in everybody's interest to do so. Below is yet another article which speaks to this point.
===========================================

 Net Neutrality; What Does It Really Mean for the Future of the Internet? 
·         January 28, 2015 dataeconomy.com
·         Written by: Anuradha Santhanam
 
Net Neutrality discusses the openness of the internet; the fact that all internet access should be equal, neutral irrespective of service. All data should be equally accessible across users, speeds remain unregulated and throttled, and among other things, all services be equally accessible across and within networks. This, however, is not the case in several countries across the world. Service providers intend to, and in many cases, have effectively divided the internet into ‘fast’ and ‘slow’ lanes: structuring customers’ speeds and access in line with the amount they pay ISPs.
In the United States of America, Comcast has been in the news for its repeated violations of the principles of Net Neutrality. The USA’s Federal Communications Commission’s Open Internet Order promoted and sought to enforce the principles and ideals of net neutrality on Internet Service 

Providers, who could not be permitted to charge selectively for services and provide selected access.
Comcast, which is looking to acquire cable content provider Time-Warner, could potentially become both content creator and provider. It charges content provider Netflix high fees in order for consumers to access the service via Comcast’s network at speeds acceptable to consumers.
It is hoping (as of January 2015) to convince the FCC to create a net neutrality exemption allowing it to still charge Netflix.
FCC chairman Tom Wheeler said earlier this month that he will move to protect Net Neutrality by reclassifying Internet-access service under Title II of the Communications Act. This would mean it would mean internet service would be classified as “telecommunications service,” subject to tighter regulation, a change from its earlier status as a lightly regulated “information service.”, a necessity to promote the open, fair architecture of the internet and ensure it is not compromised.
The absence of net neutrality has serious ramifications; these may be economic, they may be technological, they may be related to personal freedoms.
Should a firm like Comcast, [which also owns NBC and is acquiring Time Warner] gain an absolute monopoly from its current existence as part of an oligopoly, it spells several problems.
First, this would make a firm that is content provider, creator and distributor at the helm of being able to grant selective access to this content to its consumers, at any price it saw fit.  Other content providers [such as Netflix] are already being charged in order for their services to be provided to a certain standard, while content provided by firms under Comcast’s wing are available at this standard at no cost, ultimately only benefitting the firm and shutting out external activity.
Providing unequal, discriminatory access to the internet can ultimately reduce participation on the web, leading to a form of stifling; those who cannot pay for better access to the internet must simply be content with not having their voices heard as loudly; several studies have shown dwindling internet use at lower speeds.
In addition, ISPs may then subsequently choose to completely block certain services at their own discretion, leaving consumers few to no options, especially in places where certain providers are the only way for consumers to access the internet, which is no longer a luxury, but a utility in this technological day and age.   Several ISPs have, in the past, intentionally slowed down peering or P2P communication and sharing.
This violates the very foundations of the internet as a structure that permits equal access, free speech and the uninhibited sharing of information. If unchecked, all of the above could become an even more stark reality sooner rather than later, and this is why the fight for net neutrality is all-important.
  =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Technical Term Of The Day - Cloud Robotics

=======================================

Cloud robotics From whatis.com
Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.
Cloud robotics expands a robot's capabilities beyond its physical housing and limited onboard computation, memory and software. When computational or storage demands exceed on-board capacity, they are simply offloaded to the cloud, where the massive resources of a datacenter can supplement the robot's limited local resources. 

Cloud robotics also represents a significant advance for robot learning. Instead of having to use its own resources to solve a problem, a robot can simply download the information it needs from a shared library. A shared cloud infrastructure can also help robots coordinate work and be more efficient. The collaborative effort of 15 robots learning different parts of the same complex task, for example, might take minutes instead of hours. 

An important goal of cloud robotics is to create smarter, lighter and less expensive robots. The challenge of cloud robotics is to optimize cloud use for tasks that don't require real-time execution. A robot's motion control, which relies heavily on sensor data, requires local resources to be executed in real time. That same robot's object recognition capability, on the other hand, is well-suited for the cloud. With a Wi-Fi connection to cloud-based resources, the robot can access a vast library of known objects to identify things in its environment. 

Google's self-driving cars are often pointed out as an example of how the cloud can benefit robotics. An autonomous car not only accesses information from the cloud to validate the vehicle's location, it also gathers information about road and traffic conditions and sends that information back to the cloud.
 =================================
 =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Thursday, January 29, 2015

Netiquette And Translation Software - Remember Not All Things Are Translated

Translation software is making huge technology gains and will be part of all types of communication. We should not lose the need for Netiquette when we do use translations in email, Skype or any other application. There will be more on my blog in the future, but be mindful of Netiquette items you do have control

=======================================

Language Translation Tech Starts to Deliver on Its Promise

By Quentin Hardy from bits.com
January 11, 2015 7:00 am January 11, 2015 7:00 am 40 Comments
The tech industry is doing its best to topple the Tower of Babel.

Last month, Skype, Microsoft’s video calling service, initiated simultaneous translation between English and Spanish speakers. Not to be outdone, Google will soon announce updates to its translation app for phones. Google Translate now offers written translation of 90 languages and the ability to hear spoken translations of a few popular languages. In the update, the app will automatically recognize if someone is speaking a popular language and automatically turn it into written text.

Certainly, the technology of turning one tongue to another can still be downright terrible – or “downright herbal,” as I purportedly said on a test of Skype. The service also required a headset and worked best if a speaker paused to hear what the other person had said. The experience was a little as if two telemarketers were using walkie-talkies. 

But those complaints are churlish compared with what also seemed like a fundamental miracle: Within minutes, I was used to the process and talking freely with a Colombian man about his wife, children and life in Medellín (or “Made A,” as Skype first heard it, but it later got it correctly). The single biggest thing that separates us — our language — had started to disappear.

Those language mistakes are a critical part of how online products get better. The services improve with use, as so-called machine learning by computers examines outcomes and adjusts performance. It is how the online spell check feature became dependable, and how search, map directions and many other online services progress. 

“The program learns as you using the conversations,” is how Sebastian Cuberos, my new friend from Colombia, put it during our Skype call. “At this time, is pretty good.” The grammar isn’t perfect, but you know what he means.

Just a few thousand people are using the service on Skype. As it learns from them, it will bring in more of the nearly 40,000 people waiting to try the Spanish-English service. Even in these early days, it elicits the possibility of social studies classes with children in the United States and Mexico, or journalism where you can live chat with a family in Syria.

Google says its Translate app has been installed more than 100 million times on Android phones, most of which could receive the upgrade. “We have 500 million active users of Translate every month, across all our platforms,” said Macduff Hughes, the engineering director of Google Translate. With 80 to 90 percent of the web in just 10 languages, he added, translation becomes a critical part of learning for many people.

Automatic translation of web pages into some major languages is already a feature on Google’s Chrome browser. People using the browser can render a page that is in English into, say Korean. There are also 140 languages in which it is possible to change things like Gmail settings.

It is possible to set your email to languages like Klingon, Pirate and Elmer Fudd. Other options, like Cherokee, are more serious, and Google aspires to eventually have these as full translation languages. Google will also soon announce a service that enables you to hold your phone up to a foreign street sign and create an automatic translation on the screen.

Microsoft’s Bing Translation engine is used on Twitter and Facebook. Facebook, which also features communication across the borders of language by operating the world’s largest photo sharing service, also has its own translation efforts. It has also signed up thousands of people to a waiting list for Skype to offer other simultaneously translated languages, like Chinese and Russian.

Feeding the “corpus,” as linguistics engineers call their database of language, has become critical for some countries as well as for the sake of machine learning. Google, which uses human translation to initiate its service, recently added Kazakh after a government official went on television to ask people to help out. “People can ask very, very strongly that we put their language on the service,” Mr. Hughes said.

Still, some experts worry as machines look more deeply at individual uses of meaning through things like intonation and humor. What will it mean if, as with our search terms and our Facebook “likes,” these become fodder for advertisers and law enforcement?

“The technology is potentially magical, but the threats are real too,” said Kelly Fitzsimmons, co-founder of the Hypervoice Consortium, which researches the future of communication. “What would it mean to have a corpus of conversations after there is regime change, and a new government doesn’t like what you said?” 

Currently, Ms. Fitzsimmons said, just 1 percent of consumers consent to having their data recorded overtly. That is what people do when they help machine learning of translation, however, or when they use voice-based assistants like Siri. She thinks individuals will become better at managing their own privacy, and not outsourcing it to the providers of services. But for now, all kinds of information is surrendered for convenience.

Olivier Fontana, director of product marketing in the Skype project, says conversations are broken up into separate files before people check a translation for quality. “There is no way to know who said what,” he said. “The N.S.A. couldn’t make sense of this.” 

Mr. Hughes said Google was also careful about what it did with voice, in part because of potential issues around biometric security in case voice recognition replaced passwords. Besides, he said, “there is something to be said for having your translator be different – if I speak Chinese, I’d have a woman’s voice, so people know it’s a translation.”
 =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
 

Tabula Rosa Technical Term Of The Day - Canvas Fingerprinting

 
==============================================

Canvas fingerprinting (CPF)

Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers.

Canvas fingerprinting relies on standard HTML5 and JavaScript, using a website canvas feature that one might draw on or use to display graphs and charts. On some sites, this is a visible and usable canvas. Sites that use canvas fingerprinting, however, use a hidden canvas. Commands to your graphics processing unit (GPU) cause it to draw a string of text as a pixel-based image that is almost perfectly unique and individually identifying. Even completely identical hardware systems are almost always individualized through variables such as different browsers, driver versions, font settings and text smoothing settings such as anti-aliasing.

ProPublica, an independent newsroom, claims that five percent of the top 100,000 websites use canvas fingerprinting and of those, 95 percent use AddThis.com’s product. Examples of sites using canvas fingerprinting include United States and Canadian government sites, POF.com and many others.

Methods of avoiding canvas fingerprinting include using TOR and Chameleon browsers, Adblock plus, Noscript browser extension, DoNotTrackMe and just turning off JavaScript. The unfortunate aspect of most of these solutions is that they may change ones browsing experience.
 =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
==============================================

Wednesday, January 28, 2015

Tabula Rosa Systems Special Blog - National Privacy Day is 1/28/15



NATIONAL DATA PRIVACY DAY: THE FOUR MAJOR WAYS YOU PUT YOUR DATA AT RISK

Data Privacy Day, recognized each year on January 28, is an international effort focused on protecting privacy, safeguarding data, and enabling trust. Data Privacy Day encourages everyone to weigh the benefits and risks of sharing information, understand what their information can be used for, and take steps to protect themselves and their identities.
Here are the most common ways people put their personal data at risk:
  1. Using weak passwords. Are your passwords part of the worst passwords of 2014 list? This list was compiled by analyzing the passwords found in large data breaches. Do not choose an easy-to-guess password, and do not use the same password for multiple accounts.
  2. Keeping devices unprotected. If you are separated from your mobile device, you do not want anyone to be able to access all the data from your device, including data stored in your apps. Put your devices out of sight when you walk away from them and password-protect them.
  3. Sharing too much information online. From including your birthdate, phone number, and address in your social media profiles to posting pictures of when you are on vacation, sharing too much online can give people enough information to access your accounts or your home when you are away. Wait until you’re home from your trip to post pictures.
To help protect yourself and your family, start with these tips from the national cybersecurity awareness campaign, Stop.Think.Connect.™:
  • Secure your devices. Take advantage of lock screens, passwords, and fingerprint scanning capabilities to secure your smartphones, tablets, and computers.
  • Set strong passwords. Make your passwords hard to guess, and change them regularly.
  • Think before you app. Many apps request access to information stored on your mobile device, including your contact lists, pictures, and location data. Determine if you really want to share such information before downloading the app
  • Do business with reputable vendors. Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Attackers may try to trick you by creating malicious websites that falsely appear to be legitimate companies.
  • Customize the settings on your accounts. Many accounts include default settings that promote more information sharing. Check your account settings to ensure only the information you want to share is visible to those people you want to share it with. Use the National Cyber Security Alliance’s Check Your Privacy Settings page to get started.
For more tips on safer online behavior and how to protect yourself and your data, visit www.dhs.gov/stopthinkconnect.
HT204243HT204245 and HT204246, and apply the necessary updates. =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Security Alert - Vulnerabilities In Apple Products From US-CERT



National Cyber Awareness System:
01/27/2015 08:14 PM EST

Original release date: January 27, 2015
Apple has released security updates for OS X, Safari, iOS and Apple TV to address multiple vulnerabilities, one of which could allow a remote attacker to take control of an affected system.
Updates available include:
  • OS X v10.10.2 and Security Update 2015-001 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10 and v10.10.1
  • Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.1
  • iOS 8.1.3 for iPhone 4s and later, iPod touch 5th generation and later, and iPad 2 and later
  • Apple TV 7.0.3 for Apple TV 3rd generation and later
US-CERT encourages users and administrators to review Apple security updates HT204244, HT204243HT204245 and HT204246, and apply the necessary updates.
 =================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================