Home > Shows > Recent > 2005 Shows > 2005/05/28 October 21, 2014 User: Visitor

Home
Shows
   August 8, 2009
August 1, 2009
July 25, 2009
July 18, 2009
Recent
   2009 Shows
2008 Shows
2007 Shows
2006 Shows
2005 Shows
   2005/01/01
2005/01/08
2005/01/15
2005/01/29
2005/02/05
2005/02/12
2005/02/19
2005/03/05
2005/03/19
2005/03/26
2005/04/02
2005/04/09
2005/04/16
2005/04/23
2005/04/30
2005/05/07
2005/05/14
2005/05/21
2005/05/28
2005/06/04
2005/06/11
2005/06/18
2005/06/25
2005/07/02
2005/07/09
2005/07/16
2005/07/23
2005/07/30
2005/08/06
2005/8/20
2005/8/27
2005/08/13
2005/9/03
2005/9/10
2005/9/17
2005/9/24
2005/10/1
2005/10/8
2005/10/15
2005/10/22
2005/10/29
2005/11/05
2005/11/12
2005/11/19
2005/11/26
2005/12/03
2005/12/10
2005/12/17
2005/12/24
2004 Shows
News
Links
Feedback
The Host
Technology FAQ
Site Map
Rules & Policies

Be A Guest on Tech Talk

My Account


Show Synopsis

We have many people who we have elected to represent us -- but do they??? Do they really understand the impact of they laws and rules that they effect? How do these laws this affect the development or implementation or progress of Technology.

This Weeks Guests

7:06-7:20 - Mark Palmer the VP of ObjectStore a division of Progress Software will join Craig to discuss RFID and how its implementation will affect the lives of everyone and how what the government does will have a positive or negative effect.

7:34-7:42 - Kirk Nahra an Attorney who specializes in healthcare, privacy and information security will discuss with Craig the effects of Gramm-Leach-Bliley and Sarbanes-Oxley Acts.

7:44-7:42 - Mario Almonte will join Craig to discuss the Patriot Act and its effects on us and on the development and implementation of Technology.

8:06-8:20 - Craig Lund of CareTouch Communications will join Craig to discuss the far reaching effects of the Health Insurance Portability and Accountability Act (HIPAA).

8:34-8:42 - Tim Hong will join Craig to discuss Hands Free Mobile Phone Software that will help you avoid some of the legal problems of mobile communications.

8:44-8:50 - Brad Mack of IGov will join Craig to discuss FIPS Encryption Standards and what those standards means to each of us.

For More Information

For more information on RFID check out these resources:

ObjectStore.com

RFIDJournal.com

Internet Tech Tip Of The Week

Some call them chainless bicycles. Others call them shaft drive bicycles. I call them no-mess, huge-fun, ride-forever-without-adjusting-a-thing bikes.

What are the advantages of shaft drive bicycles over chain bicycles?
  • Easier to operate: Simple twist grip shift is convenient, responsive and operates independent of pedaling so you can shift gears anytime, even at a complete stop.
  • Safer: No chain to fall off; no chain bite on clothing.
  • Cleaner: Axles and gears are fully enclosed - no grease/oil exposure to get on hands or clothing. Lower maintenance: Fully enclosed, durable bevel gears are protected from impacts, debris and the elements. Smoother ride: Fluid shifting and mesh gearing combine to create smoother pedaling and shifting.
  • Easier to transport: Easy loading and unloading without getting chain grease on hands and clothes. Lower cost of ownership: Increased durability and drastically decreased maintenance schedule means fewer service and repair costs.


Find out more: Dynamic Bicycles

Security Tech Tip Of The Week

The Windows Anti-Spyware security software is currently in beta-testing. It uses a library of more than 100,000 threats to identify potential problemss and make recommendations to users as to whether the questionable software should be ignored, quarantined, or removed.

The Microsoft program looks a the type of software (adware, software bundler, browser modifier, etc..) as well as the risk posed by the software when it makes recommendations to users about actions they should take. "The user ultimately makes the decision to keep or remove any software."

They look for software that practices deceptive behavior, which could mean problems involving providing notice of what's running on the user's machine or problems over control, users, and communicates personal information without explict consent, that circumvents or disables security software, and that slows or damages a computer's performance, reduces productivity, or corrupts the operating system.

Microsoft highlights six types of "malware" software that demonstrate illegal, viral, fraudulent, or malicious behavior. They include creating a back door to gain access to a program or computer system, dialers that get in and dial numbers without a user knowledge, and phishing software that enters a legitimate E-mail message or appears as a real Web site, and then scams the user for information that could be used for identity theft.