Posts By Bob Gourley

New CWM teased, BioHackers and more!

Rom Manager and ClockworkMod are two of the Android rooter’s best friends Here are today’s top tech stories. A new ClockworkMod recovery for Android has been teased. This one allows you to create flashable zips of your ROM and its ROM settings to share with friends. This will allow your tweaks to be shared amongRead… Read more »

Addressing Cyber Instability Executive Summary

After two years of intensive study and research, the Cyber Conflict Studies Association is preparing to release their book-length monograph on “Addressing Cyber Instability.” Last month, the CCSA released an executive summary previewing the work, which is available for download. The impetus for “Addressing Cyber Instability” is that, though cyberspace has become indispensable and irreplaceableRead… Read more »

Distributed Common Ground System “Not Suitable,” Army Integrated Network Operations Center, and More

Here is today’s federal cybersecurity and information technology news: An internal U.S. Army memo described the Distributed Common Ground System used to detect roadside bombs and predict insurgent activity limited and “not suitable.” More here. A recent survey of security experts showed little confidence in government’s ability to provide cybersecurity for critical infrastructure. More here.Read… Read more »

How I use Pocket to track technology

Pocket offers a host of saved reading capabilities You may have heard of Pocket, actually, you’re more likely to know it in its former incarnation, Read It Later. I have recently started using Pocket to track interesting stories for my daily roundup. The setup is easy – I made an account, installed the Chrome browserRead… Read more »

Implicit Learning Passwords Are Like Riding a Bike

Cryptography recently joined forces with neuroscience to propose a groundbreaking innovation in authentication. Hristo Bojinov of Stanford University along with Daniel Sanchez and Paul Reber of Northwestern, Dan Boneh of Stanford, and Patrick Lincoln of SRI published a paper on “Designing Crypto Primitives Secure Against Rubber Hose Attacks.” Passwords, encryption keys, and other methods ofRead… Read more »

Holograms for the TSA, Mobile Device Management for the DOD, and More

Here is today’s federal cybersecurity and information technology news: The Transportation Security Administration is seeking holograms or video projections of customer service representatives to communicate with travelers in at least English and Spanish. More here Mark Giuliano, executive assistant director of the Federal Bureau of Investigation’s national security branch, testified before the House Appropriations subcommitteeRead… Read more »

AOKP Goes Nightly, Galaxy Note 10.1 Unveiled and more

The Nexus D was designed and created by a Galaxy Nexus user AOKP (my favorite Android ROM) has released details that they (much like CyanogenMod) will start posting nightly updates for their supported devices. If you have not yet moved to AOKP for your daily driver, I would greatly suggest checking up their website. ViaRead… Read more »

EPA Breach Compromises Almost 8,000, DARPA Seeks Smart Sniper Scopes, and More

Here is today’s federal cybersecurity and information technology news: A breach of the U.S. y has compromised the personal and banking data of 5,100 current employees and 2,700 “other individuals.” More here. The Defense Advanced Research Project Agency awarded a contract for a “compact observation, measurement, and ballistic calculation system” for snipers. More here. TheRead… Read more »

Government Big Data Solutions Award 2012

As a reader of CTOvision.com you are aware of the interesting situation we face with data today: The amount of data being created is growing faster than humans can analyze, but fast analysis over data can help humanity solve some very tough challenges. This fact is moving the globe towards new “Big Data” solutions. GovernmentRead… Read more »