If you have been reading this blog long you know I don’t like software or programers. I do use the stuff so I went to the panel on using the Audrino computer.
It’s a cute little computer but quite powerful.
I won’t bore you with the details but I fascinated my lab partner my typing in the code from the booklet and having the complier screw up. I copied it right out of the book.
The panel on computer security was one of the best of the convention.
One of the panelist relates an old science fiction story where a man comes to an abandoned town. The town is very nice and run by a computer. The man goes into a house and it’s nice. The house cook the man a meal but the man wants to go outside. The computer says OK but after I worked so hard to make the meal. The man runs away from the passive aggressive computer that has driven everyone else out of the town.
Panelist stated that countries around the world will not use U.S. security programs if they think there are back doors in the programs, even if it’s a government required back door.
He feels that the only way to go is an open security organization with no secret black box. Other countries could go with that and they would know that everyone would be trying to crack or break into the security program.
Someone mentioned watching the program ‘The Good Wife’ for a more realistic computer security view.
The Internet of Things (IOT) means a hacker can do suicide bombers without the risk of blowing himself up.
Panelist recommended Last Pass or One Pass as password programs.
Life Hacker was mentioned as a good VPN (virtual private network) provider. Many people in the room raised their hands when asked if they use a VPN.
Write on, draw on. Professor Hyram Voltage