Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Viruses
.
Show all posts
Showing posts with label
Viruses
.
Show all posts
May 12, 2018
Beautiful Virus, Huh?
›
So this is an image of the Tobacco Mosaic Virus. Yeah, I never heard of it either. It is a virus that attacks and destroys tobacco and ...
May 10, 2016
Creative Washing Sign
›
Ok, this is not your typical handwashing sign. Usually these signs that are mandated by health regulations in food establishments remind...
August 15, 2014
The Ebola Bomb {^}
›
Ebola is the "one of the most virulent microbes" to mankind--there is no known cure and it has a 90% mortality rate. The de...
March 1, 2013
Now That's Robot Clean
›
How many of you heard the phrase as a child, "Cleanliness is next to G-dliness"? Over the years, we've learned that germs ...
August 25, 2012
IT Security, The Frankenstein Way
›
Here's a riddle: When is a computer virus not a dangerous piece of malware? Answer: when it is hidden as Frankenstein code. The...
May 15, 2010
What’s Lurking In The Update?
›
In defense, it is a well-known principle that you determine your critical infrastructure, and then harden those defenses—to protect it. T...
April 15, 2008
“I Am Legend” and Enterprise Architecture
›
Sometimes, when we architect change, we can make mistakes and people and organizations end up getting hurt. In the movie I Am Legend, man...
April 2, 2008
Hacker Camps and Enterprise Architecture
›
One of the perspectives of the enterprise architecture is Security. It details how we secure the business and technology of the organization...
February 8, 2008
Internet Apocalypse and Enterprise Architecture
›
It is the 21 st century and we are a nation dependent on everything internet. We rely on the internet for communications, like email, text ...
January 29, 2008
Intrusion-Prevention Systems and Enterprise Architecture
›
Firewalls have traditionally been used to “wall off” the enterprise from computer attack, but now intrusion-prevention systems are augmentin...
December 11, 2007
Information Security and Enterprise Architecture
›
Information security is generally considered a cross-cutting area of enterprise architecture. However, based on its importance to the over...
›
Home
View web version