Welcome To My Website!
With this site I want to contribute to bridging the gap between ICT, business and life while pondering on the interesting issues in between.Search in the articles:
-
Join 277 other subscribers
Visitors’ Geo Location
Tags in this blog
- 3D printing
- Albrecht Dürer
- Android
- Apple
- App Store
- Big Data
- Business
- Cloud
- Cloud computing
- Data transmission
- Digital native
- Digital signature
- Document
- DropBox
- Electronic signature
- Energy
- European Union
- Gaming
- Hackers
- Hacking
- Health
- HTC
- HTC Corporation
- IEEE Spectrum
- Information graphics
- Information technology
- Internet Marketing
- iPhone
- LED lamp
- Light-emitting diode
- Lucerne
- Macintosh
- MacOS
- Malware
- mandates
- Marketing and Advertising
- Mat Collishaw
- Mobile phone
- Open source
- Open Systems
- Optical Illusion
- Patent
- Patient
- Portable Document Format
- Privacy
- Privacy policy
- QR Code
- Robot
- Robotics
- Search
- security
- Smartphone
- Social media
- Social network
- Sun Microsystems
- Swiss ICT Award
- Swiss IT Magazine
- Swiss law
- Switzerland
- Telemedicine
- telemonitoring
- Turboprop
- Visual Art
- voluntary work
- web app
- WebOS
- Wi-Fi
- World Wide Web
- YouTube
- ZDNet
- École Polytechnique Fédérale de Lausanne
-
Recent Posts
- Your Pacemaker Is Tracking You From Inside Your Body – The Atlantic
- Drones Used to Deliver Clinical Laboratory Specimens in Switzerland | Dark Daily
- Four-Armed Marimba Robot Uses Deep Learning to Compose Its Own Music – IEEE Spectrum
- Why NotPetya Kept Me Awake (& You Should Worry Too) | tisiphone.net
- First Map-Based Car Navigation System Debuted 14 Years Before GPS – IEEE – The Institute
- Why Georgia Tech Built a Tarzan Robot That Swings Around on Wires – IEEE Spectrum
- This Hard-to-Destroy Drone Goes From Rigid to Flexible When It Crashes – IEEE Spectrum
- Exhale and Drink Up! [Researchers accidentally turn carbon dioxide into ethanol]
- Frightening!–Hackers Remotely Kill a Jeep on the Highway
- Great Book: Tim Cole, Ossi Urchs—Digital Enlightenment Now!
- New Exoskeleton Lets Paraplegic Walk
- Smart Cane with Facial Recognition and GPS
Top Posts & Pages
- Your Pacemaker Is Tracking You From Inside Your Body - The Atlantic
- Drones Used to Deliver Clinical Laboratory Specimens in Switzerland | Dark Daily
- Four-Armed Marimba Robot Uses Deep Learning to Compose Its Own Music - IEEE Spectrum
- Why NotPetya Kept Me Awake (& You Should Worry Too) | tisiphone.net
- First Map-Based Car Navigation System Debuted 14 Years Before GPS - IEEE - The Institute
- Why Georgia Tech Built a Tarzan Robot That Swings Around on Wires - IEEE Spectrum
- This Hard-to-Destroy Drone Goes From Rigid to Flexible When It Crashes - IEEE Spectrum
- Exhale and Drink Up! [Researchers accidentally turn carbon dioxide into ethanol]
- Blog
- Publications
Previous Posts
Blogs I Read
Google Translate
Note: Google Translate is reflecting a best effort. The translation might help you to understand the content in your language but is most likely not producing good language.
Note 2: Clicking a language will in all cases bring you to the homepage. From there (within Google Translate) you can navigate to the other pages or posts in your selected language.
Subscribe to ponderingtechnology
My recent tweets
- RT @7_gscheid: Der Mann ist positiv, lebt nun im Keller und ich finde, ich mach mich als seine Pflegekraft ganz hervorragend. https://t.co/… -- 8 months ago
- RT @ralphruthe: Schönen Abend noch. !B https://t.co/iNbEsPqw3G -- 1 year ago
- Excellent article--take your time to read this: However the Pandemic Will End flip.it/jvKJPe -- 2 years ago
- Bats are not to blame for coronavirus. Humans are cnn.com/2020/03/19/hea… -- 3 years ago
- Opinion: An open letter to my peers partying on the beach cnn.com/2020/03/19/opi… -- 3 years ago
- We are looking for a Validation Engineer for Computer System Validation Work. See lnkd.in/eSZEpmG -- 5 years ago
- Let's do our homework first before we embrace the Internet of Things (IoT): smart-industry.net/editorial/ -- 5 years ago
- Frightening how elections are being influenced by Big Money. See the Guardian article "Follow the data" tinyurl.com/lwgexby -- 5 years ago
- Big Brother im 21. Jahrhundert: Diese Firma weiss, was Sie denken bazonline.ch/25805157 -- 6 years ago
Category Archives: Security
Hackers join McAfee to combat electric vehicle viruses | SmartPlanet
SmartPlanet just published an interesting article that I would like to share with my readers: Hackers join McAfee to combat electric vehicle viruses | SmartPlanet. Here the first paragraphs of the article: “A team of hackers working for security company … Continue reading
Google Drive Arrived: Cloud Storage And Privacy/Security
Cloud Storage is not any longer just for the big guys. This morning when I updated my Android phone a new app was loaded called Google Drive. It explained that it was part of Google Docs and I downloaded it. … Continue reading
Posted in Cloud Computing, Internet, New and Noteworthy, Security, Social Media, Web
Tagged Android, DropBox, Google, Google Docs, Google Drive, security, Wuala
1 Comment
Check Your Mac For The FlashBack Trojan Horse
From an article in today’s Basler Zeitung: Backdoor.Flashback.39 is said to be the most dangerous malware that has been developed for the Mac. It turns your machine into a botnet node becoming remote controllable. Most likely purpose will be sending … Continue reading
IT’s Seven Worst Addictions (And How To Cure Them)
Dan Tynen wrote an interesting article in InfoWorld on IT’s worst addictions. I want to share an excerpt of this article with you. Please read the full article if you can spare the time. Devoting my business life to interpret … Continue reading
Posted in Management, Security
Tagged Information technology, InfoWorld, Jargon, methods, software development
1 Comment
Google’s New Privacy Policy: What Has Changed and What You Can Do About It
Wired.com today published an article from a blog at webmonkey.com: Google’s New Privacy Policy: What Has Changed and What You Can Do About It | Webmonkey | Wired.com. I posted an update towards the end of this article describing “Tom Henderson’s … Continue reading
Posted in Identity Management, Internet, Security, Social Media, Web
Tagged Gmail, Google, Privacy, Privacy policy, Search, Tor
1 Comment
Check Your DNS Settings Now! Combat DNSChanger!
(Reposted from C|net and other sources:) Note: Following March 8, 2012 your computer if infected will lose internet connectivity and — if worst comes to worst — be redirected to malicious sites. The malware scam DNSChanger that has affected numerous computer … Continue reading
Posted in Internet, Security, Web
Tagged DNS, DNSChanger, Domain Name System, Federal Bureau of Investigation, MacOS, Malware, Trojan Horses, Windows
Leave a comment
Act Now: Set Your LinkedIn Privacy
Retweeted from several messages that I received: In case you don’t know it, without attracting too much publicity, LinkedIn has updated their privacy conditions. Without any action from your side, LinkedIn is now permitted to use your name and picture … Continue reading
Posted in Internet, New and Noteworthy, Security, Social Media
Tagged LinkedIn, Privacy, Social advertising, Social media, Social network
3 Comments
How to Back Up Your Social Media Accounts
Now that we learned to make the occasional backup of the files on our computers using external hard disks and — the audacious ones among us — using cloud services (BTW: check out Wuala for backup. Files get encrypted on … Continue reading
Posted in Cloud Computing, Security, Social Media, Web
Tagged Backup, Cloud computing, Data center, DropBox, Facebook, Hard disk drive, Social media, Twitter
1 Comment
New EU Directive Might Reshape the Clouds
As reported in Silicon.de, in Experian.it and in other sources, the European Commission is planning to release a new directive on data protection, which will affect the Cloud Computing industry. Viviane Reding, European Commissioner for Justice, Fundamental Rights and Citizenships … Continue reading
New Security Threat: Infected QR Codes
Tod Wasserman recently warned on “Mashable Tech”: “Be careful the next time you scan a QR code, because it might just cost you money and wreak havoc on your smartphone. “That’s the warning from Kaspersky Lab, which has noticed the first … Continue reading
“You Have Zero Privacy Anyway — Get Over It” (Really?)
Scott McNeally has been quoted many times with this (in)famous phrase from 1999. But as Steven Cherry discusses is his podcast (mp3) The Car as Informant – IEEE Spectrum “even he (Scott) would be surprised at the extent to which we can now be tracked, … Continue reading
Posted in e-Health, Identity Management, Internet, Security, Social Media
Tagged Federation, Information separation, Kantara Initiative, Liberty Alliance, Privacy
4 Comments
Greatest Threats to Cloud Security
Experts explain greatest threats to cloud security. (NetworkWorld) The article starts: Cloud security threats come in all shapes and sizes, so we asked eight experts to weigh in on what they see as the top threat to cloud security. The answers run … Continue reading