Media subscriptions – Where do you spend your media dollars?

A recent article in the Wall Street Journal about Bloomberg charging for access to their content reminded me digital content providers are competing for my wallet-share. In 2015 I cut the cord with cable/satellite and haven’t regretted it. Now, the digital content I consume for video is based on month-to-month subscriptions. I choose the content valuable to me or that Read More …

Right Sizing Advertisements

Advertisement cat-and-mouse. For the record, I use an advertisement blocker extension in Google Chrome already. I don’t mind advertisements, because I realize they are necessary to promote products and services that drive the economy (the 4 Ps!). But let’s be honest. The placements of advertisements can be annoying when they disrupt the content of a broadcast, web page, place, or Read More …

Targeted ads and your privacy

A large portion of my time at work managing Information Technology is spent handling security and availability of data. The number of compliance controls has sharply risen in recent years as a direct result of the publicity of data breaches and high profile data theft. Quite frankly, security and availability compliance is a bit chaotic right now with new job Read More …

The local library and my reading habit

Alexandra Alter wrote an article in the NY Times this week about technology and our reading habits. Alter’s piece does a good job of reviewing differences between print and electronic readers as well as some changes in recent years in the publishing industry.  Like Alter, I prefer eBooks because of the convenience, searchability, and portability. But the base audience in Read More …

Password Management System

How do you manage your passwords? Electronic password managers were created with the goal to help all of us have a more structured approach to storing and retrieving our passwords. But not everyone uses electronic password managers because they don’t know about them, don’t trust them, or because they require extra steps when it is time to authenticate with a Read More …