Up Times
Up Times · February 2022
Worcester Country Club’s clubhouse in the snow, above. Wishing you happiness and good cheer this glorious time of year. Photo courtesy of Worcester Country Club.
For a bit more peace – According to the census bureau, online retail sales are up 7.5% from a year ago. There has been a similar, big and steady rise over the past ten years, so that now we’re about matching the online-shopping spike we were at during the lockdowns. And riding behind all the online sales are the rip‑offs.
If a deal is offered on a social media site or through an email, it’s best practice to not click the presented link. Instead if you really want to check out a bargain or item, go through the steps of opening a browser tab and typing in the domain name you want (e.g. type in bestbuy.com or nordstrom.com).
This inconvenience cuts down the chance of getting fooled a number of ways. These can range from not getting the item you expected, to having credit card information or cash stolen.
A red flag is an unusual online-payment-method request – like cash or a gift card. A couple was presented two options from an online seller: either additional processing fees for using their credit card or a discount for making a bank transfer, the latter of which deal they took. Their money ended up just gone.
And finally, organizations often pressure themselves to reconcile outstanding bills and pay other organizations by year’s end. This determination leaves them vulnerable to criminals attempting Business Email Compromise (BEC) attacks.
Cybersecurity Dive reports the FBI is showing a heightened [BEC] threat … “I think that businesses should be very leery of any changes in payment information for their vendors,” said [FBI agent] Mary Gleason.
Tom Barnes Is Promoted to Director of Client Services
He has a way of putting [tech] across so that it’s helpful to businesspeople
–Vice President Anna Darlagiannis-Livingstone
Tom Barnes has been announced as Director of Client Services after nearly five years at Bryley Systems. Tom has been responsible for improving Bryley’s periodic client review process among other innovations. Tom came to Bryley from non-tech fields – he holds a degree in psychology and worked in RV sales. He is a problem-solver and brings that skillset to the process of serving IT clients.
Tom not only has an acumen for tech, he has a way of putting it across so that it’s helpful to businesspeople, Vice President Anna Darlagiannis-Livingstone said. Because of how he relays information, they’re able to see how the tech will help them. Tom is also personable and reliable. These are necessary skills and among the reasons I feel Tom’s promotion is warranted … [4 min. read] Continue Reading >
Michelle Denio Named Director of Service Operations
“We love Michelle!” I hear that from so many clients
–Vice President Anna Darlagiannis-Livingstone
Michelle Denio has been named Director of Service Operations. Michelle joined Bryley in 2008. Her time in tech services and managerial roles gave her the ground on which to display the listening skills, tech knowledge and strategic thinking that have contributed to Bryley Systems’ evolution.
This new role is partly an acknowledgment of the work Michelle has put in to R&D solutions to meet clients’ needs … [4 min. read] Continue Reading >
Bryley-curated stories from around the internet:
Keeping up with the Joneses – CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart) need to keep changing to keep ahead of AI’s improving imitation of you and me.
But the newest versions are maybe less annoying than identifying bicycles. Newer CAPTCHA software is watching how you move a mouse and how you type. And you better believe this dataset is going to train the next smart machines … [7 min. watch] wsj.com
Troubling the cat – Microsoft head Satya Nadella praised Japan’s copyright laws, per Quantum Zeitgeist reporting, that permit companies to ingest and use copyrighted works for information analysis, including training AI models.
This strikes publisher Thomas Baekdal as unfair. Baekdal makes his case by comparing the ingredients of an AI result to the ingredients of a baked item. ChatGPT is being sued by a number of publishers for infringement of their raw ingredients.
Imagine if music-sharing service and found-to-be-copyright-infringer Napster had a Microsoft or Google or Apple bankrolling it? Would music listening be different today?
Just because the AI purveyors have already trained their models on the work of writers, coders and artists does that mean these and future creators will be out-of-luck going forward? Intellectual property is so Y2K … [2 min. read] linkedin.com
We are now getting our knowledge from a machine that does not understand the world –David Weinberger, a keynote speaker at the New England Regional Developers (NERD) Summit at UMass Amherst. In his talk, The World According to AI, he shows how we have historically defined ourselves according to our dominant tech.
One example: Isaac Newton described the universe in terms of a watch because that complex device was the ChatGPT of its day.
Later Henry Ford’s planning remade the automobile into an affordable item for everyone and his planning/top-down-leadership model worked without needing to change the style or color of the car for fifteen years.
In 1984 people were asking about the internet, should it have security built in? because people are gonna want that. Should it have a search engine built-in? because people are gonna want that. The answers came back, “no,” but that the internet should just do its foundational job of moving bytes of information around well. This allowed users to determine what the internet should be, case-in-point how the iPhone’s app store choices have made each phone in the image of its user.
Weinberger shares about a 2022 study in which AI discovered a correlation in the data between an eye condition and the propensity for a heart attack. He explains that the researchers had withheld all they knew about both these conditions and just gave the machine lots of data points. And the machine could see what we could not.
Weinberger explains that people tend to think in terms of broad knowledge and understanding, whereas AI is creating only based on the particulars of a lot of data points. It thinks in a way we don’t have the capacity for.
An application of AI’s particular thinking, Weinberger says, is regarding morality, which he shows is all about specifics. Our general principles, he says, are argued over for years. The interesting thing for Weinberger is how these valuable ways of thinking – broad knowledge and many data points – will interact … [1 hour watch] youtube.com
XKCD-inspired passwords re-examined – More than ten years ago there was a Randall Munroe XKCD comic that promoted using something like correct, horse, battery and staple to make what’s now commonly called a passphrase: correcthorsebatterystaple.
And though no longer the best, it’s still a pretty good technique (don’t use that actual, ten-year-published passphrase, of course). (This method is better than the common passwords or a spouse’s or pet’s name for sure.)
Criminals have several ways of breaking passwords, including dictionary attacks and brute-force attacks. The first is like it sounds: they try out different English word combinations. If they are unsuccessful they might try the brute-force method, which tries every character combination. So, in this video the Germany-based Security and Privacy Academy shows the relative strength against such attacks of different kinds of passwords, including the XKCD method.
Spoilers – it ends with a thrilling Bruce Schneier adaptation of the original method! [5 min. watch] youtube.com
The brain is the laziest organ –Mike Lombardi’s Daily Coach
Lombardi, a coach of those winning New England Patriots, writes that the brain will always want to shut down and rest … the more we challenge ourselves, the more the brain screams to rest.
In computer networking this means that we may tend to set up and forget the network, instead of investigating what new developments can improve our organizations.
In cybersecurity, our laziness is exploited by the criminals when there are data breaches — and we haven’t changed — or have barely changed — or reused our passwords.
Lombardi relates the story of laser-focused-on-the-championship Marvelous Marvin Hagler who won till he got complacent. Hagler is quoted as saying, it’s hard to do road work at 5 AM when you’re sleeping in silk pajamas.
It’s human nature the world over to get comfortable. But get back in there, champ … [4 min. read] dailycoach.com
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, useful New England tech news by New Englanders in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).