Bloated Apps … Sad Stuff

You may have looked at a list of updates on a phone and wondered Are App Sizes Out of Control? Well, a few have weighed in on the matter and do see growing app sizes as ridiculous. App bloat is unnecessary.

A lean, clean simple app is pleasant. Launches quickly. Barely a delay between splash screen and ready to use. An experience so smooth you don’t notice it.

Many apps today are quite the opposite. Bloated and slow is not a permanent state of affairs. The way apps are built can be so much better.

US Senate IoT Legislation

A group of US Senators Are Set To Introduce a Bill To Secure ‘Internet of Things’ which is an opportunity to emphasize processes that increase the odds of better security. The concept of having vendors not knowingly put out inferior solutions is a good start. Preferring open source is a recipe for advancing solutions more suited to verification. Such solutions benefit from a wider level of participation in technology R&D that strengthens the overall solutions adopted.

Phone System Error 404

I used to think that phone #’s couldn’t be hacked. I grew up with land line phones and they seemed secure. That was just a feeling. What I thought was a secure way to talk turned out false. The reality is your phone # can be temporarily intercepted and hijacked. Text messages can be read, everything on the phone can be looked into at any time. It turns out that from a security perspective, phones are as dangerous as computers. Even the analog variety. Time for the very best PhDs to figure out something new and provable better than the technology in play today.

2 Factor Lockout – Blocked Access is only Two Steps Away

Although it is possible for someone else to go into your email, as the political events of 2016 has shown, the push for better account security never ends. Recent developments show Google To Replace SMS Codes With Mobile Prompts in 2-Step-Verification Procedure. The latest info is that your phone # can be hacked, quietly, and it would be easy for others to compromise the SS7 system that handles phone calls and text messages. While it seems 2 Factor Verification where you get a text message access code to your account when you log in seems more secure, in reality, that may be an illusion of security. Anyway, I thought about that as I failed to get access to the LinkedIn account under my name. I no longer had the phone # I used for 2 Factor Verification and LinkedIn wanted a digital scanned copy of an ID or signed affidavit. Crazy stuff. Anyway, I decided I didn’t need LinkedIn any longer as I reflected on the concept of lost access to a social media page I worked on for many, many years. The dangers of floating around digital copies of an ID or signature can be much greater than the leisurely activity of participating in social media. As to login security, surely the greatest minds in Tech can solve this more effectively. There has got to be a better way …

Experimental Digital Generation

The consensus from one corner of the science world is that Students Are Better Off Without a Laptop In the Classroom. Understandably, laptops are good outside the classroom for things like homework, research, and cleanly composing documents and other materials. Yet, it is possible the general mystique around laptops for education was oversold. Another pebble thrown into the ocean of the experimental runaround to do nothing. Again, another case of the dangers of unfettered marketing of concepts with little benefit to most people’s future.