Background I care deeply about the people in my life. I value my relationships with them. I cherish in-person, face-to-face conversations. In my personal and professional life, I rely on video conferences, email, and instant messaging. In some cases, I might communicate with you frequently, in others once in a while. Like it is for… Continue reading Why I Recommend Using Spike for Email, Instant Messaging, and Video Chat (Review)
In this age of fake news spreading virally over social media, the recent Harvard Neiman Lab article (link below) is an excellent read.
These days, artificial intelligence is gaining a lot of attention in mainstream media. This is a topic that I’ve been passionate about for many years, and a number of fellow technologists have asked me where they can learn about AI. I have posted a shared Google Document for people with a background in technology and software engineering… Continue reading Information for Technologists Interested in Learning about Artificial Intelligence
The World Economic Forum and its partners have developed and shared a way for organizations to calculate the impact of cyber security threats. The framework, called cyber value-at-risk comes at a time when cyberattacks are increasing in velocity and intensity, and when 90% of companies worldwide recognize they are insufficiently prepared to protect themselves against them. Download the… Continue reading Cyber Resilience Towards the Quantification of Cyber Security Threats
If you work in news media and are interested in technology, you may enjoy my article listing 9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015. I co-authored it with Eitan Konigsburg and Elena Kvochko, two colleagues with expertise, deep knowledge and passion for cyber security, privacy and technology.
My personal Web site, rajiv.com is served exclusively on HTTPS thanks to CloudFlare.
If you are interested in business, technology, and cyber security, you may enjoy my article about why investors should care about cyber security breaches. I co-authored it with Elena Kvochko, a leader in the field of cyber resilience.
http://crypto-js.googlecode.com/svn/tags/3.1.2/build/rollups/sha3.js SHA-3, originally known as Keccak is a cryptographic hash function. Learn more on WikiPedia… Enter text below to generate the SHA-3 Hash Code for Output length in bits: 512384256224 The SHA-3 Hash Code is below //
We present here a convention for linking to users across social networks. Social networks have evolved into a category of their own. They are not like most Web sites in the traditional sense and even when considered modern Web apps, they are a special type of application. They have become our new digital personas. Email… Continue reading Proposal for Linking To Users Across Social Networks @username@service
If you host and operate large-scale Web sites, or negotiate contract agreements with vendors that provide such services, you need to understand what should be included in a Web hosting infrastructure. This knowledge will help you in three areas: Providing reliability, scalability & good performance Minimizing risks via security, privacy, regulatory compliance and reduction of… Continue reading Hosting Large-Scale Web Sites: Contract Review Guide for the CTO