Background I care deeply about the people in my life. I value my relationships with them. I cherish in-person, face-to-face conversations. In my personal and professional life, I rely on video conferences, email, and instant messaging. In some cases, I might communicate with you frequently, in others once in a while. Like it is for… Continue reading Why I Recommend Using Spike for Email, Instant Messaging, and Video Chat (Review)
Category: Technology
MatheMagic Card Trick
Introduction MatheMagic Card Trick is a fun and simple number revealing magic trick using math. Use the page generate-cards.html to generate your cards to print. Read how-it-is-done-and-tips.html for instructions on how to perform the magic trick. Web Site https://rajivpant.github.io/mathemagiccardtrick/ Source Code https://github.com/rajivpant/mathemagiccardtrick Credits Rajiv and Fitz coauthored the JavaScript here that generates the cards. Fitz figured out the generalized… Continue reading MatheMagic Card Trick
How news organizations combat fake news generated and spread using artificial intelligence
In this age of fake news spreading virally over social media, the recent Harvard Neiman Lab article (link below) is an excellent read.
Information for Technologists Interested in Learning about Artificial Intelligence
These days, artificial intelligence is gaining a lot of attention in mainstream media. This is a topic that I’ve been passionate about for many years, and a number of fellow technologists have asked me where they can learn about AI. I have posted a shared Google Document for people with a background in technology and software engineering… Continue reading Information for Technologists Interested in Learning about Artificial Intelligence
Cyber Resilience Towards the Quantification of Cyber Security Threats
The World Economic Forum and its partners have developed and shared a way for organizations to calculate the impact of cyber security threats. The framework, called cyber value-at-risk comes at a time when cyberattacks are increasing in velocity and intensity, and when 90% of companies worldwide recognize they are insufficiently prepared to protect themselves against them. Download the… Continue reading Cyber Resilience Towards the Quantification of Cyber Security Threats
9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015
If you work in news media and are interested in technology, you may enjoy my article listing 9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015. I co-authored it with Eitan Konigsburg and Elena Kvochko, two colleagues with expertise, deep knowledge and passion for cyber security, privacy and technology.
It is published on the Times Open Blog maintained by the Software Engineering Team at The New York Times.
My personal Web site, rajiv.com is served exclusively on HTTPS thanks to CloudFlare.
Why investors should care about cyber security breaches
If you are interested in business, technology, and cyber security, you may enjoy my article about why investors should care about cyber security breaches. I co-authored it with Elena Kvochko, a leader in the field of cyber resilience.
SHA-3 Hash Generator
http://crypto-js.googlecode.com/svn/tags/3.1.2/build/rollups/sha3.js SHA-3, originally known as Keccak is a cryptographic hash function. Learn more on WikiPedia… Enter text below to generate the SHA-3 Hash Code for Output length in bits: 512384256224 The SHA-3 Hash Code is below //
Proposal for Linking To Users Across Social Networks @username@service
We present here a convention for linking to users across social networks. Social networks have evolved into a category of their own. They are not like most Web sites in the traditional sense and even when considered modern Web apps, they are a special type of application. They have become our new digital personas. Email… Continue reading Proposal for Linking To Users Across Social Networks @username@service
Hosting Large-Scale Web Sites: Contract Review Guide for the CTO
If you host and operate large-scale Web sites, or negotiate contract agreements with vendors that provide such services, you need to understand what should be included in a Web hosting infrastructure. This knowledge will help you in three areas: Providing reliability, scalability & good performance Minimizing risks via security, privacy, regulatory compliance and reduction of… Continue reading Hosting Large-Scale Web Sites: Contract Review Guide for the CTO
You must be logged in to post a comment.