Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

What’s Superposition and Entanglement?

What's Superposition and Entanglement?Quantum computers can achieve performance orders of magnitude faster than even today’s largest super computersQuantum computers can outperform classical computers by exploiting the quantum mechanical principles of superposition and entanglement.

It’s only when you look at the tiniest quantum particles – atoms, electrons, photons and the like – that you’ve seen these befuddling phenomena. They are perplexing because we don’t experience superposition and entanglement, in our day-to-day lives. They even challenged some of the greatest minds of the 20th century. Nobel prize-winning physicist Richard Feynman said, “Nobody understands quantum mechanics.” Einstein described quantum entanglement as “spooky action at a distance.

Superposition and entanglement allow quantum computers to perform unprecedented amounts of parallelism. They do not need the multiple replication of hardware  required in a classical computer to do the same work.

Quantum superposition

Quantum superpositionQuantum superposition is the phenomenon where a qubit can exist in multiple states or places at the exact same time. Something can be “here” and “there,” or “up” and “down” at the same time. The quantum superposition “up” and “down” is lost after a measurement. We are left with a particle in one known state. This doesn’t make intuitive sense but it’s one of the weird realities of quantum physics.

Quantum entanglement

Quantum entanglementQuantum entanglement is an extremely strong correlation between quantum particles. It is so strong that actions performed on one affect the other, even if placed at opposite ends of the universe. This seemingly impossible connection inspired Einstein to describe entanglement as “spooky action at a distance.

The transfer of state between quantum particles takes place at a speed of at least 10,000 times the speed of light, possibly even instantaneously, regardless of distance.

Live Science Quantum entanglement infographic
Source:LiveScience

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

Halloween Fails

Halloween FailsHalloween is here – giving techies a reason to dress up as your favorite tech-inspired costume or better yet costume fails. You won’t believe these incredible Halloween costume fails. When people get Halloween costume ideas from their job, things can get scary fast. … here is some proof!

Google Map Guides

Google Maps costume

Code Coding costume

Identity theft

Identity theft costume

Clippy

 

The Blue Screen of Death

BSOD costume

Error 404 Page

Costume not found costume

Computer Man

Computer guy halloween costume

 

iPug

iPug halloween costume

Cloud computing

 

Cloud computing halloween costume

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

All The Famous People You Shouldn’t Google

All The Famous People You Shouldn't GoogleIt’s the most dangerous celebrity time again. For its 12th annual survey of risky famous people online, cybersecurity firm McAfee recently crowned Ruby Rose the most dangerous celebrity on the internet. McAfee says that searching for Ruby Rose on the Intertubes was more likely to land users on websites that carry viruses or malware than any other celebrity in 2018.

Ruby Rose the most dangerous celebrity on the internetRuby Rose has played some dangerous characters, like an inmate in “Orange Is the New Black” and a scientist battling a prehistoric shark in “The Meg.” But the actress herself is now officially dangerous. Rose is a model and MTV VJ who may have gotten a burst of online interest when she was named to play Batwoman on an upcoming CW series. Ms.Rose unseated last year’s most dangerous celeb, Avril Lavigne.

The rest of the 10 most riskiest famous people

McAfee identified the riskiest celebrities around the world include:

  • Debra MessingJann Arden is the most dangerous celebrity to search online, in Canada.
  • Kim Kardashian is the most dangerous celebrity to search for online in the UK and Belgium in 2018.
  • In India, Bollywood actor Ileana D’Cruz is the riskiest.
  • Lucy Liu topped Australia’s list of the Most Dangerous Celebrities.
  • Diana Kruger was named the riskiest celerity in Germany.

McAfee says the survey highlights the danger of clicking on suspicious links. The cybersecurity firm urges internet users to think before they click and consider the risks associated with searching for downloadable content. They also urge users to apply updated security fixes. The company used its own site ratings to compile the celebrity list and used searches on Google, Bing, and Yahoo.

rb-

This is McAfee’s 12th annual dangerous celebrity search. I have covered this since 2009. Some of the riskiest celebs alumni include Heidi KlumBetty WhiteTom BradyEmma Watson, and Will Smith.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Protect Yourself from Facebook

Protect Yourself from FacebookJust in case you have been sleeping under a rock the past couple of weeks, social media giant Facebook (FB) was hacked again. In a presser on 10/12/2018, the social networker admitted that nearly 30 million Facebook users were hacked. This is on top of the 50 million user accounts that Mark Zuckerberg’s company allowed Cambridge Analytics to steal.

Facebook did not apologize for exposing its users’ informationDuring the presser, Facebook did not apologize for exposing its users’ information but noted that it was cooperating with the FBI, the US Federal Trade Commission, the Irish Data Protection Commission, and other authorities on the data breach.

The attack involved the capture of Facebook “access tokens,” or digital keys that allow websites to recognize who someone is and keep them logged in. Using accounts they already controlled, the attackers used an “automated technique” to exploit Facebook’s “View As” functionality and steal access tokens for some 400,000 people. Hackers then used friend lists from those 400,000 accounts to obtain access tokens for another 30 million people (Here’s how to find out if you were hacked). Facebook tracked this hack to a change it made to its video uploading feature over a year ago in July 2017, and how that change affected View As.

Facebook confirmed on Friday that the hack compromised the personal and contact information of 30 million users. The compromised personal data includes:

  • Information sharingName
  • Phone number
  • Email address
  • Username,
  • Gender,
  • Locale/language,
  • Relationship status,
  • Religion,
  • Hometown,
  • Self-reported current city,
  • Birthdate,
  • Device types used to access Facebook,
  • Education,
  • Work,
  • The last 10 places they checked into or were tagged in,
  • Website,
  • People or Pages they follow and,
  • The 15 most recent searches.

rb-

Mozilla Firefox web browserI have been warning about the dangers of Facebook since 2011. I use the Facebook Container extension for Firefox to helps prevent Facebook from tracking me around the web. The Facebook Container is an extension to the Desktop Firefox 57 and higher (it does not work on Firefox for mobile).

The Facebook Container is a tool to limit what data others can obtain from you. It works by isolating your Facebook identity into a separate container that makes it harder for Facebook to track your visits to other websites with third-party cookies.

When you install the extension it deletes the Facebook cookies on the computer and logs you out of Facebook. The next time you navigate to Facebook it will load in a new blue-colored browser tab (the “Container”).

Facebook containerYou can log in and use Facebook normally when in the Facebook Container. If you click on a non-Facebook link or navigate to a non-Facebook website in the URL bar, these pages will load outside of the container.

Clicking Facebook Share buttons on other browser tabs will load them within the Facebook Container. You should know that using these buttons passes information to Facebook about the website that you shared from.

Because you will be logged into Facebook only in the Container, embedded Facebook comments and Like buttons in tabs outside the Facebook Container will not work. This prevents Facebook from associating information about your activity on websites outside of Facebook to your Facebook identity.

 Facebook Share buttons passes information to Facebook about the website that you shared fromIn addition, websites that allow you to create an account or log in using your Facebook credentials will generally not work properly. Because this extension is designed to separate Facebook use from use of other websites, this behavior is expected.

It is important to know that this extension doesn’t prevent Facebook from mishandling the data that it already has, or permitted others to obtain, about you. Facebook still will have access to everything that you do while you are on facebook.com, including your Facebook comments, photo uploads, likes, any data you share with Facebook connected apps, etc.

It is important to remember that other ad networks will try to correlate your Facebook activities with your regular browsing.

In addition to using the Facebook Container extension, you can further protect yourself from Facebook by changing your Facebook settings, using Private Browsing, enabling Tracking Protection, and blocking third-party cookies.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Security Vendor Consolidation Continues

Security Vendor Consolidation ContinuesThe private equity firm Thoma Bravo, LLC has announced (10/11/2018) they are acquiring NASDAQ traded cybersecurity firm Imperva for $55.75 per share in cash. Imperva develops DDoS protection (Incapsula), database security, (SecureSphere), and Breach prevention (CounterBreach) product lines — which protect websites, applications, APIs, and databases from cyberattacks while ensuring compliance.

ImpervaFor its third quarter of 2018, Imperva expects to generate revenues of $90.0 million to $92.0 million, the company revealed. The $21.B purchase further consolidates the PE firm’s role in the cybersecurity software and technology market. Thoma Bravo most recently purchased Barracuda Networks and owns a number of other software and technology firms including:

The purchase is not a done deal yet. The merger agreement provides for a 45-day “go-shop” period, during which Imperva’s Board and advisors may actively seek alternative acquisition proposals and enter into negotiations with other parties, the announcement disclosed.

Under terms of the Thoma Bravo deal, Imperva will delist and operate as a privately held company. The firm will keep its corporate headquarters in Redwood Shores, California, and continue to be led by its current executive team, both companies indicated.

rb-

Thoma Bravo is acquiring quite a tech portfolio.

Most recently they bought Apttus Corp., a contract lifecycle and digital commerce solution provider. Their portfolio has included brands such as:

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.