Identity Verified Thinker in Technology / Internet / Infrastructure
Mike Dailey
Mike Dailey
Mike Dailey is the owner of claroPoint.com, an Information Technology consulting firm specializing in the design, integration, and management of Internet website and security technologies. He can be reached through the claroPoint website at http://www.claroPoint.com
 

Categories

This Blog has no active categories.
 
Close  
Aug. 30, 2011 9:17 am
According to a joint survey by the University of Pennsylvania and University of California-Berkeley, 84% of consumers object to being tracked online, with many seeing it as a violation of their online privacy. With that type of user feedback, it is not surprising that this week’s launch of a “Do Not Track” option by the Interactive Advertising Bureau (IAB) was met with staunch criticism by...  Read More
Aug. 29, 2011 5:21 pm
I’m a fan of small airports. When you travel often as an IT consultant, you look for every timesaver and meager benefit you can find. Small airports tend to provide the essentials all wrapped up in a neat little building that makes it easy to get in and get out. Outagamie County Airport (ATW) in Appleton, Wisconsin is one of those airports. If you are visiting a client site in northeastern...  Read More
Aug. 26, 2011 5:22 pm
There has been a lot of discussion lately concerning Internet security and privacy, spurred on by what seems like an almost daily occurrence of web site hacking and the loss of confidential data. Medical facilities, private industry, and governments alike struggle to come to grips with new methods of cyber crime and cyber terrorism. While the majority of cyber attacks are carried out by amateur...  Read More
Aug. 25, 2011 7:06 pm
I’m not much of a gamer, and I typically spend little time reading up on video game news. When I read the news story about GameStop opening manufacturer-sealed video game boxes to remove a competitors coupon, I have to say that it did upset me. It amazes me that a vendor would employ such an unprofessional practice to prevent a competitor from doing business. After the news broke, gamers began...  Read More
Aug. 23, 2011 9:06 pm
A relatively new hacker web site has cropped up, but this time it’s less about hacking and more about competition… sort of. RankMyHack.com is a web site where hackers can compete amongst one another for ranking as the top hacker. This is accomplished by earning points for the number and size of the success hacks attributed to the hacker. The web site tracks confirmed hacks, awards points, and...  Read More
Aug. 23, 2011 3:35 pm
As more incidents of hacking, theft, and data loss make the headlines this week, the question remains as to who is responsible for the lapses in Internet security that make it seemingly easy to commit these types of cyber crime. Whether it be the public or private sector organization that was targeted, a government body, an Internet Service Provider, or the throngs of Internet users and consumers...  Read More
Aug. 21, 2011 8:59 pm
Being an IT consultant in computer networking means passing exams and earning certifications. For an in-house technical resource, having a single IT certification in a given area is sufficient to do the job well. For the IT consultant, however, the name of the game is certifications and experience. A client wants to know that the people handling their systems are highly skilled, possessing a...  Read More
Aug. 18, 2011 10:28 am
A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different author's name. I hadn’t been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my...  Read More
Aug. 16, 2011 9:16 pm
I often spend time reviewing my website logs to see who my visitors are, what topics are generating the most interest, and what websites readers are coming from. This evening, while reviewing the activity log, I noticed an entry from a web agent that stood out from the others. This agent stood out from the others not only because it was from a WordPress agent named WordPress/3.1.3;...  Read More
Aug. 15, 2011 9:58 am
As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. Releasing the personal information of innocent...  Read More
Aug. 14, 2011 11:11 am
In a short article I wrote earlier this week, entitled “Social Media, Violence, and Free Speech” , I took aim at British Prime Minister David Cameron and his idea of curtailing online free speech by restricting the use of social media sites to organize protests. In true “crow eating” fashion, I’m now forced to re-evaluate my position on the matter, thanks in large part to an uneducated, faux...  Read More
Aug. 13, 2011 9:14 am
It seems that the Linux community is so focused on the competition with Microsoft that any hint of the two mentioned together in an article, blog post, or tweet is immediately circulated around the Internet. In the past day or so the news began to circulate that Wes Miller of Directions on Microsoft had tweeted that Microsoft modified their boilerplate SEC financial filings, and apparently...  Read More
Aug. 12, 2011 9:10 am
In the wake of the violent rioting that rocked several cities in the United Kingdom, British Prime Minister David Cameron has focused on the social media services Facebook and Twitter as co-conspirators in the civil unrest. Cameron believes that by allowing “free flow of information”, these services contributed to the civil disobedience that occurred in his country. Cameron stated, “Free flow of...  Read More
Aug. 4, 2011 11:40 am
After searching around a bit I was unable to find a place to connect with other bloggers/authors from the technology industry. There are some forums here and there, but nothing dedicated to technology bloggers as a group. To provide such a place, I have created a LinkedIn group entitled Technology Blog Authors and Professionals , providing a resource for technology bloggers and authors to...  Read More
Aug. 1, 2011 11:07 am
As a technology professional, you will likely take the occasional road trip, but as a technology consultant, travel is a fact of life. Many in our field will spend an average of 45 weeks on the road every year, with 8-10 hours per week spent traveling to and from a client site. Those hours of travel mean airfare, rental cars, and hotel stays, all tallying up the frequent traveler miles and...  Read More
Return to Main Blog Page

BestThinking to be Updated this Weekend

If all goes well you will see a change in the layout of BestThinking's Home and Category pages. Topics & Articles and Blogs & Books will no longer be shown in two separate columns.

All 4 content types (Articles, Blogs, Books, and Topics) will be Featured Content together as one continuous stream, although the column structure - one wide and one narrow - will remain the same. The first (wide) column will now flow into the second (narrow) column. This change is in response to Blogs becoming as important a content type as Articles and Topics. This will also give Featured Content more time on the Home page which is helpful regarding search engines indexing this content.

Close
 
Latest Ebooks