By Rebecca Todd
The Hendricks County Flyer
Fri Jun 07, 2013, 03:44 PM EDT
I am the first to admit I am behind the times when it comes to technology. I remember way back in the olden days of the 1990s when I was actually ahead of the game. Now there are second-graders that are more tech savvy than me. I just decided to stop my forward technological progression a few years back.
Did you ever notice how people do that? They just decide that they are done and don’t want to learn anything new about technology. I remember my father often referred to the rotary dial phone that hung on the wall as that new-fangeldy thing. It was yellow, hung on the wall in the kitchen and was the only one in the house. Guess what decade it was when Dad gave up on technology.
My mother did a little better. She even has a VCR and a flip phone. Sadly, she sometimes tries to use the cell phone to power on the VCR, but at least she’s trying.
However, the more I read and the more I learn about new technologies that are on the horizon, the happier I am that I stopped my forward technological progression about five years ago. Sure, I have an iPhone, but I don’t listen to music or play games or use the multitude of available apps. I use it to make phone calls. I text, albeit slowly and with one finger, which tends to drive my 14-year-old into screaming fits of exasperation. I even use Google on my phone to cheat on crossword puzzles on occasion. I am just that cool.
Cool, yes, but what I’ve been reading lately turns my blood cold.
It seems that at the recent All Things Digital D11 conference, Regina Dugan, the former head of the Defense Advanced Research Projects Agency (DARPA), whose mission is to “maintain the technological superiority of the U.S. military and prevent technological surprise from harming our national security,” discussed the future of authentication. According to Dugan, this could possibly include digital tattoos or managing passwords via a daily password “vitamin.” And I quote, “This pill has a small chip inside of it, with a switch. It also has what amounts to an inside-out potato battery,” she said. “When you swallow it, the acids in your stomach serve as the electrolyte, and they power it up and the switch goes on and off and it creates an 18-bit ECG-like signal in your body. Essentially, your entire body becomes your authentication token.”
July 12, 2014
July 10, 2014
July 7, 2014
June 19, 2014
June 11, 2014
June 7, 2014
An NPR broadcast examines the question of how communities can better prepare for tornadoes like the one that struck Moore, Okla. on Monday. The broadcast features commentary from Michael Fitzgerald, who reported a five-part disaster series for the CNHI News Service.
May 22, 2013
Part I: Are We Prepared? | Part II: Disaster Dollars Part III: Lessons Learned | Part IV: Warning Signs Part V: The Big One
A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo Jr., so they could get evidence from his computer to be used at his trial.
July 25, 2014
© 2014 Community Newspaper Holdings, Inc. ·
CNHI Classified Advertising Network ·
CNHI News Service
Associated Press content © 2014. All rights reserved. AP content may not be published,
broadcast, rewritten or redistributed.
Our site is powered by Zope. Some parts of our site may require
you to download the Flash Player Plugin.
Terms and Conditions
Hendricks County Flyer, Avon, IN
8109 Kingston St., Suite 500