I was twirling the thought of Chaum's Protocol in my head, its intricacies filling the gaps between my synapses. Impressed by its cryptographic properties, I could not at the same time escape a nagging sensation in another part of my brain: DigiCash.... is ... tooooo..... faaaar... ahead... of…Continue
We are living in an era where we store personal and private information digitally on our smartphones, laptops and on “the cloud”. Malicious entities, and even government entities are always looking for ways to get to that information. You need to take extra steps to ensure your life stays private. Here are some measures you can take to help ensure that:
Use encryption everywhere
Encrypt data on your computer’s hard drive by using file encryption programs, such…Continue
Has your company grown to the point that it needs some structure and organization around its sales processes? Do your existing ad-hoc collection of online tools not cut it anymore for supporting sustained outreach to clients and closing deals? I recently found myself helping a growing startup wade through the sea of customer relationship management (CRM) tools online to narrow in on a few that fit its needs and thought I would share some of my…Continue
Posted on behalf of HTDC:
Testimony Filing Deadline: Monday, March 17 @ 9:00 A.M.
The State Budget Bill which was passed through the House Committee on…
Added by Mika Leuck on March 13, 2014 at 5:00pm — No Comments
The front-end web stack has a plethora of tools for developing robust, scalable applications. Whether it's UI frameworks like Foundation or Bootstrap, front-end MVC frameworks like Angular, Backbone, or Ember, or production tools like RequireJS, SASS, or JSHint. The only problem is, how do you choose which technologies to go with? And once you figure that out, you still need to string them all together, managing dependencies and configuration files, etc. You…Continue
Added by Mike King on March 13, 2014 at 2:30pm — No Comments
There's a fascinating story just published on The New York Times, "Silicon Valley’s Youth Problem," that explores the many facets of the age divide in the heart of America's tech industry. Written by a Comp Sci graduate student with a few internships at hot new Silicon Valley startups under his belt, the article touches on many aspects of the new guard/old guard divide in an industry…Continue
Added by Tzyh Ng on March 12, 2014 at 5:34pm — No Comments
Added by Mika Leuck on March 12, 2014 at 2:30pm — No Comments
(borrowed from a Facebook post and associated thread Mika Leuck shared)
10 Reasons Why Handheld Devices Should Be Banned for Children Under the Age of 12ContinueThe American Academy of Pediatrics and the Canadian Society of Pediatrics…
In Hawaii, we’ve built up our local tech community thanks to efforts from HTDC, HI Capacity, The Box Jelly, and many local companies. We are at the point where community events are happening all the time. We have amazing leaders at the forefront continuing to keep this community active.
A few weeks ago, Stripe hosted their 3rd Capture the Flag competition. Their first two CTFs were focused on security where you had to exploit a vulnerability in a small system or application to move on to each level until the final level is completed.
For their 3rd CTF, they've decided to switch gears and focus on distributed systems. Each of the 5 CTF levels focused on a…Continue
As a kid I loved playing coin-op games. Some of my favorites were: Space Invaders, Defender, Centipede, Galaxian and Galaga, Dig Dug, Tempest, Joust, Tempest, Spy Hunter, Tron, Robotron, and I must've spent a lot on Gauntlet.
My experiences with them were mostly at where ever I could find them. From liquor shops, bowling alleys, pizza parlors to if I…Continue
Last night I was working on a script to build and sign iOS applications for ad hoc distribution. If you've ever done over-the-air distribution of iOS applications, then you have probably seen what happens when you attempt to install an application that is not signed properly. The installation will start and progress to a certain point and then fail and then re-try forever or until you interrupt it. What I discovered last night is that even when you interrupt it, it may still continue looping…Continue