Fonts of Wisdom

As an amateur web developer and aspiring author, I can say with some certainty, font and size controls are a double edged sword.  There is a very fine line between formatting your text to be innovative and appealing, and gaudy and gauche.  But it’s a dangerous road you must dare to tread, because absolutely nothing … Read more

Hypothetical Karaoke

Collapse Karaoke Club: Singing for the Small Medium Business ABSTRACT This paper illustrates the growth and development of Collapse Karaoke Club, a brick and mortar manifestation of the internet, that attracts people in to a safe cashless entertainment facility, allowing registered patrons to purchase premium content and experiences via PayPal, including movies, concerts, comedy, and … Read more

The All American Intranet

The All American Intranet: A WLAN For the People, By the People, About the People ABSTRACT This paper will attempt to proscribe and independent WLAN with governmental authentication, in an effort to provide a particular accountability to the internet, and foster an environment where the populace could easily vote, and peruse records of their pundits … Read more

Global Network Operations Center: Continuity in Hazardous Incidents

ABSTRACT After writing my first paper on AT&T’s approach to Unified Communications, I stumbled upon the Global Network Operation Center (GNOC). This is the continuation of the last paragraph of that paper, where I describe the GNOC and it’s association with AT&T’s Network Disaster Recovery (NDR) team, and their track record of responding to natural … Read more

Wired Equivalent Privacy

After reading this whitepaper published by InteropNet Labs (http://www.opus1.com/www/whitepapers/whatswrongwithwep.pdf) I think I discovered a few weakness in WEP or Wired Equivalent Privacy.   WEP works by pairing your user generated password with an Initialization Vector (IV) which, as I understand, is a 24 bit value that’s stored in Plain Text.  So the “code” meant to … Read more