Inclusive Design in Information Security
In the spirit of James Clear’s Atomic Habits and tiny changes leading to remarkable results, here’s a reminder around usability and design in your security… Read More »Inclusive Design in Information Security
In the spirit of James Clear’s Atomic Habits and tiny changes leading to remarkable results, here’s a reminder around usability and design in your security… Read More »Inclusive Design in Information Security
The team at Google have published a paper on MusicLM, a model generating music from text descriptions. This has been a busy month in the… Read More »Generating Music From Text
Hoek shares some tips for hardening Windows Defender in your environment covering: Enabling Microsoft Advanced Protection Service (MAPS) Configuring Block at First Sight Enabling Ransomware… Read More »Windows Defender Hardening
The overwhelming majority of contemporary style guides and word processors advise using a single space between typed sentences. When in doubt, use single spacing in research papers,… Read More »One or Two Spaces After Period
A good document from Microsoft, comparing the various service offerings from Azure and AWS titled Cloud Service Map. Example: Service Description AWS Azure Virtual servers Allows… Read More »AWS vs. Azure Comparison
If you take two people, one of them is a learn-it-all and the other one is a know-it-all, the learn-it-all will always trump the know-it-all… Read More »Mindset