Justin A. Parr - Technologist

Technology, Strategy, Insights, and Tech Support

  • HOME
  • Quick Facts
  • CygUlarn Win32
  • About Me

The Netflix – Comcast Deal, Smart Move for Netflix, and a Win for Customers

Posted by Justin A. Parr on March 6, 2014
Posted in: Analyses and Responses. 5 comments

Table of Contents

  • Overview
  • Background
    • The Nature of the Internet
    • No Guarantees
    • Quality Means Bit Rate
    • Content Delivery Networks
    • Net Neutrality
    • Peering Has its Limits
  • Comcast and Netflix
  • Criticism
    • False: Netflix-Comcast Deal Appears to Violate Net-Neutrality
    • False:  Netflix-Comcast Deal is a Game Changer
    • False:  Comcast is Double-Dipping
  • The Reality
    • There is no such thing as a free lunch.
    • Benefits for Comcast
    • Benefits for Netflix
  • Summary

Overview

On Feb 23, 2014, Comcast announced a multi-year deal with Netflix aimed at improving the viewer experience of Netflix customers who use Comcast broadband services.

Comcast Press Release

http://corporate.comcast.com/news-information/news-feed/comcast-and-netflix

Although details are very limited at this point, the press release states:

…the companies have established a more direct connection between Netflix and Comcast…

There are those who are either concerned that this violates the concept of net-neutrality, or speculate that this is a “game changer” from an internet economics perspective.

In reality, this is an incredibly smart move for Netflix, and a tremendous win for Netflix / Comcast customers.

Click here to read more!

You know you need coffee when

Posted by Justin A. Parr on February 28, 2014
Posted in: The Light Side. Leave a Comment

You know you need coffee when…

  • You make a pot of coffee
  • You go to pour yourself a cup of coffee
  • A split second before you start to pour, you realize you’re holding a plate instead of a cup
  • You put the plate away and grab a cup
  • Your sleep-deprived brain flickers dimly, as you briefly note that, for the entire time you’ve owned this particular coffee cup, you’ve never noticed that they printed the picture upside-down.
  • You go to pour yourself a cup of coffee
  • A split second before you start to pour, you realize that the cup is, in fact, upside-down rather than the picture being upside-down.
  • You invert the cup, and successfully pour your coffee!

The Importance of Hashing Passwords

Posted by Justin A. Parr on February 14, 2014
Posted in: Analyses and Responses. 3 comments

Table of Contents

  • Overview
  • What is Hashing?
    • Hashing
    • Key points – Hashing
    • Secure Hashing
  • What is Encryption?
    • Encryption
    • Key points – Encryption
    • Hashing vs. Encryption
  • Authentication with Cleartext Passwords
    • Overview of cleartext authentication:
    • Risks
  • Authentication with Encrypted Passwords
    • Overview of Encrypted Authentication:
    • Advantages over cleartext
    • Risks:
  • Authentication with Hashed Passwords
    • Overview of Hashed Authentication:
    • Advantages
  • What Else Can Hashing Do?
  • Summary

Overview

The Adobe 2013 data breach, in which about 40 million account user names and other details were disclosed, as well as other data breaches in which cleartext passwords are disclosed, underscores the need for password hashing, as opposed to cleartext or encryption.

Adobe Data Breach:
http://krebsonsecurity.com/2013/10/adobe-breach-impacted-at-least-38-million-users/

Cupid Media Data Breach:
http://krebsonsecurity.com/2013/11/cupid-media-hack-exposed-42m-passwords/

EDIT: 5/30/2014
Add eBay to the list:
http://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-breach-all-users-must-their-change-passwords/

Encryption is reversible, where hashing is not.
Click here to read more!

Top Developer Mistakes

Posted by Justin A. Parr on February 4, 2014
Posted in: Analyses and Responses. 4 comments

Background:  Even with top notch architecture, coding, and Quality Assurance (QA), it’s easy to make these simple mistakes, that once introduced in to production, can be quite costly to fix.

Production issues can cause down time, brand / reputation impact, loss of customer / end-user confidence, loss of productivity, loss of revenue, and wasted resources.

This article describes some of the more common mistakes that can be made, going from development in to production.

Click here to read more!

Free, Secure Disk Wipe Built In to Windows

Posted by Justin A. Parr on January 23, 2014
Posted in: Tech Support. 1 comment

Windows XP and above includes a free, secure disk wipe capability.

 

Background

When files are deleted, the directory entry is removed, leaving the data in-tact.  Commercial and open source software is available to recover deleted files, by finding the disk cluster chain, and restoring the original directory entry.

“Secure delete” means overwriting the cluster chains for a given file.  Likewise, a “secure wipe” overwrites all unused clusters on the drive.
Click here to read more!

How to Smoke a Turkey

Posted by Justin A. Parr on December 24, 2013
Posted in: Food and Cooking, Other Stuff. 3 comments

I get asked about this all the time, so here are some instructions and tips

Click here to read more!

Microsoft “tag” sucks!

Posted by Justin A. Parr on December 21, 2013
Posted in: Rants. Leave a Comment

<rant>

Microsoft “tag” sucks!

 

What is Microsoft “tag”?

“tag” is a proprietary barcode format, developed by Microsoft.
Click here to read more!

A method for securely sharing files

Posted by Justin A. Parr on October 21, 2013
Posted in: Other Stuff. 2 comments

Abstract

This document outlines a method for encoding, storing, and transmitting a file to one or more recipients securely by creating multiple bit streams that essentially contain no viable content, but by which the recipient can re-construct the original content.

This is achieved by using a symmetric operation to decompose a “high value” byte sequence (such as a file containing confidential data) in to blocks of random bit strings, and using hash “label” values to retrieve known bit blocks in order to reconstruct the original high-value byte sequence, based on instructions and label values contained in a “blueprint” string sequence.

Technical Assertions:

  • A symmetric bitwise operation, such as XOR or EQV can be used to split a high-value bit sequence in to two random sequences that can be recombined in to the original sequence
  • A hash function can be used to generate hash “label” values for a given bit sequence, that can be used as an index for storing and retrieving a specific bit sequence.
  • Salt Data can be used to generate multiple, unique hash values for the same bit sequence, and can be used to generate multiple, unique index functions.
  • A blueprint string containing hash values and assembly instructions can be used to locate, download, transform, and assemble various blocks of random bit strings in order to reconstruct the original high-value bit sequence.
  • Using overlapping hash indices, multiple equivalent blueprints can be constructed that represent the same original bit sequence. This allows mutation and randomization when sharing blueprints.

Continue Reading

How to embed a PDF in a WordPress Post

Posted by Justin A. Parr on October 21, 2013
Posted in: Wordpress Stuff. Leave a Comment

Problem: 

How to embed a PDF or other type of document inside of a WordPress post.

 

Additional Information:

There are multiple WordPress plugins that use Google Doc Viewer or some other third party to display PDF content.  Each (modern) browser has PDF viewing capability built in, or there is a browser plugin that can view the content inline.  For example, both Adobe Reader and Foxit Reader have the capability to view a PDF document if you paste the URL in to the address bar.

In the event that the browser does not have PDF viewing capability, the user will simply be prompted to download the PDF

Continue Reading

Telecommunications Etiquette

Posted by Justin A. Parr on July 6, 2013
Posted in: Other Stuff. Leave a Comment

There has been more written on Telecommunications Etiquette than one could publish in a single volume, or even perhaps in ten.

This post is an attempt to frame out, at a high level, how to politely and professionally engage and communicate with someone electronically, and call out several major “DOs” and “DON’Ts”.
Continue Reading

Posts navigation

← Older Entries
Newer Entries →
  • Search!

  • Temperature at Casa de Parr

  • Recent Posts

    • Top Reasons Why Vegas Sucks Now (2024 Visit)
    • Excel – Number of Sundays – A better Answer
    • Cache Busting using Javascript
    • Javascript Calculator
    • Gatetrilogy Saga: The Front Gate Part III, The Final Gate Opener
    • The Dangers of Old Code – A Cautionary Tale
    • Quantum Chicken Joke
    • Calculate the Dimensions of a TV or Monitor
    • MORE Things to Check Before You Buy A House
    • Travel Tech and Tips – 2023
  • Topics

    • Analyses and Responses (27)
    • Good Design – Bad Design (33)
    • IT Management (1)
    • Justinisms (8)
    • Main Page (1)
    • Math and Science (30)
    • Other Stuff (39)
    • Quick Facts (7)
    • Rants (17)
    • Tech Support (61)
      • Food and Cooking (10)
      • Tech Recommendations (12)
      • Tech Tip (7)
      • Wordpress Stuff (3)
      • Zen Cart Stuff (1)
    • The Light Side (37)
  • Links

    Log in or Register to post comments

    RSS Feed
    https://justinparrtech.com/JustinParr-Tech/feed

    View my LinkedIn Profile
    http://www.linkedin.com/in/justinparr

    About Me
    Justin A. Parr

    Who is Jill Parr
    Find out here.

  • Older Posts

    • June 2025 (1)
    • February 2025 (1)
    • August 2024 (1)
    • May 2023 (1)
    • April 2023 (3)
    • January 2023 (1)
    • December 2022 (2)
    • November 2022 (2)
    • September 2022 (1)
    • August 2022 (3)
    • June 2022 (2)
    • March 2022 (1)
    • January 2022 (2)
    • December 2021 (1)
    • July 2021 (1)
    • May 2021 (1)
    • March 2021 (1)
    • February 2021 (2)
    • November 2020 (4)
    • October 2020 (1)
    • September 2020 (1)
    • August 2020 (1)
    • July 2020 (1)
    • June 2020 (1)
    • May 2020 (2)
    • April 2020 (1)
    • March 2020 (8)
    • February 2020 (2)
    • January 2020 (1)
    • November 2019 (2)
    • August 2019 (3)
    • July 2019 (1)
    • June 2019 (1)
    • April 2019 (1)
    • February 2019 (3)
    • January 2019 (1)
    • December 2018 (1)
    • November 2018 (1)
    • October 2018 (2)
    • September 2018 (1)
    • August 2018 (2)
    • July 2018 (1)
    • June 2018 (1)
    • April 2018 (1)
    • February 2018 (2)
    • January 2018 (2)
    • December 2017 (1)
    • November 2017 (2)
    • August 2017 (2)
    • July 2017 (1)
    • March 2017 (1)
    • February 2017 (2)
    • January 2017 (1)
    • December 2016 (5)
    • November 2016 (3)
    • September 2016 (5)
    • August 2016 (2)
    • April 2016 (1)
    • March 2016 (3)
    • February 2016 (2)
    • January 2016 (7)
    • December 2015 (3)
    • November 2015 (1)
    • October 2015 (3)
    • August 2015 (5)
    • July 2015 (3)
    • June 2015 (2)
    • May 2015 (4)
    • April 2015 (4)
    • March 2015 (3)
    • February 2015 (4)
    • January 2015 (8)
    • December 2014 (8)
    • September 2014 (1)
    • August 2014 (1)
    • July 2014 (2)
    • June 2014 (4)
    • May 2014 (1)
    • April 2014 (2)
    • March 2014 (3)
    • February 2014 (5)
    • January 2014 (1)
    • December 2013 (2)
    • October 2013 (2)
    • July 2013 (3)
    • April 2013 (1)
    • October 2010 (1)
    • August 2010 (1)
    • July 2009 (1)
    • April 2009 (1)
    • November 2008 (1)
    • October 2008 (1)
    • September 2008 (1)
    • May 2008 (1)
    • March 2008 (1)
    • January 2008 (1)
    • June 2005 (1)
    • May 2005 (4)
Proudly powered by WordPress Theme: Parament by Automattic.