Besides making or saving money with technology, do the right thing. http://technical.ly/dc/2016/09/12/pablo-molina-ethics
Author Archives: admin
Information security and hacking of voting systems and political parties
Georgetown University Faculty Lecturer Dr. Pablo Molina recently spoke on BBC Radio, at http://www.bbc.co.uk/programmes/b07q1wn6 after 00:14:30, about information security and hacking of voting systems and political parties.
You may be a do-gooder and still look scary in a photo.
I want to thank the Alumni Society for highlighting some of my work.
Diversity explains the success of the Georgetown University Technology management program
Some of my best students speak about the Georgetown University Technology Management program. At the end of the video, I explain what makes the program interesting and successful. https://www.youtube.com/watch?v=zlB45-ps8mA
On Apple versus the FBI
In Spanish or in English, Apple is right to fight when asked to create backdoors.
Technology first, ethics first
European Parliament president Martin Schulz knows well that we cannot do technology without ethics.
Cyber security scholarships at George Washington University
The deadline for applications is Jan 31st, 2016, with unofficial transcripts and reference letters: http://www.seas.gwu.edu/cybercorps
Technology problems, opportunities, research, and solutions
On January 12th and 13th, 2016, Dr Pablo Molina attended Harvard University’s Technology Science Research Network Workshop on Problems in the Public Interest, convened by professor Latanya Sweeney. Please volunteer your research ideas. http://www.techscience.org
Student privacy is important
In the book Privacy in the Modern Age: The Search for Solutions, I wrote about student privacy. This is why it is important: https://www.washingtonpost.com/news/the-switch/wp/2015/12/28/google-is-tracking-students-as-it-sells-more-products-to-schools-privacy-advocates-warn/
A most serious hack: Jupiter Networks
Technology companies should get their act together. We need the Internet for economic transactions, public services, and personal use. We must have technologies that are trustworthy. http://www.cnn.com/2015/12/18/politics/juniper-networks-us-government-security-hack/index.html