Your computer stops working. All your remote working has taken its toll on a personal laptop you never indented to use this extensively. You panic because you can’t go into the office, and there’s nothing your remotely-working IT person can do when your machine can’t turn on.
Earlier this week, a house party in Beverly Hills, California made national headlines, as hundreds of revelers went maskless and practiced virtually zero social distancing. Worse still was that gunfire erupted later on in the party, and three people were shot. Parties like this are hardly limited to California, as it’s clear that people all over the nation (and world) are using rented ‘party houses’ as a substitute for the nightclubs that have been shut down due to the pandemic.
As today’s technological and political environments are becoming ever more polarized, it is useful once again the think about these trends in the context of America’s foundation—i.e. the reason for celebrating Independence Day in America.
April marks a new phase of global work-from-home migration, as businesspeople are now tasked with powering through crisis anxieties to keep the economy moving. It is the spirit of those who make the extra effort to help their clients in times like these who should be applauded — millions of insurance, property, financial, health care, law, and accounting professionals and their firms along with business and government workers of all kinds, everywhere.
More banking clients self-install RSign using RPost’s E-Sign & E-Security (Free) Work-from-Home Readiness Program to quickly, freely and easily e-sign Payroll Protection Program and other Loan applications. Industry organizations across sectors have joined RPost’s coalition to make their small business clients aware of these e-sign and e-security tools and how to access them free with RPost’s crisis software donation program (see who has joined).
In today’s financial circles, there is quite a bit of buzz around “blockchain” technology and its myriad of possible future applications. Is blockchain here to stay or is it just hype?
While Title IV of The Jobs Act (Reg A+), the amended and expanded securities regulation, changed in mid-2015, organizations have been slow to change their processes until there was a clear understanding of how to use these new funding tools and stay in compliance.
Just a decade ago, self-driving cars were relegated to science fiction and the dreams of a handful of technologists.
Today, self-driving cars are already on the roads. Uber is using them to pick up passengers in Pittsburgh. Self-driving features are built into the latest models of Mercedes, BMW, and of course, Tesla – although these cars still require a human driver to be attentive and ready to assume manual control at any moment.
Does your news feed closely resemble the plot of a Russian spy novel? It certainly might if you’ve been following the recent drama and mudslinging between the Democrats, the Russian government, the FBI, and the CIA, following the public release of private DNC emails. And that’s before the warnings of an “October Surprise” promised by WikiLeaks founder Julian Assange. Assange is threatening to release more confidential emails before the November election. Who needs fiction?
…and does it change the result?
Who is responsible for the recent Democratic National Committee (“DNC”) hack and resulting emails published on WikiLeaks? Russian hackers are suspected and the FBI is investigating, but Russia adamantly denies involvement. The hackers could be from the same group who stole DNC’s oppositional research about Republican Presidential nominee Donald Trump in mid-June. Perhaps, the perpetrator is simply a DNC employee or subcontractor disenchanted with circumstances that many are now describing as a DNC conspiracy to favor and support its predetermined nominee in the presidential primary – Hillary Clinton – while impeding other candidates such as Bernie Sanders. Whether an angry Bernie Sanders supporter or a foreign government preferring Trump is to blame, the lesson here is once again that if your emails (sent in plain text) contain something of value, they will eventually be exposed.