Daniel Nolte

Architect, Network Administrator, Computer Forensics Administrator, Voiceovers. website,

Most commented posts

  1. HP TouchPad vs the iPad 2: And Fight! — 8 comments
  2. Amazon’s Junk Ebook Problem and a Computer Forensics Approach to Solve It — 5 comments
  3. Judging a Horse Race Without Any Horses — 5 comments
  4. The Worst Example of Executive Data Security Ever? — 5 comments
  5. Lizamoon and the Final Step in Securing Your Computer — 4 comments

Author's posts

California Quits the Early Primary Game

The California Legislature recently decided with the full support of Governor Brown to forgo having a split primary as it has had in recent presidential election cycles.  Instead next year California will have just one primary election in June, likely well after the presidential candidates have been chosen. Envious of the attention given to small …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/08/california-quits-the-early-primary-game/

Daubert & Kumho Expert Challenges Increase, Moving Away From Their Original Purposes

PricewaterhouseCoopers (PwC) issued a study of what has occurred with financial (usually damages) experts since the 1999 Supreme Court decision in Kumho Tire Co. vs. Carmichael clarified that the Daubert criteria for challenges to expert witnesses extended to non-scientific experts. The reliability of underlying data is the most frequent reason why testimony is excluded. This …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/07/daubert-kumho-expert-challenges-increase-moving-away-from-their-original-purposes-2/

Amazon's Junk Ebook Problem and a Computer Forensics Approach to Solve It

Recently Reuters ran a story regarding (i) Amazon’s ebooks business that is part of its highly popular Kindle readers and (ii) reader applications for phone and table devices.   One consequence of these offerings is they provide a way for writers to self-publish their own work for free. Unfortunately whenever the words Internet and free are combined, …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/06/amazons-junk-ebook-problem-and-a-computer-forensics-approach-to-solve-it-2/

Amazon’s Junk Ebook Problem and a Computer Forensics Approach to Solve It

Recently Reuters ran a story regarding (i) Amazon’s ebooks business that is part of its highly popular Kindle readers and (ii) reader applications for phone and table devices.   One consequence of these offerings is they provide a way for writers to self-publish their own work for free. Unfortunately whenever the words Internet and free are combined, …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/06/amazons-junk-ebook-problem-and-a-computer-forensics-approach-to-solve-it/

Eddifice Rex

It isn’t  often that a story comes along that combines my original profession, architecture, with my current, computers.  This was one. Steve Jobs arrived the day after Apple’s WWDC11 conference, with very short notice, at the Cupertino City Council meeting.  No surprise, they added him to the agenda.  His purpose?  To display to the city council …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/06/eddifice-rex/

HP TouchPad vs the iPad 2: And Fight!

HP recently announced that their Touchpad tablet computer will be available for order on June 19, with prices identical to a similarly configured iPad 2. Sales of the TouchPad will be looked at closely as the answer to a very big question: Did HP make a mistake paying 1.2 billion dollars for Palm?  Palm’s share …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/06/hp-touchpad-vs-the-ipad-2-and-fight/

The Worst Example of Executive Data Security Ever?

Fabrice Tourre of Goldman Sachs has the distinction of being the only person sued by the Securities and Exchange Commission for fraud in selling mortgage backed securities. While that may remain his primary claim to fame (thanks to a  front-page article in the New York Times), there may be a secondary distinction added: the worst handling of …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/06/the-worst-example-of-executive-data-security-ever/

What statistics can tell us about the ditching of L.A.’s "Gold Card Desk"

Most never even knew what the “Gold Card Desk” was before it was abolished last week, not even in Los Angeles where it inhabited for the last 20 years.    The “Gold Card Desk” is an esoteric service that allows Los Angles city government officials to fast track parking citation reviews that they receive.  A plastic parking bureau Gold Card was distributed to …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/06/what-statistics-can-tell-us-about-the-ditching-of-l-a-s-gold-card-desk-2/

Google's Old Answer in Search of a New Problem.

At the second day of the Google I/O Conference this week, the company announced that the Chrome-only portable computers, to be called Chromebooks, would become available in mid-June. Google made its intent to develop Chrome into a stand-alone operating system clear when it initially announced the browser in September of 2008.  The nearly three years between …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/05/googles-old-answer-in-search-of-a-new-problem-2/

How to Make Skype Worth $8.5 Billion

Microsoft just announced that it will be paying $8.5 billion for Skype.  It is the largest purchase ever for Microsoft, who in recent years avoided big ticket acquisitions since the lackluster results of its purchases of adQuantive and Danger (the makers of the sidekick phone, which gave Microsoft the flop known as the Kin). Microsoft …

Continue reading

Permanent link to this article: https://betweenthenumbers.net/2011/05/how-to-make-skype-worth-8-5-billion-dollars/