Sign in to view Bob’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Bob’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Renton, Washington, United States
Sign in to view Bob’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
11K followers
500+ connections
Sign in to view Bob’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Bob
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Bob
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Bob’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Cybersecurity - Networks - Wireless – Telecom -…
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Services
Articles by Bob
-
The A Priori Assumptions of Modern Information Systems Architecture
The A Priori Assumptions of Modern Information Systems Architecture
Today’s information systems architects start with three a priori assumptions. Everything they do is based on the belief…
16
7 Comments -
VPNs Don’t Hide Your LocationMay 7, 2024
VPNs Don’t Hide Your Location
The title isn’t intended to be provocative or clickbait. It’s simply the truth, in spite of the misleading advertising…
78
10 Comments -
Identifying the Real ProblemMar 20, 2024
Identifying the Real Problem
The problem that you’re wrestling with is seldom the real problem. Finding the root makes all the difference.
20
3 Comments -
The Role of Artificial Intelligence in LearningMar 11, 2024
The Role of Artificial Intelligence in Learning
I’m going to take you on a brief intellectual journey through the history of information storage and retrieval from…
26
15 Comments -
Physical Security for Alarm SystemsFeb 21, 2024
Physical Security for Alarm Systems
Your alarm system provides physical security for your building – but what protects the alarm system? Introduction…
7
7 Comments -
Becoming a Leader, and Teaching LeadershipOct 7, 2022
Becoming a Leader, and Teaching Leadership
There is a theory of cognition that holds that understanding is inseparable from language. Einstein exemplified this…
11
3 Comments -
Sales Tips From A Multi-Million Dollar BuyerSep 29, 2022
Sales Tips From A Multi-Million Dollar Buyer
Do you want to learn how to be a top-tier sales producer? Do you want to be an expert at new business development? I'm…
7
6 Comments -
How To Handle CriticismOct 31, 2021
How To Handle Criticism
A friend of mine just confided that she is sometimes wounded by the words and attitudes of the parents of her students.…
19
4 Comments -
A Crazy Idea to Save the WorldOct 15, 2020
A Crazy Idea to Save the World
I want to give everybody a job. And you can help.
11
2 Comments -
How a Common Corporate Policy Promotes Data TheftAug 14, 2020
How a Common Corporate Policy Promotes Data Theft
Securing your data requires a new way of thinking about your data. CEOs: I'm going to tell you what you want, and then…
10
1 Comment
Activity
11K followers
-
Bob Young posted thisThis morning I solved a client's email problem via text messaging while sitting at the breakfast table in my pajamas. The problem? They could send email at work, but couldn't send on a different computer at home. The solution? "Try power cycling your computer AND your cable modem." And email started working again. I won't invoice for this one. Existing client, customer service and all that. Don't nickel and dime them. Be there when they need you. Charge full bore competitive rates for the real work. #CallMeIfYouNeedMe #FIFONetworks +1 206-465-2422 #TechSupport #RemoteSupport #HelpDesk Cybersecurity - Networks - Wireless – Telecom – VoIP
-
Bob Young posted thisIt's Sunday evening, 5:17pm PDT. I just finished month-end server maintenance for the last client. I have the evening free to sit in the recliner, watch TV, and eat popcorn. Of course, it starts all over again with mid-month maintenance in about two weeks. It's like laundry, or mowing the lawn. You're never REALLY finished... #CallMeIfYouNeedMe #FIFONetworks +1 206-465-2422 Cybersecurity - Networks - Wireless – Telecom – VoIP
-
Bob Young shared thisThis mini-PC (in the yellow circle) was shipped to me from Texas. The owner, a man who lived alone, suffered a major medical event and will never be able to use it again. The person with Power of Attorney sent it to me to crack. I recovered email, a rather insecure password list, information on all utility bills, where banking is done, and so forth. Now the family can proceed with handling the person’s financial affairs. The mini-PC is even easier to ship than a laptop, because it doesn’t have any lithium battery inside. It uses an external AC adapter. #CallMeIfYouNeedMe #FIFONetworks +1 206-465-2422 Cybersecurity - Networks - Wireless – Telecom – VoIP
-
Bob Young shared thisIt’s time for companies to change this website notice to, “You may need to download an application to view PDF documents.” The Portable Document Format (PDF) was originally a proprietary format, but it has been an open standard for many years now. I sign Non-Disclosure Agreements (NDAs) with several of my clients. Adobe’s constant pressure to incorporate their automatic cloud storage and artificial intelligence analysis of documents that are read, created, or edited with their software make their products not just a security risk, but a legal risk. I canceled my Adobe subscription and uninstalled all of their products from every computer I use for work-related tasks. (Full disclosure: my wife still has her Adobe subscription and has no interest in changing products). Opening a PDF file in a web browser is also a security risk if you have an NDA, since many web browser providers are analyzing displayed content. If you have security obligations to your clients, I recommend disabling the viewing of PDF files in the browser, or, better yet, use a less invasive browser for work-related tasks. I’m not making any recommendations in this post (or in the comments) for PDF viewers or browsers, because that would create the impression that this is a sales pitch. If anyone recommends something in the comments, that’s fine, just understand that I’m not making an endorsement here. But back to the original point, in my opening sentence: unless Adobe is paying you to recommend their product on your website, you should drop the reference to Adobe in your PDF notice. It’s an open standard, and recommending a particular product when it’s not a requirement is misleading at best. #CallMeIfYouNeedMe #FIFONetworks +1 206-465-2422 Cybersecurity - Networks - Wireless – Telecom – VoIP
-
Bob Young posted thisOne of the most bewildering aspects of remote tech support is when I connect to the user's computer, there's an error message on the screen telling exactly what to do to fix the problem, and the user says, "Just close that, it always pops up." I respond with, "Well, that's a safe error message, so I'm going to click on it and resolve it so it doesn't keep being an annoyance." And then their problem is fixed and I invoice them. It would make sense to me if they said, "I'm not sure if it's okay to click on that, or if it's trying to trick me." But when they don't think it's related to the problem - I don't know how to explain that. #CallMeIfYouNeedMe #FIFONetworks +1 206-465-2422 Cybersecurity - Networks - Wireless – Telecom – VoIP
-
Bob Young shared thisAre QR codes for restaurant menus safe? Why yes, as a matter of act, they are. And before you start with the “But Bob,” read the whole post. There’s this concept in cybersecurity called a risk assessment. When the restaurant puts an official, restaurant-sponsored QR code linking to their menu on your table, the risk is very low. Click on the link and pick your favorite food and beverage. Did someone tape a new QR code over the original QR code? The risk went up. Ask your server if the restaurant changed the QR code. If they did, the risk is back down. QR codes are a nice benefit in the age of smartphones. They make it much easier to get a complex URL into your browser, and to identify valid concert ticket holders, and many other things. THE LESSON Instead of parroting negative rules (“Don’t do this!” “Don’t do that!”), use your skills and do the analysis. (About the picture: someone on Threads complained about QR codes for restaurant menus. They don’t like them. Fine. Me neither. But then someone posted in the comments, “You should never scan random QR codes this is a huge cybersecurity issue.” And that’s just a gross oversimplification).
-
Bob Young posted thisIf you receive a call from an agency trying to verify someone’s employment, take the call. Return the call if they left a voicemail. Go the extra mile and make the effort. STORY TIME Yesterday a call came from an unknown number, and I was driving, so I let it roll to voicemail. It was an employment verification call. The caller gave me the person’s name and dates of employment, but didn’t say what company they worked for. The employment dates overlapped the time when I was CISO at a national retailer. I didn’t recognize the name, but there were a lot of employees working Help Desk, and the Help Desk Manager reported to me. The company has since gone bankrupt, and they might be having difficulty finding someone to verify employment. So I called back. No joy. I was moved from the automated attendant to a holding queue, and after a few minutes I hung up. Today, they called and left another voicemail. I called back right away, and this time I connected with a real person. I gave them the case number and they looked it up, and I asked questions. It turned out that the woman who wanted her employment verified worked for a company in Florida with a name similar to my company name – it started with “FIFO.” I’ve never done business in Florida, and she never worked for me, but I doubt she lied on her application. The company she listed still exists, and is headquartered in Florida. It’s more likely that the company doing employment verification is having difficulty finding a good contact. THE “ALMOST” PROBLEM What if I had just said, “I don’t recognize that name, she never worked for me?” Right now, finding a job is hell on Earth. Someone is interested in hiring her. I could have destroyed her reputation and prospects for employment by being quick to judge, and speaking without full knowledge of the situation. THE CORRECT RESPONSE If you get a call from an employment verification agency and you don’t recognize the name, ask questions. Get information before jumping to conclusions. In this case I was able to say, “I’ve never had employees in Florida, and that company name is slightly different than mine, so I can’t verify her employment, but you should keep looking and see if you can find someone from the right company.” My unknown friend, best wishes for your job search. I hope you find a job where you can be happy soon.
-
Bob Young posted thisA client has an air gapped system with Microsoft 365 on it. This was a decision on his part, without any prompting from me. I found out about it after the fact. Of course, it quit working without an Internet connection to periodically verify the product is still licensed. When he called looking for a solution, I switched him to LibreOffice and now he’s using Calc for his spreadsheets. Now I’m wondering if I’ll see more of this. Has concern about AI accelerated the move to Free and Open-Source Software (FOSS)?
-
Bob Young posted thisInstead of using fear as a tactic to sell cybersecurity services, I find people who are already concerned about their risk, and offer them calm confidence in exchange for money. UPDATE: Based on comments on another forum (I cross-post a lot), I think my intent may not have been clearly communicated. I don’t mean that I “display” or “radiate” calm confidence. I’m not selling a performance. I mean that I do the things that need to be done so that their anxiety can be replaced by calm confidence. If you truly understand the first sentence of my post, I just gave you a masterclass in cybersecurity sales, and I didn’t charge you a dime. Getting people to part with their money out of fear is a horrible way to make a living. I don’t need to convince people that cybercriminals are bad. They already know that. What they want is assurance that the risk can be reduced to an acceptable level that won’t keep them up at night. Reducing the risk to a manageable level is done through a combination of changes: Policy changes Business operations changes Infrastructure changes Software changes Show them the way out of the forest fire. #CallMeIfYouNeedMe #FIFONetworks +1 206-465-2422 Cybersecurity - Networks - Wireless – Telecom – VoIP
-
Bob Young liked thisBob Young liked thisThe White House has a new App. The terms contain a single sentence that matters more than any other: "Information You Give Us May be Shared with Other Government Agencies." Mitch Jackson digs into the App's privacy implications -- must read. But in a nutshell, I'm a HARD-NO on this download.The White House Built a Surveillance App and Calls It a News FeedThe White House Built a Surveillance App and Calls It a News FeedMitch Jackson
-
Bob Young liked thisIn public safety, the conversation around drones and RF threats often starts with detection. But detection is only the beginning. The more difficult challenge is integration. Through my work as an Integrations Manager, along with SIGINT experience in both CONUS and OCONUS environments, one thing has become increasingly clear: the gap is rarely the sensor itself. The real gap is how quickly and reliably data can be fused into something an operator can trust and act on. That matters now more than ever. As public safety and national security agencies continue investing in C-UAS, RF awareness, and sensor-driven operations, the focus cannot stop at collection alone. Detection without context creates noise. Detection without integration creates delay. And delay, in real-world environments, has consequences. That is why I believe the next phase of public and national safety will be shaped less by who has the most sensors, and more by who can best integrate RF awareness, video, geospatial context, and operational workflows into a usable operational picture. Because in the field, teams do not need more disconnected alerts. They need confidence. They need context. They need systems that support decisions under pressure. The future of C-UAS, SIGINT, and RF-enabled public safety will not be defined solely by what we can detect. It will be defined by what we can trust, operationalize, and act on in time to matter. #PublicSafety #NationalSecurity #CUAS #SIGINT #SensorIntegration #Interoperability #SituationalAwareness #CriticalInfrastructure
-
Bob Young liked thisBob Young liked thisI just read an AI bro comment that being totally dependent on AI for getting your work done is fine "as long as you can reason about it." Newsflash: Doesn't matter if you can reason about it or not when the AI goes down and you are unable to get your work done. The work still ain't done.
Experience & Education
-
FIFO Networks
**** *********** ********** * ** *************** ************** **********
-
******** *********
***** *********** ******** *******
-
******* ********* *******
********* **********
View Bob’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Publications
-
The Software Developer's Code of Ethics
FIFO Networks
See publicationProvides ethical guidelines for application development.
-
Wireless Network Security
Sold-out webinar on wireless network security, focused on mobile networks.
Languages
-
English
-
Recommendations received
4 people have recommended Bob
Join now to viewView Bob’s full profile
-
See who you know in common
-
Get introduced
-
Contact Bob directly
Other similar profiles
-
Corey Kirkendoll, MBA, CISSP, CCSA, CHP, CCIE
Corey Kirkendoll, MBA, CISSP, CCSA, CHP, CCIE
5K Technical Services
8K followersDallas-Fort Worth Metroplex
Explore more posts
-
Wes Robinson
Eastex Telephone Cooperative • 2K followers
And Utah releasing results tonight as well. Utah is proposing to utilize $231M (73%) of its eligible BEAD funding to serve 32,261 eligible locations and CAIs. The technology mix is fiber (55%), LEO (25%), LFW (17%) and ULFW (2%). #BEAD #RuralBroadband
27
-
Ceragon Networks
107K followers
Discover how the City of Mesa is closing the digital divide without the fiber delays. With Ceragon’s MultiHaul™ TG mmWave network, the city now connects neighborhoods, parks, and downtown corridors with gigabit-speed Wi-Fi that’s fast, scalable, and cost-effective. Link to the Case Study is in the first comment 👇
22
1 Comment -
Harmonic
46K followers
GCI Communication Corp. is transforming broadband services across Alaska with the power of Harmonic’s cOS™ virtualized broadband platform. We are thrilled to partner with GCI as they offer DOCSIS 4.0 services with multi-gigabit speeds and high-quality broadband experiences to communities across Alaska. GCI’s leap to DOCSIS 4.0 is fast tracked by Harmonic’s turnkey solution. From start to finish, our expertise drives seamless transition to blazing-fast broadband with minimal disruption for customers. 📍 Full story in the comments #HarmonicBroadband #DOCSIS #BroadbandInnovation #HarmonicTechExpo25 #SCTE #TechExpo25
75
2 Comments -
Dean Bubley
30K followers
Really interesting announcements today from Wireless Broadband Alliance (WBA) about the ability for emergency calls and security / preparedness communications to connect via #WiFi networks and #OpenRoaming, for resiliency and extra in-building reach. There's a three reports and multiple angles here: - Automated connection of phones and other devices to Wi-Fi for 911 / 999 / 112 calls via OpenRoaming, even if there's normally some other authentication method needed. This is broadly similar to the cross-network roaming for emergency calls across cellular networks, and works irrespective of subscription status - Ability to use #WiFiCalling for #emergency #voice comms. (This is for public calls to emergency services, not for first responders' own critical radio comms) - Prioritisation of public safety and "emergency preparedness" traffic on Wi-Fi networks, despite any network congestion. During critical incidents, there can be a huge surge of traffic, especially if mobile infrastructure is damaged (eg in a hurricane). Being able to dedicate capacity or prioritise usage by key personnel or devices makes both the Wi-Fi network and overall communications more resilient and suitable for first responders. - Better location-awareness and use of the Wi-Fi infrastructure for positioning, especially indoors, and the ability to communicate that to the public-safety dispatchers and systems. Based on a quick scan of the documents, some of these features are dependent on newer #Wi-Fi7 systems, with others designed to function on older variants. In general, I think this is an excellent move - in many emergency situations, Wi-Fi and fixed/fibre networks may be more tolerant of outages than cellular, and there will also be some users with Wi-Fi only devices. It adds to the options for communications and network coverage, and also seems to have been designed in a way to minimise possible user intervention and confusion in stressful situations. However, there will be a need in some cases to have some sort of "emergency profile" included in devices. I'd say this is also a very good way to encourage broader adoption of PassPoint and OpenRoaming by enterprises, building owners, CSPs and device vendors - and could also prompt regulators / policymakers to consider it as mandatory. Lastly, I think this is a step in the right direction to a broader view of emergency communications. As well as different access networks - mobile, fixed, Wi-Fi and soon satellite - I think that there should be a much broader "emergency API" approach, so that calls can be initiated in messaging apps, or even from AI voice platforms, going beyond some limited use of things like smart speakers or in-car eCall today. I'll also be covering emergency aspects of Wi-Fi on my enterprise innovations panel at the WBA #WGCEMEA conference in Paris next week. #publicsafety #firstresponders #criticalcommunications #wifi #telecom #regulation https://lnkd.in/eGkDYVgQ
52
13 Comments -
Fiber Frank
VIAVI Solutions • 9K followers
How do you achieve flawless fiber networks? 1. Testing is the only way to verify the quality of your network. 2. Automated workflow management is vital to an efficient testing process. 3. There’s no one size fits all approach. The right test, assurance and monitoring solutions for your network are entirely dependent on your network topology, operational processes and business models. 4. Partner with VIAVI – versatility and adaptability are built into our portfolio, and we can scale with you as your business grows. Download the brochure now to learn more! #FiberOptics #NetworkTesting #OTDR #FiberInspection #FiberExperts #SmarterTesting
34
1 Comment -
Joel Lindholm
InfiniG • 3K followers
A Utah school had no usable cellular service inside. Calls dropped. Texts failed. Emergency calls didn’t go through. InfiniG partnered with AT&T and T-Mobile to bring their signal indoors - delivering reliable voice and data coverage in every hallway and classroom. Now staff, students, and parents stay connected when it matters most.
80
2 Comments -
Imad Memon
5K followers
Sharing slides from a webinar on 'Wireless Spectrum - Approaches to Licensing', presented by FCC's Wireless Telecom Bureau Chief. The topics include: - General principles for accessing spectrum, - Licensed spectrum rules and configuration, - Secondary markets, - Spectrum transition mechanisms - Case studies. I personally believe that spectrum hoarding should not be permitted. In the context of Pakistan, it should be auctioned on 'Use it or share it' basis. Spectrum leasing / sharing should be permitted. New concepts of 'Supplemental Coverage from Space' (SCS) should be explored. And the tiered spectrum access system should be expanded to frequency bands other than CBRS as well.
16
-
Norm Dumbroff
2K followers
📶 The CBRS conversation is far from over — and that's a good thing. This Broadband Communities article explores the ongoing push-pull between access and efficiency in the CBRS band. As more providers lean on shared spectrum to expand coverage and capacity, how we manage it matters more than ever. Thoughtful insights here on striking the right regulatory and operational balance to ensure CBRS remains both open and effective. https://lnkd.in/g8mgvfXe
10
-
Greg Friesen
Ciena • 4K followers
The Chippewa Cree Tribe of the Rocky Boy’s Reservation of Montana recently turned up a new broadband network leveraging Ciena’s broadband solution that provides fast, reliable, and affordable internet access to its tribal households, businesses, and public service entities, such as the health center, police department, and schools. Learn more at https://bit.ly/4l5cOSF
46
1 Comment -
Washington State Department of Commerce
19K followers
Washington state takes a major step to bridge the digital divide! The Washington State Broadband Office (WSBO) has submitted its Final Proposal to the federal government for the Broadband Equity, Access, and Deployment (BEAD) Program in an effort to unlock $1.2 billion to expand high-speed internet across the state. Next steps: Once the National Telecommunications and Information Administration approve the proposal, expected by December, WSBO will announce awards and begin funding broadband projects statewide. Learn more and view the proposal: https://heyor.ca/KkI1Xp
31
-
Matt Knebl
Spectrum Guardian • 2K followers
Spectrum Watch 2025: Will T-Mobile Clear the PCS G-Block for Satellites? 🍿 Following strong interest in my recent post showing LTE signals from space, we’re kicking off Spectrum Watch 2025 — a short series tracking T-Mobile’s use of the PCS G Block (1990–1995 MHz) as the July 23 launch of paid direct-to-cell service with SpaceX approaches. Why does this matter? This spectrum is currently used for both terrestrial service and space-based text messaging in a free trial. But expectations will rise with the switch to paid service. If T-Mobile clears this band from ground use, it could dramatically improve satellite reliability — and open the door to future services like voice and data. Of course, pulling spectrum from terrestrial networks reduces local capacity, so any tradeoff will need to be strategic. This short video of the G Block today in suburban southern California shows usage by terrestrial cell sites. Do you think T-Mobile will stop using this spectrum on terrestrial sites? #spectrumwatch2025 #wireless #spectrum #LTE #satellite #directtocell #SpaceX #PCSGBlock #wirelessinnovation #spectrumguardian #rfengineering #rfanalysis
48
4 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Bob Young in United States
-
Bob Young
Pleasant Grove, UT -
Bob Young
Greater Philadelphia -
Bob Young
Santa Cruz, CA -
Bob Young
Amherst, NH -
Bob Young
Columbus, Ohio Metropolitan Area
3521 others named Bob Young in United States are on LinkedIn
See others named Bob Young