Skip to content

Kevin Powers

Customer Experience Curator – Audio Engineer – Executive Briefings – Collaborator

  • Dallas Eclipse…North Dallas based classic rock band…We looking forward to playing for you in 2025
    • Dallas Eclipse: These guys are good – November Update!
  • Kevin J Powers Bio
Posted on December 26, 2019December 26, 2019 by Kevin

New Year – New Assumptions

Challenge your assumptions

Measure your success – set you goals

Specify

Measurable

Acton-able

Realistic

Time-Bound

CategoriesContent

Post navigation

Previous PostPrevious The power of Neuroscience
Next PostNext Live Sound with Buford Jones

Security * Music * Artificial Intelligence

  • Cybersecurity
  • Billboard
  • AI
5 Skills That Will Serve You in Your Security Career
6 May 2026

An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group. [...]

Research: Microsoft Edge Loads Stored Passwords in Cleartext
7 May 2026

A researcher found that Microsoft Edge will load saved passwords into memory in plaintext, even when they are not being used.  [...]

Cybersecurity Professionals Sentenced to Prison for Ransomware Attacks
4 May 2026

Two cybersecurity professionals were imprisoned for their role in a string of 2023 ransomware attacks.  [...]

GYRO.Group Recruits Digital Music Veteran Henry Compton
13 May 2026

"Our goal is to be the biggest net exporter of Australian music, and every decision we are making right now," says group CEO Andy Irvine, "is pointed directly at that." [...]

Journey Adds 40 More Dates to 2026 Final Frontier North American Tour
13 May 2026

The fresh late fall gigs will come on top of 28 previously announced shows slated to kick off on Friday (May 15) in Tampa. [...]

Pearl Jam Announce First Gig Since Drummer Departure With 2026 Ohana Festival Lineup
13 May 2026

This years event will also feature sets from Tyler Childers, Maná, Alabama Shakes, Pixies, Fontaines D.C., Billy Idol and more. [...]

How intelligent were Neanderthals?
25 August 2025

Exploring Neanderthal intelligence reveals how ancient human minds, modern cognition, and today’s evolving artificial intelligences each reflect different paths toward problem-solving and creativity. [...]

Cybersecurity and LLMs
13 November 2025

Large language models are becoming both powerful security tools and high-value targets, creating new attack surfaces where multimodal exploits, jailbreaks, prompt leakage, and AI-assisted cybercrime are evolving faster than current defenses. [...]

How to Become Immortal Using AI?
14 May 2025

To achieve digital immortality, begin compiling a rich dataset of your personal writings, voice recordings, and videos to enable AI to recreate your personality and presence for future interactions. [...]

Recent Posts

  • Claddagh – sounds of Ireland
  • Cool Sounds……
  • Dallas Eclipse: These guys are good – November Update!
  • AI powered Bee Hives. Here’s an interesting AI application with unique insights into the live of the Bee Hive.
  • I have often wondered, is it real or just a simulation?

AI Generated Images - Just for Fun

AI Sharks
AI Squarrel
AI Building
AI Super yacht
AI Super Yacht 2
AI Pirate ship
AI Sharks
Kevin J Powers Bio Proudly powered by WordPress
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions. Thanks
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}