Home Page

In-Car Sensors Put Insurers in the Driver's Seat
Are car sensors the next cool thing, or an invasion of privacy?
Car Talk
Article about vehicle-to-vehicle (V2V) communication, touching on vehicle-to-infrastructure (V2I) efforts, government involvement, and models that feature V2V technologies.
Uber shows how not to do a privacy report.
Faced with an onslaught of privacy problems, Uber commissioned an investigation into its privacy. But the investigators were handcuffed to such a degree that it served more to undermine than to boost confidence.
Amazon Learns To Fail Faster
Amazon is pulling the plug on projects faster than ever. Are it becoming more responsive, cutting back on due diligence or simply losing its nerve?
Freelancers: Want Regular Pay? Consider a Retainer Agreement
A blog post for lynda.com to support my video course, "Freelancing Fundamentals".
Computationally Modeling Human Emotion (video)
Videojournalism about how researchers are teaching computers to understand the processes that create human emotion, possibly leading to better decisions and human-computer interfaces.
Hacking Nondeterminism with Induction and Coinduction (video)
Authors Filippo Bonchi and Damien Pous discuss "Hacking Nondeterminism with Induction and Coinduction," their Research Highlights article published in the February 2015 Communications of the ACM.
Six great laptops ready for Windows 10
From powerhouses to light 2-in-1 models, these laptops -- including two ThinkPads and a MacBook Pro -- should all run Windows 10 like champs.
Business Insider: Apple is the New China
While restrictive, Apple is a company every tech firm must work with.
Embracing Change in the Digital Workplace
Businesses don't approach the job of information management the same way they did five years ago. So it does not make sense that technology news should perceive this job the way it did in 1990.
Closer look at 'good enough' security after recent data breaches
What is 'good enough' security and when you need something better.
11 chic chargers: Portable power that's dressed to impress
These days, mobile tech has to both work well and look good. These stylish portable battery chargers can keep your mobile devices running through the day -- and attract envious looks at your next power lunch.
White House Proposal For Sharing Corporate Security Info Full Of Holes
It's a classic security Catch-22. The government wants enterprises to share the most sensitive security details, on the rationale that it will make everyone more secure. Businesses are insisting on strict liability and the government agrees. But the specifics don't add up.
Reading News with Maps by Exploiting Spatial Synonyms (video)
Videojournalism about an online system that interprets newsfeeds, placing items on a map and categorizing them in various ways.
Scene Understanding by Labeling Pixels (video)
Stephen Gould discusses image understanding and pixel labeling, the topic of "Scene Understanding by Labeling Pixels" from the November 2014 Communications of the ACM.
Distributed Information Processing in Biological and Computational Systems (video)
Videojournalism introducing a paper that outlines how both computers and members of natural communities (such as ants, birds, and cells) cooperate.
Art of the pitch: Use a tablet and Powerpoint
Pitching ideas or business proposals gets an advantage when done up close and personal.
3 reasons Microsoft will become the most impressive tech company
Once a plodding behemoth, the new Microsoft is increasingly nimble, responsive to feedback and focused on mobile. James Kendrick is very impressed with Redmond's ongoing transformation of its products and services.
Forbes: How Much Do Average Apps Make?
A review of the long tails in the app stores.
The information / communications dichotomy
As the debate came to a head last December over whether the FCC should reclassify the Internet as a telecommunications service under Title II of the Telecom Act of 1934, Scott examined why neither side of the two-sided coin was the right one to be associated with.
Local Laplacian Filters: Edge-aware Image Processing with a Laplacian Pyramid (video)
Adobe researcher Sylvain Paris explains how a new method of combining Gaussian and Laplacian pyramids results in image filters that can enhance details without distorting edges.
Can You Trust Amazon's Workmail?
When Amazon rolled out its cloud E-mail package, it talked a lot about user-controlled encryption. What it neglected to mention was that it retained backdoor access--which it planned to use.
Who's writing Linux today? Capitalists
If there's anyone left on the planet who thinks Linux is written by undateable guys in their parents basement, the latest Linux Foundation report, Linux Kernel Development: How Fast It is Going, Who is Doing It, What They Are Doing and Who is Sponsoring It, should put an end to that delusion.
Waiting for the Smart Grid
The "smart" electric grid has held great promise for 15 years, but it's not always been clear how deeply it's penetrated our infrastructure -- or what benefits it's delivered. The current state of smart-grid technology, who's implemented it, and where improvements are likely to appear.
Boot Camps Promise PhDs Fast Track to a Data Science Career
Ph.D.s: Want a month of all-expenses-paid training, with a six-figure job waiting for you when you're done? That's what a new crop of "data-science boot camps" offer -- for those who qualify.
Energy Harvesting Extends Life of Small Devices
Article about using power gathered from radio waves, heat, and motion to power small devices such as sensors and cell phones.
10 good iPad apps for productivity
The iPad is a capable tool for work but requires good apps to provide the needed functionality. These 10 apps will go a long way to meeting the needs of most iPad users. You can't work all the time so we threw in a hot new game for down time.
NY Observer - Occupy Wall Street as a Startup
How companies can learn organizational behavior from Occupy Wall Street
NY Times - The Television Will Be Revolutionized
With streaming services competing with Hollywood and media networks, how will the concept of "television" evolveā€”if at all?
Checkpoint, Watchguard earn top spots in UTM shootout
When it comes to unified threat management appliances aimed at the SMB market, vendors are finding a way to fit additional security features into smaller and more powerful appliances.