A slideshow featuring five tips for avoiding common pitfalls in negotiating cloud SLAs. January 2015. My first piece for InformationWeek.
Recommended by Joe Stanganelli
Sentiment analysis -- linguistic sentiment analysis on social media content, in particular -- has the power to predict the future. Part of a point/counterpoint. My first piece for All Analytics. August 2011.
Phoenix based Symple PC, which offered refurbished “web workstations” running Ubuntu for $89, has evidently ridden off into the night of no return. Since at least August 24, the company’s website has said the product is “No Longer Availabe,” although the website remains operational.
Find out how the Internet Archive began, its continued mission, and how it helps keep free culture alive!
Written by Seth Kenlon
Adobe researcher Sylvain Paris explains how a new method of combining Gaussian and Laplacian pyramids results in image filters that can enhance details without distorting edges.
When Amazon rolled out its cloud E-mail package, it talked a lot about user-controlled encryption. What it neglected to mention was that it retained backdoor access--which it planned to use.
If there's anyone left on the planet who thinks Linux is written by undateable guys in their parents basement, the latest Linux Foundation report, Linux Kernel Development: How Fast It is Going, Who is Doing It, What They Are Doing and Who is Sponsoring It, should put an end to that delusion.
Written by Steven J. Vaughan-Nichols
The "smart" electric grid has held great promise for 15 years, but it's not always been clear how deeply it's penetrated our infrastructure -- or what benefits it's delivered. The current state of smart-grid technology, who's implemented it, and where improvements are likely to appear.
Ph.D.s: Want a month of all-expenses-paid training, with a six-figure job waiting for you when you're done? That's what a new crop of "data-science boot camps" offer -- for those who qualify.
Why survey customers if you're not going to directly act on what they tell you? September 2011.
Researchers predict that "2024 is the end" for NAND-based SSD tech. From February, 2012.
Nobody who matters is saying what many of us without influence have known since long before the World Trade Center came crashing down; that military action alone will not solve the problem of so-called “Islamic terrorism.”
Are car sensors the next cool thing, or an invasion of privacy?
Written by Teresa Meek
Article about vehicle-to-vehicle (V2V) communication, touching on vehicle-to-infrastructure (V2I) efforts, government involvement, and models that feature V2V technologies.
Faced with an onslaught of privacy problems, Uber commissioned an investigation into its privacy. But the investigators were handcuffed to such a degree that it served more to undermine than to boost confidence.
Amazon is pulling the plug on projects faster than ever. Are it becoming more responsive, cutting back on due diligence or simply losing its nerve?
A blog post for lynda.com to support my video course, "Freelancing Fundamentals".
Videojournalism about how researchers are teaching computers to understand the processes that create human emotion, possibly leading to better decisions and human-computer interfaces.
Authors Filippo Bonchi and Damien Pous discuss "Hacking Nondeterminism with Induction and Coinduction," their Research Highlights article published in the February 2015 Communications of the ACM.
Netflix-like customer-service surveys -- consisting of but one question -- miss the bigger picture. August 2011.
Despite what Europeans and big banks have to say, EMV is far from perfect. My first piece for Enterprise Efficiency. December 2011.
Should privacy advocates be concerned now that Google is migratin all Gmail users to Inbox?
What is 'good enough' security and when you need something better.
Written by David Strom
These days, mobile tech has to both work well and look good. These stylish portable battery chargers can keep your mobile devices running through the day -- and attract envious looks at your next power lunch.
Written by Barbara Krasnoff
It's a classic security Catch-22. The government wants enterprises to share the most sensitive security details, on the rationale that it will make everyone more secure. Businesses are insisting on strict liability and the government agrees. But the specifics don't add up.
Videojournalism about an online system that interprets newsfeeds, placing items on a map and categorizing them in various ways.
Stephen Gould discusses image understanding and pixel labeling, the topic of "Scene Understanding by Labeling Pixels" from the November 2014 Communications of the ACM.
Videojournalism introducing a paper that outlines how both computers and members of natural communities (such as ants, birds, and cells) cooperate.