People are irrational when it comes to computers and sound, and doubly so when the computer is running Linux. Learn how to stay calm and make sound work for you.
Written by Seth Kenlon
A slideshow featuring five tips for avoiding common pitfalls in negotiating cloud SLAs. January 2015. My first piece for InformationWeek.
Recommended by Joe Stanganelli
Sentiment analysis -- linguistic sentiment analysis on social media content, in particular -- has the power to predict the future. Part of a point/counterpoint. My first piece for All Analytics. August 2011.
Written by Joe Stanganelli
Phoenix based Symple PC, which offered refurbished “web workstations” running Ubuntu for $89, has evidently ridden off into the night of no return. Since at least August 24, the company’s website has said the product is “No Longer Availabe,” although the website remains operational.
Written by Christine Hall
Find out how the Internet Archive began, its continued mission, and how it helps keep free culture alive!
Written by Seth Kenlon
Adobe researcher Sylvain Paris explains how a new method of combining Gaussian and Laplacian pyramids results in image filters that can enhance details without distorting edges.
Written by Tom Geller
When Amazon rolled out its cloud E-mail package, it talked a lot about user-controlled encryption. What it neglected to mention was that it retained backdoor access--which it planned to use.
Written by Evan Schuman
If there's anyone left on the planet who thinks Linux is written by undateable guys in their parents basement, the latest Linux Foundation report, Linux Kernel Development: How Fast It is Going, Who is Doing It, What They Are Doing and Who is Sponsoring It, should put an end to that delusion.
Written by Steven J. Vaughan-Nichols
The "smart" electric grid has held great promise for 15 years, but it's not always been clear how deeply it's penetrated our infrastructure -- or what benefits it's delivered. The current state of smart-grid technology, who's implemented it, and where improvements are likely to appear.
Written by Tom Geller
Ph.D.s: Want a month of all-expenses-paid training, with a six-figure job waiting for you when you're done? That's what a new crop of "data-science boot camps" offer -- for those who qualify.
Written by Tom Geller
The ffmpeg video editing command, explained in detail by an industry (both the Linux and the film industries) professional.
Written by Seth Kenlon
Why survey customers if you're not going to directly act on what they tell you? September 2011.
Written by Joe Stanganelli
Researchers predict that "2024 is the end" for NAND-based SSD tech. From February, 2012.
Written by Joe Stanganelli
Nobody who matters is saying what many of us without influence have known since long before the World Trade Center came crashing down; that military action alone will not solve the problem of so-called “Islamic terrorism.”
Written by Christine Hall
Are car sensors the next cool thing, or an invasion of privacy?
Written by Teresa Meek
Article about vehicle-to-vehicle (V2V) communication, touching on vehicle-to-infrastructure (V2I) efforts, government involvement, and models that feature V2V technologies.
Written by Tom Geller
Faced with an onslaught of privacy problems, Uber commissioned an investigation into its privacy. But the investigators were handcuffed to such a degree that it served more to undermine than to boost confidence.
Written by Evan Schuman
Amazon is pulling the plug on projects faster than ever. Are it becoming more responsive, cutting back on due diligence or simply losing its nerve?
Written by Evan Schuman
A blog post for lynda.com to support my video course, "Freelancing Fundamentals".
Written by Tom Geller
Videojournalism about how researchers are teaching computers to understand the processes that create human emotion, possibly leading to better decisions and human-computer interfaces.
Written by Tom Geller
A look at the Linux desktop over the course of 10 years.
Written by Seth Kenlon
Netflix-like customer-service surveys -- consisting of but one question -- miss the bigger picture. August 2011.
Written by Joe Stanganelli
Despite what Europeans and big banks have to say, EMV is far from perfect. My first piece for Enterprise Efficiency. December 2011.
Written by Joe Stanganelli
Should privacy advocates be concerned now that Google is migratin all Gmail users to Inbox?
Written by Christine Hall
What is 'good enough' security and when you need something better.
Written by David Strom
These days, mobile tech has to both work well and look good. These stylish portable battery chargers can keep your mobile devices running through the day -- and attract envious looks at your next power lunch.
Written by Barbara Krasnoff
It's a classic security Catch-22. The government wants enterprises to share the most sensitive security details, on the rationale that it will make everyone more secure. Businesses are insisting on strict liability and the government agrees. But the specifics don't add up.
Written by Evan Schuman
Videojournalism about an online system that interprets newsfeeds, placing items on a map and categorizing them in various ways.
Written by Tom Geller
Stephen Gould discusses image understanding and pixel labeling, the topic of "Scene Understanding by Labeling Pixels" from the November 2014 Communications of the ACM.
Written by Tom Geller
Videojournalism introducing a paper that outlines how both computers and members of natural communities (such as ants, birds, and cells) cooperate.
Written by Tom Geller