The Problem With Selling Information Security as a “Business Enabler”
A random, innocent tweet by Gunnar Peterson (@oneraindrop) got me emoting about whether or not Information Security should be viewed/pitched...
Read more →A random, innocent tweet by Gunnar Peterson (@oneraindrop) got me emoting about whether or not Information Security should be viewed/pitched...
Read more →A friend recently forwarded me an email I sent to him in 2004. It was part of conversation about where...
Read more →This is the best argument I’ve come across for why git is special and worth your time. I’ve seen glimpses...
Read more →This is one of the best refutations of the standard creationist arguments I’ve seen in a short video format. Combined...
Read more →The subject of character mapping and encoding is formidable, and many confuse the various schemes and standards available. As a...
Read more →I lack the words, but I don’t need them. I sometimes realize that I’m hesitant to talk about my love...
Read more →I inwardly smile when I hear the term “Unified Threat Management”. It means different things to different people, but to...
Read more →So everyone knows that UTF-8 encodes Unicode code points into eight bits, and UTF-16 encodes Unicode code points into 16...
Read more →A friend of mine (I’ll identify him if he so desires) sent me the following email: I think this is...
Read more →The über-tech-geek culture has a problem with tool obsession. Twitter, Friendfeed, Google Reader–these are all basics, but each of these...
Read more →This is an exciting protocol. I want to use it to get my various services’ content into Friendfeed, and to...
Read more →Scenario You have an Asterisk server behind a Check Point firewall trying to contact a VOIP provider located on the...
Read more →