The most dangerous data breach ever known

The most dangerous data breach ever known

If the federal government can't protect extraordinarily sensitive data on its own employees, should it be collecting data on the rest of us?

06/29/15

Net neutrality will prove as evil as the VCR

Net neutrality will prove as evil as the VCR

Everything old is new again, and the same tired threats will prove to be false once more

06/22/15

Build from best practices, but use your judgement too

Build from best practices, but use your judgement too

Sometimes best practices avoid past mistakes, and sometimes they create new ones

06/15/15

SourceForge: The end can't come too soon

SourceForge: The end can't come too soon

Don’t look now, but one of the first and largest open-source project hosting services has turned into a zombie

06/08/15

Those maddening, mysterious networking problems

Those maddening, mysterious networking problems

No matter how impossible it seems, there must be a solution -- and we have no choice but to find it

06/01/15

Code injection: A new low for ISPs

Code injection: A new low for ISPs

Beyond underhanded, Comcast and other carriers are inserting their own ads and notifications into their customers’ data streams

05/26/15

The Venom vulnerability: Little details bite back

The Venom vulnerability: Little details bite back

Bad attacks rarely come through the front door -- instead, the old cracks let in the problems

05/18/15

Flexibility vs. complexity: IT's double-edged sword

Flexibility vs. complexity: IT's double-edged sword

Sometimes a fixed path is beneficial, and sometimes you need room to maneuver

05/11/15

Don't get hung up on best practices

Don't get hung up on best practices

When it comes to designing real apps in the real world, best practices aren't always applicable

05/04/15

Disaster averted: The Comcast-TWC merger is dead

Disaster averted: The Comcast-TWC merger is dead

The dreaded mega merger is kaput, but the central problem remains: We need more ISP competition

04/24/15

Users in pre-production? It can work for IT

Users in pre-production? It can work for IT

Granting early access to IT project stakeholders is not always a bad move

04/20/15

Dear Apple: Your upgrade policy sucks

Dear Apple: Your upgrade policy sucks

Apple’s ‘my way or the highway’ upgrade policy for OS X really needs to change

04/13/15

Kludges are a scourge -- except when they aren't

Kludges are a scourge -- except when they aren't

You should know real kludges when you see them, but sometimes a quick hack turns out to be the best way to go

04/06/15

Put your API on a JSON diet

Put your API on a JSON diet

Slimming down your JSON payload can bring significant savings in the mobile era, but beware overdoing it to the point of illegibility

03/30/15

APIs aren’t apps: Make them as thin and light as possible

APIs aren’t apps: Make them as thin and light as possible

For fast and scalable APIs, forget the heavy frameworks and go lean

03/23/15

Life after virtualization: More data center tech for less

Life after virtualization: More data center tech for less

VMware’s vSphere 6 release marks the end of one chapter of the virtualization story, but another has already begun

03/16/15

Bash is more powerful than you think

Bash is more powerful than you think

Perl, Python, and Ruby modules can ease development for large projects, but Bash is simpler and better for many tasks

03/09/15

Snowed in? That’s why you set up remote access

Snowed in? That’s why you set up remote access

Remote power control, automated network testing, and plenty of error checking are almost as good as being there

03/02/15

Lenovo Superfish: Corporate greed meets cluelessness

Lenovo Superfish: Corporate greed meets cluelessness

Lenovo undermined its customers' Internet security either accidentally or on purpose; which is worse?

02/23/15

Lenovo shows us why we need to reinvent Web security

Lenovo shows us why we need to reinvent Web security

What was Lenovo thinking? We can only hope the company's disastrous decision to install adware on laptops that opens users to attack will inspire the industry to revamp SSL

02/19/15

Load More