A long time ago, I had to learn from scratch how to manage visual designers, after having started out as a composer and audio producer, with no training in graphic arts -- back then I thought of it as "the blind leading the deaf." Luckily, I found that most of the skills I'd developed while working with sound carried over to other disciplines, too. There's one skill above all that I believe managers need to master in order to get the best work from a designer, or any creative professional: Talk about why, not how.
On February 20, 2014 prPIG will celebrate our first anniversary with an open format meeting with lightning talks from the community. The meeting will be held at 7:00pm in the Puerto Rico Science, Research, & Technology Trust. More details www.prpig.org.
10 steps that help online systems architects build authentication systems that empower their users to protect themselves against the multi-site attack strategies behind a number of recent high-profile attacks.
In research, what really matters is not what people tell you -- but what is behind it
Big chunks of the solution to our current "NSA" problems are a solved problem in computer science. Unfortunately, they were solved back in the mainframe era and put on the shelf as too expensive. It's now time to bring some...
The U.S. NSA, our own CSE and various security services are in the midst of a thorough, professional effort to obtain access to everyone's communications, to be able to read them immediately, and to be able to save them away and read them later.
Once upon a time, Exchange administrators only needed to know how to work with physical servers that were located on site. Today's Exchange administrators need to know how to work with local and remote Exchange servers, Exchange Online, and hybrid...
One of the little discussed features of the Tesla Model S is that it is another block in the "Internet of Things" in which everything has an API and everything needs to be secured reasonably. There's a common thing emerging in the Internet of Things in which security is an afterthought in API design. While the Tesla Model S REST API does not compromise the safety of the vehicle, it carries an authentication architecture that is lacking.
This is a story about a video game with the emotional power of a movie.
"Who's using your API" was the title of my presentation at the API Strategy & Practice Conference that happened on February 21 and 22, 2013 in New York City. One of the conference takeaways was the concern that almost everybody...