I have tried to put in handy page tabs on the top nav bar to link you to most of my current work, but there are some other notable works that don’t easily fit. Here are links to these efforts. Note, blogs come and go, some links may no longer be active.
I began writing articles and working as the site evangelist in August 2015. Here is a link to my work.
In the summer of 2016, I began writing for Penton’s WindowsITpro site. Here are links to my articles:
- Going beyond the password (9/16)
- Microsoft ups its Azure security features (9/16)
- Choosing among various Slack-like communication tools (8/16)
- The best tools to predict and manage cloud computing costs (8/16)
Quickbase Blog The Fast Track
- Better ways to manipulate data than Google Docs (7/16)
- Is it Time for Citizen Developers to Replace IBM Notes (7/16)
- Signs You Should Replace Microsoft Access with an Online Database (7/16)
- The benefits of being in a hackathon (6/16)
- How Can a Non-Programmer Learn to Build Business Applications? (6/16)
- Lessons Learned From IT Asset Management (6/16)
- How Citizen Developers Can Manage Their Own Apps Better (6/16)
- How to make meetings more productive (4/16)
- How much code do you need to collaborate (4/16)
- Signs your team is misusing email for collaboration (4/16)
- Recognize the warning signs of spreadsheet abuse (3/16)
- Spreadsheet horror stories (9/14)
- Time to end spreadsheet abuse (3/14)
- Why firewalls aren’t your only friend (7/16)
- What kind of tools do you need to secure mobile apps? (5/16)
- Why is SQL injection still around? (3/16)
- What is a booter and a stressor? (12/16)
- The challenges and opportunities for managing IoT (12/16)
- Who are the bug bounty hunters (11/16)
- How to heighten HIPAA security (10/16)
- Looking closer at the terrorist toolbox (forthcoming)
- Why grammar counts in decoding phished emails (10/16)
- How to communicate to your employees after a breach (9/16)
- 6 Lessons Learned from the US Secret Service on How to Protect Your Enterprise (9/16)
- Economist paints a dark future for banking industry (8/16)
- Wireless keyboards vulnerable to hacking (8/16)
- Hacking Your Network Through Smart Light Bulbs (8/16)
- Windows 10 Anniversary security features: worth the upgrade (8/16)
- How to implement the right BYOD program (8/16)
- The benefits and risks of moving to BYOD (8/16)
- There is no single magic bullet for IoT protection (7/16)
- Beware of wearables (7/16)
- Understanding the keys to writing successful ransomware ((7/16)
- It’s Time to Improve Your Password Collection (6/16)
- Euro banking cloud misperceptions abound (6/16)
- Beware of ransomware as a service (6/16)
- When geolocation goes south (5/16)
- Turning the tide on polymorphic malware (5/16)
- How stronger authentication can better secure your cloud (4/16)
- The Internet-connected printer can be another insider threat (4/16)
- Beware of malware stealing credentials (4/16)
I wrote a series how-to articles for this site in the summer of 2015. A complete collection of my articles can be found here. They cover how to set up various VPNs and other products.
Ah, the dearly departed. I wrote longer research papers for the subscription side of GigaOm, called GigaOm Pro, between 2012-14. It was fun while it lasted.
- Customer-driven infrastructure: building future apps (June 2014)
- A progress report on OpenStack (November 2012)
- Understanding cloud costs. (Aug 2012)
- Virtualization Trends 2012-13 (Aug 2012)
VMware Erdos/IToutcomes blogs
I began writing several items for them in 2015:
- How to defend the cloud (7/15)
- Simplifying storage solutions (4/15)
- Virtualize Scale-up, Scale-out, and Every Application in between (4/15)
Bright Computing Blog
During 2013 I wrote a couple of networking stories for this site:
- 100Gbps and beyond: What lies ahead in the world of networking
- Merge ahead? Why it’s not time to converge your networks
Solution Providers for Retail blog
(This blog has been taken down, sorry.) Between 2013-15, I contributed a series of articles on how VARs can better support their retail customers, including information gleaned from an extensive report on the restaurant industry.
IT Central Station
I have been contributing content to this community-driven site for several years, mostly reprints of my video screencast product reviews. Here is an article on application performance monitoring that I did for them in March 2015.
New Relic Blog
In 2014 I began writing some pieces for them about programming-specific topics.
Ricoh-sponsored blog called WorkIntelligent.ly
I have written a series of general interest stories for this blog that began in late 2013, including security, personal productivity, and IT management topics.
CDW’s FedTech and StateTech Magazines
This is a print magazine published quarterly, and you can read my articles here, including software and hardware reviews and stories about networking topics. Here is a current review of Watchguard’s Firebox UTM box. (1/15)
Software development tools vendor Smartbear has a rich blog full of interesting articles on this topic, and I have written a couple of pieces during 2013 here.
I have written another series of technically-minded articles for their blog that began in 2012, including security, IT management, and Internet-related topics.
Here are the posts that I have written for them, mostly covering Internet infrastructure issues:
The Freelance Strategist blog
This blog, which was begun in 2012, covers generally freelancing work issues and I have written several stories about my own freelancing business and strategies learned over the years from the school of hard knocks.
Internet Protocol Journal
This semi-scholarly periodical covers advanced Internet topics. I have written for them several times:
- The Demise of Web 2.0 (2012)
- How Internet Messaging is transforming the enterprise network (2006)
- The state of secure email (with Marshall Rose, 1999)
Beginning in 2013, I wrote these security and cloud-related stories for several CA-sponsored blogs:
- The changing landscape of bring your own identity management
- Mulling over enterprise mobility at Mobile World Congress
- Making Your Mobile Apps More Secure
- Time to join the devops movement
- New cloud survey shows it is more secure
- New Ponemon Institute study shows cloud security still a mixed bag
- Know your cloud failure points
This is a custom published site with independent editorial content with HP as its sole sponsor. I have been writing for them for several years, here are some samples of the pieces that I have done for them. Sadly, HP took down the blog so these links could be inactive.
- This Ain’t Your Father’s Web Application
- Six ways to share your photos online discreetly
- The changing face of malware and endpoint security
- How to measure latency in the cloud
- Understanding Enterprise Printer Fleet Management
This is a Dell-sponsored IT information site that was begun in 2009 and now discontinued. I have written product reviews, case studies, how-to articles, and screencast review videos. Many of these articles concern how to migrate from XP to Windows 7.
In 2006-7, I was the editor-in-chief of a new Web site devoted to helping consumers understand how to best use broadband Internet connections, and hired a collection of writers and editors to build more than 100 different articles on the topic, including how to use VOIP, digital photography, choosing between cable and DSL connections, and more. The site was sponsored by Acceller, a company that provides back office software to telcos and cable companies to help provision broadband customers.
I write occasional white papers for clients on technical topics, including security, network applications, and Internet services.