WORKERSEDGE
Menu

Cloud governance: The key to effectively scaling your cloud

“Cloud speed” has taken the IT world by storm. When it comes to getting applications and data systems relocated to cloud services, the quicker the better, right? In most cases, such hasty implementations do indeed make waste – of time, resources, and ultimately efficiency.

In a classic example of “ready, fire, aim,” companies find themselves attempting to retrofit governance into the systems they have migrated to the cloud in a rush. Part of the problem is that IT often finds itself reacting to cloud-migration projects that are driven by business departments.

A typical example is the “accidental hybrid,” which arises when one of the organization’s apps, such as for HR or CRM, has been moved to the cloud, and subsequently a cloud database is glommed onto the app, followed by a data warehouse, and then some analytical tools for good measure. The job of integrating and securing the complex system that results falls to IT.

Here’s the challenge: Get a comprehensive, cohesive, and singular infrastructure in place for data security and data governance without slowing the pace of cloud adoption in the company. Step one is to create a central point of operational management for all data systems.

Like Big Brother, but in a good way

Start by giving IT a central point that provides a view into everything that’s happening related to your applications:
​
  • The who: Which users have access?
  • The what: How large is the app’s footprint?
  • The when: What are the app’s usage patterns?
  • The how: Is the app meeting users’ needs? Is it efficient? Is it scaling properly?
​​
Cloud identity and access management (AIM) is projected to boom in 2017 and beyond. According to a Garner report cited by Allied Market Research, the cloud security market will grow at a compound annual rate of 23.5 percent through 2020, to a total value of $8.9 billion by that year. Driving the market are increased use on handheld devices (BYOD and CYOD, or “choose your own device”), growing reliance on cloud services by midsize and large enterprises, and the surge in demand for managed security services.
PictureAs companies come to rely on the cloud more heavily, the emphasis shifts from awareness to managed security and government compliance. Source: Allied Market Research
CloudTech’s Nitin Chitmalwar lays out the basic framework for cloud AIM: automate the initiation, capture, recording, and management of user identities for each process in the business network. Grant access privileges only after timely and comprehensive application of organizational policies. The analysis covers all individuals and services comprising the cloud AIM system and includes authorization, authentication, and auditing.

The role of cloud AIM software

Your cloud IAM system models the entire organization:
​
  • IT creates user IDs and organizes them into groups based on privileges
  • The IAM software assigns the IDs permissions for accessing services and resources
  • The IAM software itself is managed through a web portal
​​​
Regulatory and compliance policies are applied automatically via IAM processes. Careful assignment of access permissions combined with multi-factor authentication identify and block malware, malicious acts of insiders, hackers, spoofing, and fake ID holders. Security is enforced via two parallel streams: one passive stream monitors all traffic into, out of, and within the organization’s data systems; and the other active stream that enforces the company’s comprehensive security policy.

PictureA three-step approach to implementing identity and access management begins by assessing your current IAM systems, identifying the IAM approach that best fits the organization, and finally defining your implementation strategy. Source: Chip Epps, via Sand Hill
Cloud IAM software helps reduce overall IT spending by consolidating all data security – keeping data safe and controlling access to data and network resources – in a centralized security hub that operates on multiple levels. The success of any cloud IAM project depends on ensuring visibility into your applications. Not just “Do you know where your app is?” visibility. We’re talking deep-dive visibility, like IT has never had before.

Governance requires an ‘x-ray vision’ view of your apps

Dean Wiech of security vendor Tools4Ever explains in a CSO article why cloud governance requires greater insight into data operation than is available from traditional auditing products. There are many more potential access points in modern networks, and many more potential users of the company’s data. More “layers” of operational data are needed to model the “what ifs”: every possible outcome, and its impact on the organization’s information infrastructure.

System administrators need to have a complete history of every employee’s activity that they can organize and manage from a single vantage point. In an instant, admins can determine who has accounts on what system, when were those accounts used, what permissions are associated with the accounts, and who has authority to grant the account permissions.

The permissions auditing must apply to all of the organization’s data assets: databases, shared file systems, data centers, access control, backups, passwords, network devices and printers. Privilege creep is addressed by ensuring permissions are revoked when an employee no longer needs them following a change in responsibilities. Centralized control simplifies elimination of stale and orphan accounts, and identifies shared accounts for which no single individual is responsible.

A to Z governance in a single cloud portal

The deep-dive visibility and wide-angle view of all your apps and databases that is the core of cloud governance is delivered the intuitive control dashboard at the heart of the Morpheus cloud application management service. Morpheus ensures that all of your organization’s most important data can be monitored and controlled from a single intuitive interface that provides at a glance an overall indication of system health, as well as the status of individual apps, databases, and components.

In addition to the web UI, Morpheus lets you manage apps, databases, and app stack components via a command-line interface or through API calls. There is no faster way to provision these resources and to add new nodes; databases and app clusters are reconfigured automatically to accommodate the added nodes. Morpheus’s automatic logging supports immediate introspection, troubleshooting, and uptime monitoring.
​
That immediacy extends to defining roles and access for individuals and groups using Morpheus’s clear dashboard to set responsibilities and access limits for teams and individuals based on geographic zone, server groups, application, or database. It’s time for your governance operations to benefit from the same efficiency and scalability of your other cloud apps.


Powered by Create your own unique website with customizable templates.
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
  • About
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
  • About