WORKERSEDGE
Menu

Ultimate virtualization: The end of infrastructure

All cloud-industry forecasts point nowhere but up: More services, more revenue, more growth, more innovation. So why are some people predicting the imminent demise of the cloud model? These prognosticators are sure the future is at the edge of the network, not in a centralized cloud.
 
In some ways, the people predicting increased centralization in the cloud, and their counterparts proclaiming decentralization of data networks, are both correct. The fact is, the physical location of data and processors won't matter. The future of information technology is complete virtualization.
 
Service pools create 'composable infrastructure'
 
Imagine your organization's data collected in resource pools linked to equally nebulous compute and network components. People dip into the pools to retrieve just the data they need using self-service portals and programmable APIs.
 
That's the model for composable infrastructure, which is intended to deliver "adaptability, flexibility, and the cloud-like speed and efficiency... to hyperconverged solutions and hybrid cloud environments," according to HPE Cloud Group VP Paul Miller in a sponsored InfoWorld article. A fundamental component of composable infrastructure is multi-tenant workspaces accessed by business managers and other users via self-service portals and programmable APIs.

PictureComposable infrastructure is characterized by on-demand assembly of network, compute, and storage resources into custom services accessed directly by users via self-service portals and APIs. Source: Cisco
Infrastructure deconstructed to accommodate hybrid networks
 
A principal benefit of composable infrastructure is its support for hybrid networks. Rightscale's 2016 State of the Cloud report found a 71 percent increase in hybrid cloud adoption by organizations of all sizes, compared to an adoption growth rate of 59 percent in 2015.
 
Combining composable elements in a hybrid environment allows IT departments to run bare metal, virtualized, containerized, and cloud-native applications in a unified, seamless infrastructure. Users can compose and recompose app components dynamically, with little or no IT involvement, according to Miller.
 
Cloud's key role in decentralized edge networks
 
A technology rising just as quickly as the cloud is the Internet of Things. The IoT trend has led some analysts to conclude that cloud computing is a temporary phenomenon that will be usurped by more efficient processing and storage at the network endpoints. However, the consensus of the experts is that edge networks and cloud networks will in fact be two sides of the same coin.
 
CIO's Clint Boulton cites Workday CIO Diana McKenzie, who believes companies will be best served by aggregating data collected at the edge of the network in the cloud, where sophisticated business analysis tools can be applied. According to McKenzie, "[t]he challenge for us as CIOs is to make sure we're thinking about it more on a continuum than on a black and white basis. Then the next challenge is how you architect for that."
 
Private cloud's iffy future
 
Even the largest enterprises will find it a challenge to justify the expense of managing their own infrastructure as the major cloud services capitalize on their massive economies of scale. Still, old ideas die hard, as Manek Dubash points out on ZDNet. Many IT departments continue to resist migrating key apps and data systems to the public cloud for fear of losing control over costs, data, and infrastructure.
 
Reliance on private clouds for core systems often boils down to familiarity with tried-and-true processes and procedures, as well as uncertainty about the effectiveness and reliability of cloud alternatives to in-house data centers. However, not many enterprises are large enough to compete with Amazon Web Services, Microsoft Azure, Google Cloud Platform, and other major cloud providers.
 
No organization can match the economies of scale that benefit cloud infrastructure services: they build their own servers, get steep discounts by buying components in volume, and can amortize their fixed costs over a large number of customers. Another built-in advantage for the cloud giants is that they live on the tech edge, which makes them the favorite place to work for top talent.

PictureTopping the concerns enterprise IT managers about using private clouds are operating costs, complexity, and staff skill set. Source: Platform 9
It's the end of the infrastructure as we know it
 
The three leading cloud-infrastructure providers -- Amazon, Microsoft, and Google -- have one thing in common: Their clouds were "built backwards, not forwards," as Software Daily puts it. All three extended the network they used internally to other businesses, so they benefitted from their massive investment in hardware, networks, and storage long before they could realize a profit from their cloud operations.
 
For developers, the fear is that they will be locked into a single infrastructure provider. The future belongs to services that "turn business analysts into developers," according to Software Daily. Just as enterprise CIOs are unfamiliar with the open-source world of software engineers, business analysts will balk at anything that resembles the coding that is developers' bread and butter.
 
But consider a custom app generator that is as easy to use, as powerful, and as ubiquitous as Microsoft's Office family has been to business productivity. The model for business-user-friendly cloud services is Morpheus, the cloud application management platform that features one-click provisioning of databases, apps, and app stack components.
 
Morpheus puts all your organization's most important data in one place, providing automatic logging of system, database, and application performance. There is no quicker or simpler way to discover and respond to slowdowns and failures. The point-and-click approach extends to defining roles and access rights for individuals and groups. Topping it off are automatic backup and recovery for every database and app stack component as they are created.
 
Get a glimpse of what the future of the cloud will look like by taking Morpheus for a test drive.

Powered by Create your own unique website with customizable templates.
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
    • Story
    • O'Jitterys Catch a Movie, October 27, 2015
  • Mandolinoleum
  • About
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
    • Story
    • O'Jitterys Catch a Movie, October 27, 2015
  • Mandolinoleum
  • About