David Strom

David Strom is an old hand at enterprise IT, having worked in the industry from the early days of the PC. He has developed numerous print and Web publications for IT managers and developers and runs the Dice Security Technical Community here.

Two Security Training Resources Worth Your Time

computer-security-thumbnail
There are lots of expensive security conferences and training classes out there that can deliver certifications and skills. But if money’s tight, you can find free classes and lower-cost local conferences that might be worth investing some time in. Here are two such options that come highly recommended from those who have participated in them. First is the website OpenSecurityTraining. It offers dozens of lengthy and well-crafted tutorials on a wide range of topics including introductions to network forensics and… continue…

Latest Check Point Study Highlights Dangers of BYOD

mobile-security
Check Point’s second annual mobile security survey found an increasing number of connected mobile devices, with BYOD growing quickly. Nearly half of the of 790 respondents — IT professionals in the U.S., Canada, UK, Germany and Japan — say they have five times the mobile devices connected to their networks compared to two years ago. Mobile devices are also now connected to more networks, 93 percent this year compared to 89 percent in last year’s survey. More than half of… continue…

How Monsanto Is Expanding Its Footprint Through Data Analytics

dicetv_030211
The maker of genetically modified crops (a point of significant controversy) is using data analytics and other tools to increase its presence. continue…

Programming Languages That Aren’t Worth Your Time

Posted In Looking in Tech
14562766_s
As we all know, it seems like new programming languages are created every week. But which ones aren’t worth wasting your time on? I looked at actual listings on Dice to try to spot some trends. In late April, I searched both the entire set of job listings as well as specific job titles to see what skills companies were actually looking for. Here’s what I found. First, it’s safe to say that the Web is the primary focus of… continue…

Ways AP Could Have Avoided Its Twitter Hack

AP Hack T
A single tweet with a phony bit of news sent the stock market into a brief dive Tuesday, pushing the Dow Jones Industrial Average down more than 140 points in the three minutes from 1:07 to 1:10 p.m. ET. When the “news” — that two bombs had exploded in the White House, injuring the president — was debunked, the market regained its footing.   Of course, phony information blasts out through Twitter all the time. The difference here is that… continue…

The Security Implications of Fake Twitter Followers

Twitter Logo
A recent New York Times story about the fake Twitter follower community got me thinking. The newspaper claims that this is a $1 million industry, with followers being purchased in bulk for about a penny a head. Why does Twitter tolerate this? Certainly, the company could easily fix this problem with some clever software engineering. Instead, they’re turning a blind eye. But on further reflection, it’s not something that’s easy to fix. I have a Twitter account that I set… continue…

What Are Your 5 Biggest Online Privacy Worries?

Vault Thumbnail
Let’s talk about this. An article posted on ITWorld earlier this month got me thinking about how small businesses have to deal with online privacy issues. According to ITWorld, their top five concerns include: The proliferation of cookies. Theft of cloud-based data through weak password controls. Being betrayed by the stored location data on cell phones and other mobile devices. Photo tags on social networks. Federal and police agencies scanning online services. Notice: None of these items include the words… continue…

Is Bitcoin the New Napster of Digital Money?

Bitcoin Logo
This isn’t a rhetorical question. Last month, the total value of all Bitcoins passed $1 billion. That isn’t a typo. Bitcoin has been trading up compared to traditional currencies, north of $100 lately, and poised to go higher. That’s 10 times what it was trading just a few months ago. If you’re looking for a good overview of Bitcoin, try this piece in GigaOm by David Mayer. He covers the underlying peer-to-peer technology, and why it isn’t all that important… continue…

Has Kickstarter Peaked?

Hidden amidst all the Kickstarter success stories and big payouts are some sadder tales. continue…

How Kooky Kaggle Contests Advance Data Science

Five contests that illustrate the crowd-sourcing Website’s approach to some thorny data problems. continue…