David Strom

David Strom is an old hand at enterprise IT, having worked in the industry from the early days of the PC. He has developed numerous print and Web publications for IT managers and developers and runs the Dice Security Technical Community here.

Game Studios at the Forefront of Big Data, Cloud

Video-game creators are some of the biggest users of real-time analytics and cloud computing. continue…

What Employers Look for in Product Managers

Posted In Looking in Tech
Line of Men Thumbnail
A blog post last month by veteran product manager Rich Mironov examined what hiring managers actually look for in product managers. The anecdotal results aren’t pretty. Mironov’s research concludes that hiring managers think about the openings very narrowly, which means most are looking for candidates in the wrong places. They’re putting too much emphasis on technical market knowledge and not enough on what makes for a great product manager. Mironov and his researcher examined 41 job postings at American tech… continue…

Big Data Meets Big Box: How Two Startups are Changing the Retail Game

Data apps can transform the way people shop for food and other items. continue…

Elderwood’s Watering Hole Attacks are ‘Astonishing’

Zebras Drinking
The extent to which a group of hackers dubbed “the Elderwood Project” has left digital traces is astonishing, according to Symantec researchers. In a blog post, they’ve documented efforts by the group, named for a source code variable they use to quickly deploy zero-day exploits through spear phishing e-mails and, increasingly, through Web injections in watering-hole attacks. What is this exploit? Think about a thirsty zebra on the Serengeti. Predators wait at the oasis, knowing that eventually the zebras will show… continue…

What Recruiters Look For in a 6-Second Resume Scan

Posted In Looking in Tech
Stopwatch2 thumbnail
Six seconds. That’s how much time recruiters usually take to look at your resume. Your stellar academic record and long list of professional accomplishments, all in six seconds. In a 2012 study, researchers recorded their subjects’ eyeball movements, what they zeroed in on, and for how long. The study examined specific behaviors of recruiters as they screened resumes and interviewed candidates over a 10-week period, looking for what caught their attention and what was overlooked. Recruiters looked at both paper… continue…

Is Anti-Virus Passe?

security thumbnail
When security firm Imperva checked more than 80 unreported viruses against several anti-virus solutions, it found that none of the tested programs were able to detect previously unreported viruses and that 75 percent of solutions took a month or more to update their signatures. That isn’t good news, and while Imperva obviously has some self-interest here, their November Hacker Intelligence report, Assessing the Effectiveness of Anti-Virus Solutions, is worthy of a closer read nonetheless. What it means is that we have to depend on a… continue…

For Riot Games, Big Data Is Serious Business

Riot Games depends on data analysts and engineers to keep its millions of gamers engaged in battle. continue…

Should Peer-to-Peer Movie Pirates Be Punished?

Walking the Plank from Wikipedia
With all the hoopla over Black Friday and Cyber Monday, there’s another event happening this week that isn’t getting much attention. It begins today, when AT&T, Time Warner and other broadband providers are going to start enforcing their “Six-Strikes” approach to stopping illegal copies of movies, TV shows and other content from being downloaded from peer networking sites. Haven’t heard about this yet? Read on. My friend and supplier The Movie Pirate is worried. “What can they do to me?”… continue…

Brave New World: Crowdsourcing Maps

Crowdmapping and Big Data are birthing new and more sophisticated ways to map the world around us. continue…

For Hacker Intelligence, Visit Their Forums

Mind Power
The best way to protect your networks is to think like a hacker, and the best way to find out what hackers think is to spend some time on their public discussion boards. This is exactly what the analysts from Imperva, a security research firm, did and the results are intriguing. In last month’s Hacker Intelligence Report #13, they looked at one of the largest discussion forums (they don’t reveal which one, but it has a quarter of a million… continue…