Category: Tech Advice

  • Version 1 Software: Don’t Go Chasing Waterfall

    Version 1 Software: Don’t Go Chasing Waterfall

    I’ve been managing software development projects since the pre-internet digital dark ages.  Over time I’ve seen software development process change as much as software languages and tools.  (Maybe even more so — the Python language, first released in 1991, is in the middle of a data-science-driven renaissance.) It’s been fifteen years since I last used […]

  • Collaboration does not have to be an uphill struggle

    Regardless of industry, every organization is going through some form of digital transformation to maximize potential in the connected world. With this comes a culture of change, one where collaboration is central to innovation. This requires information that has to be open and easily accessible to promote teamwork and the flow of ideas. Innovation is […]

  • An interview with Robert Fink, Architect of Foundry, Palantir’s open data platform Part Three: Open Development Environments

    An interview with Robert Fink, Architect of Foundry, Palantir’s open data platform Part Three: Open Development Environments

    Editor’s note: This post is the third of a series of three capturing the result of recent interview/discussions I had with Robert Fink of Palantir. The conversation was wide ranging, hitting on topics of design, development environments and a bit on the philosophy of enterprise tech. Several common themes emerged in those topic areas, including […]

  • Everyday Threats That Can Fool Even The Savviest Of Techies

    Everyday Threats That Can Fool Even The Savviest Of Techies

    If you consider yourself an expert in cybersecurity – or even if you’re somewhat knowledgeable about how to protect yourself online, you probably won’t fall for the standard Nigerian prince email scam. Enter your bank account information below, and we’ll send you a whole bunch of money. Those kinds of tricks are old news, and […]

  • What to Expect When You’re Expecting… Delivery of Your Outsourced Software

    What to Expect When You’re Expecting… Delivery of Your Outsourced Software

    As a consulting CTO I work with companies at all stages of software product development. Startups with scarcely more than a PDF mock-up. Multi-million dollar businesses refining their umpteenth software version. But there is one stage in the evolution of a software company at which they disproportionately reach out to somebody like me — when they’re […]

  • White House Takes Action Against Chinese Intellectual Property Theft

    White House Takes Action Against Chinese Intellectual Property Theft

    On March 21, 2018 the New York Times reported that the White House was going to take aggressive action against China for illegal trade practices as well as intellectual property theft. The administration is right to do so. Drive thru middle America and you’ll see closed factories whose products are now manufactured in China. For […]

  • These Cloud Services are CTO Favorites

    These Cloud Services are CTO Favorites

    Editor’s note: This post by Larry Cynkin was first published at his GreenBar site. Larry is a highly respected CTO delivering consulting services to startups and writes with the credibility that comes from real experience.  -bg In a previous post I looked at how the adoption of not only cloud-based software platforms but ancillary cloud-based services has really taken off, supported by […]

  • More Thoughts from a Seasoned IT Professional and Security Rookie

    More Thoughts from a Seasoned IT Professional and Security Rookie

    Note: I’ve been asked to post this from a reader that asked to remain anonymous but would like to inject some thoughts into our dialog here. This is the second in this series (the first was here). If you have thoughts you would like to insert into the discussion feel free to contact us. -mj […]

  • How Do I select a Cloud Access Security Brokers (CASB)?

    How Do I select a Cloud Access Security Brokers (CASB)?

    Cloud Access Security Brokers (CASB) have been hot for the last 5 years. But how do you select a CASB? It has gotten to the point where every firm is either using one, evaluating one, or studying how to use them. This makes sense, since any successful cloud transition strategy should including appropriate attention being […]

  • Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware

    Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware

    How can I get rid of ransomware? Good question! As we usher in the new year of 2018, we are confronted with an ever-expanding network-borne threat landscape especially from ransomware. Ransomware is a type of malicious software which is used by malicious actors to encrypt systems or data. When the ransom is paid the key […]