|www.PenandCamera.com: Writing Samples: Security||About | Clips | Photography | Photo/Visual | Writing | Updates|
|Writing Archive: 2003 and before|
Writing Archives: 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003
Uncovering the Secrets of Data Storage (PDF)
A Fortune special section on data storage.
Fortune (March 31, 2003)
Creating the Single-Image Client Build
White paper for Intel recounting how Intel reduced the number of its client builds -- the process of installing the standard corporate software bundle and moving data to an employee's new PC -- from 14 to one, and how Intel's information technology department thus reduced the expense, complexity, and time required to roll out new machines to its employees.
Intel Corp. (April 2003)
Arresting Bugs Earlier in Development Cycle Cuts Security Costs
Linux Vulnerabilities, Security Spending, Symantec's List of Top Threats
Protecting Web Applications from Unknown Attacks
Budgets Will Rise Rapidly, Researchers Predict
in Point: Law Firm Battles Spam
Practices: Avoiding Computer Worms
Attacks More Varied and Aggressive, ISS Report Shows
Cryptography Offers Uncrackable Keys
to Stop Bluetooth Insecurities
Microsoft Issues "Critical" Patches
Practices: Audit Without Getting Overwhelmed
for Gramm-Leach-Bliley Compliance
WPA Vulnerable to Dictionary Attack
Study: Hurricane Stress Tests Firewall at Weather.com
Holy Grail: Integrating Identity and Access Control
British Security Suffers; Macintosh Patches 14 Vulnerabilities
A Growing Security Threat?
Managers Fear Next Generation of Attacks Says Survey
Novell Patches Multiple iChain
Miss Strategic Security Focus, PricewaterhouseCoopers Says
Hardware Cryptography No Longer Enough
Windows Messenger Service Vulnerability
Mitigating the Denial of Service Threat
Blended Attacks Increase, Symantec Says
Practices: Five Tips for Managed Security Outsourcing
Securing the Door as Important as Securing the Data
Practices: Minimizing the Risk of Forgotten Modems
New IE Exploit Hacks DNS; Kaspersky Labs' Top Ten Viruses for September
with the Gramm-Leach-Bliley Act
Spending Will Top All IT Investments
Virus Masquerades as Microsoft Security Update
Practices: Staying Ahead of International Regulations
Best Practices for Beating Worms
Vulnerability in SSH
Security Holes in Your Web Applications
Three Critical Steps for Every Organization
Dirty Dozen Viruses:
August was a Banner Month
Alert: “Critical” Flaw in Office, Other Microsoft Applications
Seeking the Perfect
Methods to Avoid Detection
P2P Software Vulnerable
Sobig Lives Up
to Its Name
in Security Training
IE Cross-Domain Security Flaw, Database Component Exposure
Blast Across Internet
Identity: Seeking Synergy
Alerts: BSD and
Postfix Vulnerabilities; File-Sharing Dangers
How To Protect
Yourself from Fibre Channel Insecurity
Case in Point:
Protecting the Network Edge
in IE, Windows Desktops
Management: Untangling Meta and Virtual Directories
Perils of Identity Mismanagement
Security into Software Development
Privacy Law: Goodbye Good Intentions
Identity Management with Auditing
Brand spoofing on the rise; e-Security update
SteelCloud Enter Crowded Appliance Market
LAN Monitoring Reveals Risks and Risky Behavior
Microsoft Flaw, nCircle Update
Getting and Keeping an Information Security Job
E-mail Tops List of Intrusions
Bytware's Native iSeries Antivirus; Symantec Updates IDS Software
Wi-Fi Security Fears
Identify Theft and Fraud in Real Time
Tripwire compliance monitoring; security appliance sales up, prices down
E-mail: No Problem Come 2006?
Announces Integrated Content Security Management
Resetting passwords, antivirus deal
Entering Antivirus Market
Report: Losses Down, Vulnerabilities Up
Tivoli Risk Manager Locks Down Databases
Push for Policy Compliance
Services: Protecting Yourself from Partners' Security Problems
the File-Swapping Threat
Captures Attention of Data Center Managers
Symantec Vulnerability Assessment, Windows Server 2003 Backup, Another
Securing Sensitive Networks
Forensics: Network Analysis on the Go
Physical Assets from Physical Threats
Talks Government Security
Down Digital Documents
Surmounting Corporate Boundaries
Pharmeceutical giant GlaxoSmithKline PLC uses P2P software to share data with its partners.
Enterprise Systems (November 2002)
Time for a Makeover!
Web site makeovers need not be complete overhauls. Here are some simple, low-cost ways to freshen up a stale site. (Also includes these two sidebars: Helping Online Users Stay on Course, and Persona Grata.)
Computerworld (August 19, 2002)
Getting IT Out of the Loop
Office Depot needed to massage sales data for employee bonuses, with minimal IT involvement.
Enterprise Systems (July 2002)
Cambridge College: Report on the Year 2001-2002
I profiled seven graduates from the college working in a variety of fields. Graduates include a Deputy Superintendent for the Boston Public Schools, the principal of Boston Arts Academy, and the principal of San Diego's High Tech High. In addition, I provided photographs of each participant, often in their workplace. These written and visual profiles constitute one-third of the annual report.
Let's make a deal
Amid the holiday 2001 season of uncertainty, consumers and retailers play the waiting versus discounting game.
Boston Globe (Nov. 2001)
Corporate Peer-to-Peer Gets a Closer Look
Like all grassroots technologies, instant messaging makes IT departments mighty nervous. But it's catching on quick, and it's a clear window to the coming world of peer-to-peer computing.
CIO Insight (March 2002)
Harvard Nails Sendmail
At Harvard University's Electrical Engineering and Computer Science (EECS) and Robotics department, users don't just use computers, they try to break them -- professionally. It's up to the IT department to keep up, and the first place they started was with their choice of e-mail server.
Enterprise Systems (February 2002)
Profile: Richard Fishburn, Corning CIO and Vice President
Corning turned the standard ERP model upside down by first listening to its operations people and then picking a technology. Profile for the Computerworld Premier 100 Conference in March 2002.
Computerworld (March 11, 2002)
The Instant Messaging Debate
Technology users are divided over the role of instant messaging in the workplace. Some see it as a quick communication tool, but to others, it's only a distraction.
Computerworld (Jan. 2002)
Tracking the Carrot Chase
A new sales incentive management system should help medical supplies maker Welch Allyn save up to $1 million each year in personnel and labor costs.
Computerworld (Nov. 2001)
eBay: Grow Your Site, Keep Your Users
Online auctioneer eBay Inc. shares lessons learned from designing a Web site that has grown tremendously in a relatively short amount of time. EBay says to always plan for massive growth, manage user expectations and keep design simple.
Computerworld (June 2001)
Technology Visionaries Scope the Future
IT watchers Jakob Nielsen, Michael Dertouzos, Jef Raskin, John Thackara and others look ahead five to 10 years and tell us what we can expect, what we may not see and most importantly, what researchers are neglecting.
Know Who You Know
AT&T Labs researchers are working on new software that aims to use the human face to help you track your "social network" -- the people who really help you do your job.
The Interface Revolutionary
In the future, predicts the creator of the Apple Macintosh project, computer desktops will be replaced by zooming interfaces that give users only what they need.
Battling for Web Investors
Charles Schwab and Fidelity Investments are the two titans of online investing. To determine which one rules, features writer Mathew Schwartz compared notes with executives from both companies and several analysts on everything from executive leadership to customer satisfaction.
Computerworld (Oct. 2000)
Building a Better Laser
They're the basic parts of your CD player, the supermarket checkout scanner and the writing head of your laser printer. But when most people think of lasers, it's in terms of the frontiers of medicine - if not as the weapon of choice for extraterrestrial evil geniuses. American Society of Business Publication Editors (ASBPE) award winner.
Ameritrade: Test Case
Online brokerage Ameritrade simply couldn't afford Web downtime. It implemented a three-step plan to improve its site reliability: It did more predictive testing, did a more rigorous job of tweaking software to run on advanced hardware and created a separate testing group with more power.
Computerworld (Aug. 2000)
Feds warn hackers, then ask them for help
Las Vegas: At the opening of the annual Def Con hackers convention here today, the Pentagon's CIO pleaded with attendees to leave government systems alone and outlined proposed new laws aimed at prosecuting computer crimes more expeditiously. News piece also featured on CNN.com.
Computerworld (July 2000)
Hacker/Fed Tensions Abound at Def Con
Hacker news. Co-authored with security reporter Ann Harrison. Computerworld (July 2000)
Web site makeover: Office-supplies superstore Staples aims to boost Web sales by adding information to some parts of its site, simplifying other parts and creating some new shopping tools.
Computerworld (June 2000)
Quicken: Tweak This!
After three years in operation, leading e-mortgage site QuickenLoans.com (owned by Intuit Inc.) has learned three things: Test ruthlessly, tweak constantly and tell customers what they need.
Computerworld (Jan. 2000)
Going on-site to find out how well online retailers learned from last year's mistakes. (Note: click down to end of article for a "24-hours in the life" sidebar.)
Computerworld (Dec. 1999)
Ten tools that will pump up your Palm
Personal information management: Maybe you've heard the phrase before. It's one of the hallmarks of Palm Computing Inc. devices, which give you a place to aggregate everything from your address book to your checkbook, from travel expenses to random ideas you have in a meeting or on the subway.
CNN.com/Computerworld (November 1999)
The Knowledge Paradox
Cambridge Information Network (CIN) Think Tank Report: The Knowledge Paradox--How to Manage Your Most Strategic Asset. To assess the state of the New Economy, in which intangible assets are fleeting yet valued by the market, new economy, CIN turned to its members to talk about knowledge management. CIOs told CIN about the business and technology pressures their companies face, and how far along they are -- or want to be -- in their knowledge management efforts.
Cambridge Information Network (1999)
The Transformation of ERP: From Money Pit to Money Pot
Cambridge Information Network (CIN) Think Tank Report on the changing nature of ERP installations and moving from ERP to eXtended Resource Planning, or XRP. (No link to report currently available; contact me, I might be able to turn up a PDF version.)
Cambridge Information Network (1999)
Too much of today's media coverage reinforces the myth of that god-like, solitary genius — the CEO who drives a company to greatness by virtue of his ego
Boston Software News (1998)