An Assessment on the Cyber Threat
How would you describe the threat to the US information infrastructure? If you are a technologist or a national security…
Top 10 People to Follow in the Enterprise 2.0 Space and Why (pt 1)
There are a lot of great thinkers and practitioners in the Enterprise 2.0 space that I follow for ideas, information,…
The Big Picture
Legitimate labels? It has become part of the business lexicon, “he’s a big picture guy”, “she’s a details…
Reasons why Foursquare is the hottest Social Network on the web
Foursquare, the hottest Social Network on the web turned one yesterday. Hard to believe that its been around for just…
Secret of Ford’s Social Media Success
Ford Motor Company is among a handful of large corporations with many successful Social Media initiatives. One of Ford’s most…
Make it Simple, Focused, High-Performance, and Polished: My Web Philosophy
I was asked recently by a potential client what my “philosophy of the web” is. What seemed like a strange…
Breaches of data confidentiality can be costly
In a previous post last year I mentioned a particularly nasty and blatant breach of confidentiality regarding fixed line telephony…
Some thoughts on perfect application development
John Reynolds had an interesting post a little while back where he shared some thoughts on Perfect development tools. His…
Korean wireless chief warns of data overload
In the world of broadband, South Korea is a titan, with top data speeds and market penetration, both for fixed…
White Paper Format: Fact or Fiction?
White papers are still one of the most popular marketing tools for BI and high tech companies, among others. Proof…