Author: Markus Perdrizat

  • The one big thing that newspaper visionaries didn’t foresee

    The one big thing that newspaper visionaries didn’t foresee: It’s easy to forget sometimes that the world wide web has been around for more than two decades now, or that it has caused massive and ongoing disruption of almost every form of content from books and newspapers to music and movies. Interesting read!

    By

    ·

  • Addiction to Familiar Systems

    Addiction to Familiar Systems: The fear of making the “wrong” choice actually makes the familiar, mastered PHP more attractive. I guess that also depends if you’re more a stable or volatile type.

    By

    ·

    ,
  • Stables and Volatiles

    Stables and Volatiles: I believe a healthy company that wants to continue to grow and invent needs to equally invest in both their Stables and their Volatiles. Your Stables are there to remind you about reality and to define process whereby large groups of people can be coordinated to actually get work done. Your Stables…

    By

    ·

  • Tor: An Anonymous, And Controversial, Way to Web-Surf

    Tor: An Anonymous, And Controversial, Way to Web-Surf: For more than four years, William Weber has helped run a free service called Tor that makes Web surfing anonymous for anyone. Then on Nov. 28, the police showed up at the 20-year-old’s home in Graz, Austria, and accused him of distributing child pornography. Some good recommendations:…

    By

    ·

  • Are Enterprise Social Networks the Cure for Information Overload?

    Are Enterprise Social Networks the Cure for Information Overload?: Many organizations are implementing enterprise social networks to improve communication between their employees, customers, and partners. If only it was as simple as that…

    By

    ·

  • Making the users accountable

    Making the users accountable: We all know that information security relays on a layered approach. It´s about people, process/programs and technology. And we all know about Advanced Persistent Threats. How they work, attack vectors, etc. Shows the problem well, chooses the cheap way out by saying that resolving it will be specific to each company.

    By

    ·

  • Comparing the CISSP and GISP Exams

    Comparing the CISSP and GISP Exams: Lately, I have been spending my time preparing and finally taking the GIAC Information Security Professional (GISP) and the Certified Information Systems Security Professional (CISSP) certification exams. I passed both. The exams are very different, though they cover the same material. Still considering what’s right for me… suggestions, anyone?

    By

    ·

  • The Internet’s Best Terrible Person Goes to Jail: Can a Reviled Master Troll Become a Geek Hero?

    The Internet’s Best Terrible Person Goes to Jail: Can a Reviled Master Troll Become a Geek Hero?: On a gray Wednesday morning in October, the car headed west on the Lincoln Highway Bridge hit 100 miles per hour and I started to worry it might hurtle off into the tangle of rusted-out warehouses and smoke…

    By

    ·

  • A Brief History of Slashdot

    A Brief History of Slashdot Part 1, Chips & Dips: As part of our 10 year anniversary celebration, I’ve decided to post a story here telling the tale of the transition from Chips & Dips to Slashdot back in 1997. A Brief History of Slashdot Part 2, Explosions: When last we left off, Slashdot had…

    By

    ·

By

·