Monthly Archives: February 2015

Youth Makes You Young, Not Coca-Cola

It is oft-stated that most people really do not get statistics. Just say that word, “statistics,” and most people’s eyes glaze over. Confession from this engineer and MBA: I did horrifically in my undergrad stats course. (Fortunately, I did better in my … Continue reading

Posted in business, economy, policy, product | Tagged , , , , | Comments Off on Youth Makes You Young, Not Coca-Cola

Hiding Fingerprints in Your Browser for Privacy

The browser is the single most ubiquitous piece of software on the planet. Nearly every computing device has at least one one. Because of its ubiquity, and its use across multiple applications from open (Google “how much does a banana … Continue reading

Posted in business, cloud, security, technology | Tagged , , , , | Comments Off on Hiding Fingerprints in Your Browser for Privacy

Do VCs Abandon Startups?

For years, people I have known in the VC business, as well as entrepreneurs who have been funded by VCs, have discussed the 7-2-1 rule. For every 10 investments a VC fund makes: 7 will fail – “dogs” 2 will hang around, … Continue reading

Posted in business, policy, technology | Tagged , , , | Comments Off on Do VCs Abandon Startups?

Velocity: Metrics that Encourage Safe Deployment

What do you do when you want to move towards more rapid deployment, perhaps as close as possible to continuous delivery, but the culture and incentives push against it? This is the exact issue I have had at several clients over the years. … Continue reading

Posted in business, cloud, policy, technology | Tagged , , , , , , | Comments Off on Velocity: Metrics that Encourage Safe Deployment

Superfish or Stupidfish?

How did Lenovo do something so inane as fundamentally breaking their customers’ laptop security by installing Superfish? What is Superfish, and what is wrong with it? I have often asked clients to consider, “what business are you in?” The right answer … Continue reading

Posted in business, policy, product, security, technology | Tagged , , , , , , | 1 Comment

Lost in Twitteration

What does a great daily paper by a smart thinker have to teach about good product management? About a week ago, I came across Adrian Colyer‘s great “Morning Paper“. I have no idea how I missed this before. The “Morning Paper” takes a … Continue reading

Posted in business, product, technology | Comments Off on Lost in Twitteration

Websites and the Cost of Change

You are reading this blog on WordPress. It is not a secret; any technologist with experience managing WordPress can look at the page and see that it is run by WordPress. How does WordPress show you this page? Here is what WordPress … Continue reading

Posted in business, cloud, product, security, technology | Tagged , , , , | Comments Off on Websites and the Cost of Change

Change Control in the Cloud

“We made a small change and it brought down our customers for 4 hours.”  – colleague “Network issues caused outage” – GoDaddy “A configuration error… caused days of downtime.” – Amazon “Facebook was down… for 2.5 hours.” – Facebook Every one … Continue reading

Posted in business, cloud, policy, security, technology | Tagged , , | Comments Off on Change Control in the Cloud

Samsung’s “Too Smart for Their Own Good” TVs

The Internet has been abuzz for the last week about a hitherto little-known clause in Samsung’s “Smart TV” privacy policy. The news was most prominently covered in the Daily Beast, here. The Daily Beast includes a link to the entire privacy … Continue reading

Posted in business, cloud, policy, security, technology | Tagged , , , , , , , , , | Comments Off on Samsung’s “Too Smart for Their Own Good” TVs

Trust Your Employees

What would you call a global, enormous, Fortune 500 company that 95 out of 100 of its employees strongly recommend it as a place to work? Sure, an exciting new startup, but an old-school 70-year old company? What if that … Continue reading

Posted in business, policy | Tagged , , , , | Comments Off on Trust Your Employees