ai architecture artificial-intelligence blog blogging Book Review business career Compliance Content Corporate Life Customer Support cybersecurity data data-science DevOps education entropy fitness garmin leadership Licensing life marketing microservices Monitoring music Observability Operations Partnership philosophy Product Management Products saas Sales Security software-development technology User Experience wordpress writing

Excellent book, introduction helpfully posted here. I’ve read a goodly number of information security books; there’s a weird (good weird) feeling to this one. Obviously some of that is from Kelly Shortridge’s (and Aaron Rinehart’s?) eclectic interests: a recipe for Mexican hot chocolate is used as a process mnemonic, for instance. If you don’t see

You should build what the customer needs, right? Simple, just determine who they are and what they need. Except both of those elements change, over time and across different parts of the market. There’s a problem from all my companies ever… a little ditty we call Crossing The Chasm. After whatever time it takes to

A recent Slack change prompted conversation in my circles that echo some of the writing about Twitter as it was beginning its precipitous decline. To wit: sure, we don’t like these changes, but we’re early adopter or excessive adopter or otherwise not representative of the mainstream user so we should suck it up and stop

How does a company decrease the price of an enterprise product or service? I have written a few pieces on licensing enterprise software; Licensing Roundup might be useful background for this piece. A public company (and most private companies) can’t down sell their existing customers. That means they can’t reduce the amount of money they’re

Maybe first we should ask why people say it’s hard. After all, this shiny modern world is full of one-liners to install agents, hook in libraries, listen to your provider’s pub-sub, or just post stuff at an endpoint. It’s never been easier to get data, and it’s not like writing to syslog was that hard.