blogging startups

A Product Roadmap in a Feed

Strategic Board was initially an idea about a new competitive intelligence/market intelligence tool for enterprises in the IT sector. Since then many things have changed including our concept and vision and probably the only permanent thing here is me and Strategic Board the name itself:) One of the building blocks a competitive intelligence tool is required to have in order to be effective is comparisons and more specifically product comparisons. Product comparisons, whether it is…

Continue reading

innovation

Suggested Innovation in Structured Feed Publishing and Aggregation

Yesterday I wrote about the news that Microsoft opened their tech support knowledgebase via RSS feeds Structured Corporate Feeds? with a new concept of structured RSS and I thought to elaborate on it further to make the idea more useful. RSS feeds in the perspective of infrastructure tools enable today an efficient mechanism for detecting changes in distributed content and it mainly serves for personal publishing via blogging tools serving publishers and news reading tools…

Continue reading

blockchain cybersecurity

United We Stand, Divided We Fall.

If I had to single out an individual development that elevated the sophistication of cybercrime by order of magnitude, it would be sharing. Codesharing, vulnerabilities sharing, knowledge sharing, stolen passwords, and anything else one can think of. Attackers that once worked in silos, in essence competing, have discovered and fully embraced the power of cooperation and collaboration. I was honored to present a high-level overview on the topic of cyber collaboration a couple of weeks…

Continue reading

cybersecurity

Time to Re-think Vulnerabilities Disclosure

Public disclosure of vulnerabilities has always bothered me and I wasn’t able to put a finger on the reason until now. As a person who has been involved personally in vulnerabilities disclosure, I am highly appreciative of the contribution security researchers on awareness and it is very hard to imagine what would the world be like without disclosures. Still, the way attacks are being crafted today and their links to such disclosures got me into…

Continue reading

cybersecurity

Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts are compromised, then your whole system is compromised, and the compromised ones become your weakest links. The weakest link fits well with attackers? mindset which always looks for the least resistant path to their goal. Third parties in computers present an intrinsic security risk for…

Continue reading

cybersecurity

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand in this match.? Attackers are on the rise due to their growing financial interest?motivating a new level of sophisticated attacks that existing defenses are unmatched to combat. The fact that almost everything today is connected to the net and the ever-growing complexity of software and…

Continue reading

cybersecurity

A Tectonic Shift in Superpowers or What Sony Hack Uncovered to Everyone Else

Sony hack has flooded my news feed in recent weeks, everyone talking about how it was done, why, whom to blame, the trails which lead to North Korea, and the politics around it. I?ve been following the story from the first report with an unexplained curiosity and was not sure why since I read about hacks all day long. A word of explanation about my “weird” habit of following hacks continuously, being a CTO of…

Continue reading

startups

2010 The Decade of Content Discovery

The last decade, 2000-2009, flourished with new content creation tools: blogging, tweets, videos, personal pages/profiles, and many others. One thing that did not catch the speed of innovation on the content creation side is content discovery tools. We are still mainly using Google’s interface of search results to find stuff interesting. There were few tryouts for visualizing things differently but none of them prevailed. The feeling of something missing always happens to me when I…

Continue reading

innovation

Machine Operated Web Applications

Software applications have two main perspectives the external perspective where interfaces to the external world are defined and consumed and the internal perspective where an internal structure enables and supports the external interface. Let me elaborate on this: The internal perspective shows the building blocks and layers within the application allowing specific data flow and processing. To further simplify things let’s take an example from the real world and that is a real building block.…

Continue reading

innovation

Is Web 3.0 The Right Name for The Next Internet Uphill?

I get to see here and there the term ‘3.0’ used in reference to the next internet/technology revolution and somehow it does not feel right to me. I am not sure about this but for me, the coined term ‘2.0’ was a metaphor belonging to the concept of software versioning. If the first internet era where infrastructure was established is called ‘1.0’ implying the first version of a product then what we had recently was…

Continue reading

cybersecurity

Why CEO should blog – my personal experience

Amanda Watlington relates to USAToday article on Blogging and CEO on a post Blogs and Feeds: CEO Blogs — Where Angels(?) Fear to Tread. I am a CEO of a new venture company and a blogger for the last four months and I wanted to write down what do I get from it: 1) Feedback on my thoughts – As a CEO and a person in general I have different opinions on various subjects related…

Continue reading