6 articles written

David Strom

Popular

Paying Homage to the Past: 25 Technologies That Rose…and Fell

The computing landscape is littered with many innovative but...

Your Laptop’s Been Stolen. What Should You Do?

Even the most cautious among us can fall victim...

Free, Must-Have Tools for Social Networking

What do the services Pixelpipe.com, Etherpad.com, Tr.im and namechk.com have...

Explore

Paying Homage to the Past: 25 Technologies That Rose…and Fell

The computing landscape is littered with many innovative but dead products from companies that are no longer with us, or that have been acquired and cast aside. Here’s a brief survey of the most...

Free, Must-Have Tools for Social Networking

What do the services Pixelpipe.com, Etherpad.com, Tr.im and namechk.com have in common? All four are tools that I can't live without these days and didn't even know existed a few months ago. That is how fast...

The Many Myths of Endpoint Security

You've got firewalls, intrusion detection and prevention, virtual private networks, and a perimeter that is as secure as can be. But the problem is that all this security apparatus can be made moot in...

Other Articles