Welcome!

From an International Authority on Network and Internet Technologies

David Strom

Subscribe to David Strom: eMailAlertsEmail Alerts
Get David Strom via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by David Strom

Dell News On Ulitzer This week I begin a new series of video screencasts for Dell’s IT Expert Voice Web site. The site has all sorts of useful information for corporate IT folks that are interested in migrating and using Windows 7, and my humble part will be to produce a regular series of videos similar to what I have been doing on my own over at WebInformant.tv. Do check out this video which talks about the differences between Windows 7 and earlier versions when it comes to networking controls. ... (more)

iPad on Ulitzer - The New Browser Wars: Flash vs. Swipe

iPad on Ulitzer Pardon me for adding yet another iPad analysis (certainly, when a computer product launch makes it into Doonesbury, we have crossed a new threshold of hype), but one thing actually missing from the copious words and videos on yesterday's event at Moscone was the simple fact that we have a new browser war on our hands, and it isn't a pretty sight. The browser wars of yesteryear between Microsoft and Netscape seem so quaint. (And look what happened to Netsacpe, too.) Today it is all about Adobe Flash versus the multi-touch swipe technology that is part of Apple's pr... (more)

The Next PDF You Open May Be Your Last

You know by now not to open unexpected email attachments, but what if someone that appears legit sends you a PDF? How harmful can it be? As it turns out, very. This week a harmless-looking invitation to a Nobel Prize ceremony was a nasty piece of business indeed. When saved to a hard drive and opened, it sets up a backdoor so that the bad guys can take over your PC at will, all while you think nothing is going on. What is troubling is that this isn’t new. This PDF exploit has been around for several years, yet it seems that it doesn’t get much attention from the general public. ... (more)

Time To Join The DevOps Movement

CA Technologies says, “For DevOps to work correctly, it must be treated as a movement, not a market for a specific vendor’s products.” As Arlo Guthrie once sang, with three people it is an organization. But if we can find 50 people who can sing the praises of DevOps, it can become a movement! Trouble is, many software developers are stuck in the past. In a 2012 service virtualization survey of IT executives and managers by analyst firm voke, only 6% of the group responded they were completely confident that new IT applications would be delivered to market on time. But maybe its h... (more)

Google vs. China, Our First Cyber War

Last week we witnessed the first Cyber War, but it didn’t go down quite as many of us expected. Instead of a group of anonymous hackers trying to take over thousands of infected PCs or trying to cut off access to critical infrastructure, we saw Google declare the first salvo in its war against Chinese censorship by moving its servers to Hong Kong. The more I thought about this, the more I realized that this was war, declared by a private company on a nation state. Just because Google doesn’t have its own army (yet), or that no actual physical weapons were fired doesn’t make it a... (more)