I've been blogging since at least 2003


Somebody on Twitter linked to a very good blog post by Anne R. Allen, who wrote about what she learned while blogging for 10 years. Which made me wonder: How long have I been blogging? (And what have I learned?)

The Wayback Machine answered the first question. It looks like I’ve been blogging for around 15 years.

The first entry I could find for The Raw Feed, which was my blog back in the day, is for 2003. Here’s an archive of my blog on The Wayback Machine from 2003 - 2005. Here’s a sample page from the blog in 2003.

Over the years, my blog would embrace new platforms, then move again when those platforms were killed off. Remember Posterous? How about Google+?

What I’ve learned is: Don’t embrace the blogging platforms that companies create; own your own domain. Duh.

Google has so much potential...

Screenshot 2019-06-29 at 3.27.53 PM.png

It sounds strange to say this about a massively profitable and venerable Silicon Valley giant, but Google’s really got a lot of potential.

Google has some of the most powerful cloud services, industry-leading artificial intelligence, incredible content and even brilliant hardware. But the greatness always seems just out of reach, because of a failure to do (frankly) what Apple does better — integrate what it’s got into an elegant and usable whole.

Here are my Google dream integrations.

What happens when cars get emotional?


Self-driving cars are nice—but the real revolution is automotive empathy.

(Read my column.)

While we’re all waiting for Total Recall’s “Johnny Cab” to arrive, a more profound change will hit the road: Cars are learning to get in touch with our thoughts in dramatic ways.

Emotion and activity detection will take many forms and employ myriad new technologies, especially artificial intelligence (AI) that processes real-time data from cameras, microphones, biosensors, and even radar.

The biggest reason for this tech shift is safety—because the most dangerous thing about a car is the driver.

Ghost Sign: Ménerbes, France


I love this ghost sign on an old wall in Ménerbes, which is a beautiful village the Luberon in Provence in France. The most visible word in this sign is the word “telegraphes” My guess is that this is the location of an old business where locals could send a telegraph, use a telephone and probably other modern communications services. Can anyone guess what the rest of the sign says?

When you drive a tiny Eurocar, they let you park anywhere

IMG_20190616_234714 (1).jpg
00000IMG_00000_BURST20190616234441740_COVER (1).jpg

Amsterdamians famously ride bicycles everywhere, and it’s true. (And I haven’t seen a single bike rider wearing a helmet.) A few ride scooters, and some even drive real cars. But they also drive a lot of tiny cars, including some that are, let’s face it, golf carts.

The best thing is that unless you’ve got a “regular” car, parking is no problem in Amsterdam. Park on the sidewalk? No problem!

Why ‘ambient Computing’ Is just a marketing buzzword


Suddenly, “ambient computing” is in the air. I blame Intel, which recently trotted out a concept prototype they call an “Ambient PC.” But like all other hyped examples of so-called “ambient computing,” Intel’s reference design is really just a laptop that does while closed what regular laptops do while open. And that capability doesn’t make the laptop an “ambient computing” device.

In other words, “ambient computing” is just a marketing buzzword for now.

Real “ambient computing” will probably show up in your life when you buy your next car.

Phishing, smishing -- why everyone needs to know social engineering jargon


Social engineering targets human fallibility — flaws in human reasoning. That’s why training and knowledge is key.

But training courses often avoid jargon. That’s a mistake when it comes to social engineering attacks.

The reason is that the definitions of these terms contain within them the methods. To know the words is to expect the attacks — or recognize them when they occur. It’s time to integrate the learning and memorization of social engineering jargon into every security training session. By learning these words cold, employees will also learn to avoid falling prey to social engineering attacks.

Here’s your vocabulary list. There WILL be a test.