Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
One-time password tokens of the type made famous by RSA have been securing enterprise networks for many years. In the consumer space they have been a complete dud, but because of work under development for some time, there’s a decent chance that could change. The point of these tokens is to provide two-factor authentication. In […]
Some time ago I wrote somewhere about Geoff Huston and his projections for the depletion of what remains in the IPv4 address pool. I was intrigued by his work and suggested to him that there were a lot of wasteful class A addresses out there, and perhaps they could be reallocated to better purpose. A […]
The declining practicality of the anti-malware business is an old story; one day it’s got to collapse under the weight of its technical model. Can it be saved in time? During the week of Feb. 4, several vendors and testing organizations announced the formation of the AMTSO (Anti-Malware Testing Standards Organization), which is dedicated to […]
I’ve long been a fan of software as a service, and specifically of hosted e-mail security, and even more specifically of Postini. It’s just the right way to do this sort of thing. Now Postini, acquired about six months ago by Google, is offering a new set of security services bundles. They’re good stuff, just […]
The latest in security compliance regulation is the FDCC, or Federal Desktop Core Configuration. As of Feb. 1, all federal agencies were required to provide to the Office of Management and Budget a list of assets running Windows XP and Windows Vista, and which are compliant with FDCC requirements. By March 31, they will have […]
I take it all back, sort of. ICANN has a way of studying matters, and then studying them some more, and then assigning them to a committee and then putting a preliminary report out for comment – you get the idea. Only after years does the group take action. It seems members have taken action […]
The story of the dismissal of 9 District of Columbia workers for surfing pornography on the Web from their work computers is both a social story and a technical one. My first thought, when I see a story like this, is how stupid some people can be. But it’s even worse than it looks. “Each […]
Everyone believes in privacy (except Scott McNealy); we just differ on how much is the right amount. It is possible to go too far in advocating for privacy. That way lies uncertainty. This seems to be the fate of the European Union, whose Data Privacy Commission leader recently said that IP addresses are personal data […]
I had a moment of clarity today (believe me, I need them). In the wake of the Network Solutions scandal over the company’s employment of front-running and domain tasting, I’ve been talking to a lot of vendors and other interested parties. Front-running is a tricky problem that defies resolution. I’ve been inclined to blame ICANN, […]
I’ve said it before and I’ll say it again: The security market is always looking for new ways to sell you the same thing they already sold you. The new phony category is anti-bot tools. When this happened with spyware it somehow happened backwards. In the face of an established market for anti-malware products, known […]