Peter Coffee is Director of Platform Research at salesforce.com, where he serves as a liaison with the developer community to define the opportunity and clarify developers' technical requirements on the company's evolving Apex Platform. Peter previously spent 18 years with eWEEK (formerly PC Week), the national news magazine of enterprise technology practice, where he reviewed software development tools and methods and wrote regular columns on emerging technologies and professional community issues.Before he began writing full-time in 1989, Peter spent eleven years in technical and management positions at Exxon and The Aerospace Corporation, including management of the latter company's first desktop computing planning team and applied research in applications of artificial intelligence techniques. He holds an engineering degree from MIT and an MBA from Pepperdine University, he has held teaching appointments in computer science, business analytics and information systems management at Pepperdine, UCLA, and Chapman College.
When it comes to the quasi-religious subject of development methods, I try to avoid sectarian violence. I like to think of programming languages, for example, in the same way that I think of wrenches: the all-purpose variety tend to do a wide range of jobs with only mediocre success — but when languages evolve under […]
A day without a new blog entry is a failure to live up to the promise. This medium demands the feel of a conversation, not of a chess game by snail mail — and the WiFi laptop, combined with the public hot spot, is therefore the defining tool of the 21st-century journalist to at least […]
Sometimes, fate hands me the perfect pair of news hooks from which to hang a metaphor. So it is with this weeks combination of the Eclipse Foundations move to join the Java Community Process, the Object Management Group and the Open Services Gateway initiative Alliance—in the same week that Hondas Asimo robot demonstrated in Las […]
The runaway success of Nintendos motion-sensitive Wii game controller, with December sales of nearly 1 million units, turned out to be merely a prequel to Januarys debut of Apples iPhone, a device that redefines expectations, if not quite yet realities, for handheld device interaction and connectivity. Developers are on notice: The next generation of personal, […]
Boy, it’s got to feel bad when you destroy a perfectly good working spacecraft with a dumb bug in a software upgrade. Hippocratic sentiments like “First, do no harm” certainly do come to mind. The prospect of sitting at a machine for ‘way too much time, installing expensive software only to wind up with something […]
A location is not a mere number or label. On a large scale, location information challenges application developers to work with the mathematics of movement around the not-quite-spherical surface of the Earth; on a small scale, it requires complex calculations of optimal routes based on frequent updates of rapidly changing conditions. But the investment of […]
Many trifling changes are hyped as “the end of an era,” but sometimes the phrase is well-chosen. The final removal of Morse code proficiency requirements for all classes of amateur (“ham”) radio licenses in a year-end action by the Federal Communications Commission is one of those signal events—pun intended. Even if youve never seen a […]
If you ask most people to free-associate from the trigger term “September 2001,” likely responses might be “World Trade Center” or “terrorists.” Only people at the epicenter of an enterprise IT operation are likely to recall, without being reminded, that the week after 9/11 was marked by the worldwide attack of the Nimda worm—which many […]
When I heard about the Ford/Microsoft announcement at this weeks Consumer Electronics Show in Las Vegas, my first thought was the radically different time frames of the consumer auto and the consumer electronics markets. Ive never kept a new car for less than six years, and my typical tenure for a car that I buy […]
Reading through the updates on the latest PDF-related security flaw, I found one key observation about the pathway to exploits with full access to local file systems. Quoting CTO Jeremiah Grossman at White Hat Security, a CNET story noted that “For an attack to work, a malicious link has to point to an existing PDF […]