Has stealing data from an employer become socially acceptable?

bostonHas Silicon Valley hacked our souls?

This week I was a little depressed to read a corporate marketing blog from Citrix in which an employee highlighted the need for a security product via a personal anecdote of how he’d left a previous employer for a competitor and had stolen a lot of customer data by downloading it on to an external hard-drive. Continue reading “Has stealing data from an employer become socially acceptable?”

Product Releases – Soft is OK but don’t be Squidgy

business hand pushing product quality on virtual screenWhat is a soft product launch?

Wikipedia has a definition of a soft product launch – here; which says: “A soft launch is the release of a website, hotel, or other Product (business) or service to a limited audience. Soft-launching is a method for gathering data on a product’s usage and acceptance in the marketplace, before making it generally available as a hard launch or grand opening. Companies may choose a soft launch to test the viability of a product or to fine-tune a product before implementing a larger marketing effort.” Continue reading “Product Releases – Soft is OK but don’t be Squidgy”

Freelancers: Couriering laptops safely and why separating client hardware from your clean underwear supply is a good thing…

From an article I published on LinkedIn: https://www.linkedin.com/pulse/freelancers-couriering-laptops-safely-why-separating-client-berry/

Sending Laptops by courier. As a freelancer in the UK, I’m increasingly finding clients prefer to issue me with a laptop they have configured, dedicated to just their work, which means I’m always having to triple check if I have the right laptops with me and I’ve got to buy a new laptop bag as the current one has split as a result of optimistically cramming three in it when probably designed for one – oops!

BUT it also means I’m frequently sending/collecting laptops to/from base by motorcycle courier (some don’t trust postal couriers) or FedEx/DHL etc. This process puts some legal obligations on the sender, sometimes me and sometimes the company/organisation and there are a few things to be aware of.
Continue reading “Freelancers: Couriering laptops safely and why separating client hardware from your clean underwear supply is a good thing…”

Review of Additive Manufacture and Generative Design for PLM/Design at Develop 3D Live 2018

A couple of months ago, back at D3DLive! I had the pleasure of chairing the Additive Manufacturing (AM) track. This event in my opinion alongside a few others e.g. Siggraph and COFES is one of the key technology and futures events for the CAD/Graphics ecosystem. This event is also free thanks in part to major sponsors HP, Intel, AMD and Dell sponsorship.

A few years ago, at such events the 3D-printing offerings were interesting, quirky but not really mainstream manufacturing or CAD. Continue reading “Review of Additive Manufacture and Generative Design for PLM/Design at Develop 3D Live 2018”

AWS and NICE DCV – a happy marriage! … resulting in a free protocol on AWS

weddingIt’s now two years since Amazon bought NICE and their DCV and EnginFrame products. NICE were very good at what they did. For a long time they were one of the few vendors who could offer a decent VDI solution that supported Linux VMs, with a history in HPC and Linux they truly understood virtualisation and compute as well as graphics. They’d also developed their own remoting protocol akin to Citrix’s ICA/HDX and it was one of the first to leverage GPUs for tasks like H.264 encode.

Because they did Linux VMs and neither Citrix nor VMware did, NICE were often a complementary partner rather than a competitor although with both Citrix and VMware adding Linux support that has shifted a little. Continue reading “AWS and NICE DCV – a happy marriage! … resulting in a free protocol on AWS”

Open-sourced Virtualized GPU-sharing for KVM

Open source background concept glowingAbout a month ago Jack Madden’s Friday EUC news-blast (worth signing-up for), highlighted a recent  announcement from AMD around open-sourcing their GPU drivers for hardware shared-GPU (MxGPU) on the open-source KVM hypervisor.

The actual announcement was made by Michael De Neffe on the AMD site, here.

KVM is an open source hypervisor, favoured by many in the Linux ecosystem and segments such as education. Some commercial hypervisors are built upon KVM adding certain features and commercial support such as Red Hat RHEL. Many large users including cloud giants such as Google, take the open source KVM and roll their own version.

Continue reading “Open-sourced Virtualized GPU-sharing for KVM”

Significant announcements for AR/VR for the CAD / AEC Industries

03C15780Why CAD should care about AR/VR?

VR (Virtual Reality) is all niche headsets and gaming? Or putting bunny ears on selfies… VR basically has a marketing problem. Looks cool but for many in enterprise it seems a niche technology to preview architectural buildings etc. In fact, the use cases are far wider if you get passed those big boxy headsets. AR (Augmented Reality) is essentially bits of VR on top of something see-through. There’s a nice overview video of the Microsoft Hololens from Leila Martine at Microsoft, including some good industrial case studies (towards the end of the video), here. Sublime have some really insightful examples too, such as a Crossrail project using AR for digital twin maintenance.

This week there have been some _really_ very significant announcements from two “gaming” engines, Unity and the Unreal Engine (UE) from Epic. The gaming engines themselves take data about models (which could be CAD/AEC models) together with lighting and material information and put it all together in a “game” which you can explore – or thinking of it another way they make a VR experience. Traditionally these technologies have been focused on gaming and film/media (VFX) industries. Whilst these games can be run with a VR headset, like true games they can be used on a big screen for collaborative views. Continue reading “Significant announcements for AR/VR for the CAD / AEC Industries”

Android Rooting and IoS Jailbreaking – lessons learned for IoT Security

Many security experts regard Android as the wild west of IT. An OS based on Linux developed by Google primarily for the mobile devices but now becoming key to many end points associated with IoT, Automotive, Televisions etc. With over 80% of smartphones running Android and most of the rest using Apple’s iOS, Android is well established and security is a big concern.

Imagine you are a big bank and you want 20000 employees to be able to access your secure network from their own phones (BYOD, Bring Your Own Device) or you want to offer your millions of customers your bank’s branded payment application on their own phone. How do you do it? Continue reading “Android Rooting and IoS Jailbreaking – lessons learned for IoT Security”

Effective Digital Content: Identifying your content top 10!

Make your top content work even harder!

This is a quick and dirty trick common in enterprise marketing and often used by pro-active Product Managers themselves. Most enterprise product marketing and product managers can get access to the google/Wordpress analytics for their products.

It is typical that a small % of the content on any website is attracting the most reads. I’ve recently done some analysis on my own blog site. In this article, I’ll use it as example to explain:

1)      How to analyse your view metrics to deduce your top content Continue reading “Effective Digital Content: Identifying your content top 10!”

Blog at WordPress.com.

Up ↑