Paul Rubens

Freelance techology journalist for BBC, Financial Times, Economist, CIO.com and many other publications. Editor of pavlovpinball.com

Portfolio

Minimising the hacker threat
Businesses should stop worrying about preventing intruders getting into their computer networks, and concentrate instead on minimising the damage they cause when they do. That's...
What CIOs need to know about open source forking
Picture this: Your company is ticking along nicely, making use of a reliable and well-engineered piece of software to support some important business process, when suddenly it...
How playing computer games can make the world safer - BBC News
Playing computer games can help make the world a safer place. Yes, really. Maybe not blockbusters like Grand Theft Auto, but a new type of game designed to perform another...
Where Do M.2 High Capacity SSDs Fit in the Data Center?
There is, they say, more than one way to skin a cat. And if you are after high capacity SSD storage there's more than one way to get it. Put simply, you can go for one big high...
How 2 Legal Cases May Decide the Future of Open Source Software
The days of open source software free lunches are rapidly coming to an end, and that means enterprises that fail to stick to the terms of open source licenses can expect to be...
Do APIs Pose a Security Risk?
APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security. Good security has never been more...
Why it's time to learn COBOL
"When I was in college 30 years ago COBOL was declared dead, but it's still going strong and it's still a very good language." So says Leon Kappelman, a professor of information...
Has the humble password had its day?
Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess. Yet we still forget them. And they also get stolen with alarming...
Does 3D XPoint Spell the End for Flash Storage?
If your storage systems are due a refresh and you are planning future purchases, then there's a huge elephant in the room that needs addressing: Intel and Micron's high...
How tech giants spread open source programming love
"Go is a programming language designed by Google to help solve Google's problems." So said Rob Pike, one of the Go language's designers. That may be the case, yet the open...
7 ways to get more from Slack
Slack exploded onto the group chat scene almost three years ago, and if you're a developer you've almost certainly come across it. One reason for Slack's popularity with...
Can citizen developers bring shadow IT into the light?
Citizen developer tools that allow business staff to build applications are becoming increasingly powerful and can lead to important productivity gains. That's the view of Mark...
'Paying by smart watch? That'll do nicely' - BBC News
When hipster customers at Newcomer Wines grab a bottle of Austrian vino, they expect to be able to pay using their Apple smart watches. Cash is decidedly old hat. The ability to...
How to Develop Applications for the Internet of Things
What's the best way to build an application that could do anything from control home appliances remotely to gather meteorological data from sensors to produce a weather...
What are containers and why do you need them?
Docker exploded onto the scene a couple of years ago, and it's been causing excitement in IT circles ever since. The application container technology provided by Docker promises...
Helping feed the world with big data
The analysis of large volumes of data collected from fields, warehouses, trucks - and even animals' stomachs - may be key to preventing widespread hunger in the coming decades.
Why open souce software isn't as secure as you think
The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening.
10 Bad Coding Practices That Wreck Software Development Projects
The Pareto principle states that 80 percent of outcomes can be attributed to 20 percent of the possible causes of a given event. Also known as the 80-20 rule, it's relevant to...
Buffer Overflow 101
How to exploit a buffer overflow

-

Why IT failures are unlikely to go away
Business deals that have to be aborted, staff who don't receive their wages, invoices that don't get paid on time - companies can face potentially catastrophic disruption when...
How Bug Bounty Programs Bring Big Savings and Better Security
Enterprise bug bounty programs are increasing in popularity. They offer cash to hackers who find and report security vulnerabilities and are an effective way for large...
Ten Tips to Make Your SSL Secure
Does you SSL server have misconfigurations and known vulnerabilities that make it insecure?
10 Things You Should Know About Apple's Swift
Apple recently unveiled Swift, a new language to replace Objective-C for OS X and iOS application development. Apple won't accept submissions built using Swift to the iOS or Mac...
How do businesses cope with Bitcoin?
Are virtual currencies just a passing fad, or will they evolve into a valuable tool for doing business?
Cybercrime shopping list prices fall
Fancy a bank account with $300,000 (£184,000) in it? If you know where to look and you don't mind dealing with cybercriminals then the going rate is just $300.
Silk Road: Will cybercrime evolve in wake of takedown?
Silk Road, the infamous online marketplace for drugs and other illegal goods, was closed down by the FBI earlier this month.
Liberty Reserve: Criminals face online cash dilemma
The lowdown on cybercriminal finance and money laundering
Hotel rooms 20ft beneath the sea
Underwater hotel rooms: Is down becoming the new up?
Exposing Russia's murky trade in exploit hack packs
Automated software that hacks PCs in seconds

All Copyrights Belong To Their Respective Owners