Spreadsheets: Use at Your Own Peril

For the second time in the last three months, I had a grateful client report back to me that a new report commissioned out of my software product uncovered errors in their former spreadsheet-based billing system.  In this case, they would have under-billed a client by...

Backup Horror – Jeff Atwood’s Blog Goes Poof!

Jeff Atwood writes one of the best programming blogs on the Internet, Coding Horror.  His articles are an eclectic mix of good programming practice with oblique connections to current events and societal observations.  That’s why it’s so shocking to learn...

The Fatal Flaw In IT Security

“There is no such thing as 100% inspection.” According to Dr. Jim Stewart of Northern Illinois University in DeKalb, IL “While working on my dissertation, I was reviewing some trade magazines from the 50’s. There were a number of case studies showing...

Google: All Your Base Are Belong to Us

For those not schooled in the “Nerd Classics,” the phrase “All your base are belong to us” refers to the incorrect language translation of a video game’s opening screen sequence that became on of the Internet’s first memes.  In this...