Mark Gibbs

Contributing Editor

Mark Gibbs is an author, journalist, and man of mystery. His writing for Network World is widely considered to be vastly underpaid. For more than 30 years, Gibbs has advised on and developed product and service marketing for many businesses and he has consulted, lectured, and authored numerous articles and books about networking, information technology, and the social and political issues surrounding them. His complete bio can be found at http://gibbs.com/mgbio

Big data paper shows stock market trades behave like light bulbs

Enterprise encryption adoption up, but the devil's in the details

Enterprise encryption adoption up, but the devil's in the details

A new survey by the Ponemon Institute finds that enterprise-wide encryption strategies are accelerating but there are risks to consider

ChefSteps' Joule: Food meets tech. Result? Delicious!

ChefSteps' Joule: Food meets tech. Result? Delicious!

The Joule immersion circulator from ChefSteps cooks up sous vide with a big helping of technology for a great price

OS X code names for US election candidates

OS X code names for US election candidates

Apple marketing made OS X code names a 'thing' so why aren't they making point versions for the election candidates?

Houston, we have code!

Houston, we have code!

Apollo 11 went to the moon and back guided by a computer with 0.08% of the processing power of an iPhone 5s ... now you can read the code that drove the mission and try the simulator

Cayenne, how to manage a frustration of IoT devices

Cayenne, how to manage a frustration of IoT devices

You're deploying IoT devices like a fiend but what you've got is a management problem akin to herding cats. Cayenne from myDevices is a promising way to get them under control.

Nexar, turning your smartphone into a dash cam with crowdsourced smarts

Nexar, turning your smartphone into a dash cam with crowdsourced smarts

Nexar combines car video with sensor data, Big Data, and artificial intelligence to create road intelligence.

Automotive cybersecurity; what we don't hack will probably be used to kill us

Automotive cybersecurity; what we don't hack will probably be used to kill us

First we saw a Jeep Cherokee hacked, then the hackers explained how they did it, a book on hacking cars was published, the FBI issued a PSA, and Michigan plans to pass car hacking laws. Automotive cybersecurity is a serious issue,...

9 Raspberry Pi programming tools bundled with Raspbian

9 Raspberry Pi programming tools bundled with Raspbian

The Raspbian OS has killer programming tools built in!

Crafting responsive email with CoffeeCup's RED

Crafting responsive email with CoffeeCup's RED

CoffeeCup Software’s Responsive Email Designer makes creating and testing sophisticated cross-platform email content a lot easier.

Amazing analysis of the Brexit with machine learning

Amazing analysis of the Brexit with machine learning

MonkeyLearn analyzed thousands of tweets concerning the Brexit and the results are fascinating ... and you can do it, too! Eat your heart out, Nate Silver.

Intel Management Engine's security through obscurity should scare the **** out of you

Intel Management Engine's security through obscurity should scare the **** out of you

Intel's latest x86 chips contain a top secret control subsystem called the Intel Management Engine that you can't audit, control, or disable ... what could possibly go wrong?

Load More