The first Apple Silicon Macs are out in customers’ hands now, and people are really excited about them. But there are a couple of odd ideas bouncing around on the Internet that are annoying me. So, here’s a quick fact check on a couple of the more breathless claims that are swirling around these new Macs.… Continue reading Fact-checking some Apple Silicon exuberance
Category: Uncategorized
What I learned by NOT playing D&D
What I learned by NOT playing D&D I really loved playing Dungeons & Dragons as a kid, but I really haven’t played much since becoming an adult. And I haven’t run a game in this century. Every now and then, I’d talk with Yvette about it, and she’d say, “We should write up an… Continue reading What I learned by NOT playing D&D
Good takes and bad takes on Apple Silicon
Good takes and bad takes on Apple Silicon There are a lot of people out there that seem to be clinging to some weird ideas about what the Apple Silicon transition is going to look like, and what the Apple Silicon team “can do”, in terms of what they can deliver. Good Takes First, someone… Continue reading Good takes and bad takes on Apple Silicon
What Apple Announced at WWDC 2020
What Apple Announced at WWDC 2020 It looks like I got some things right, and some things wrong, in my previous post. Let’s look at what Apple actually announced. Mac with Apple Processors, across the line Yes, they really are transitioning the whole Mac line to Apple’s own processors. The timeline they announced is “within… Continue reading What Apple Announced at WWDC 2020
ARM Macs are coming, and faster than you think
ARM Macs and transition timeframes (note: This is a lightly-edited version of a post originally published on June 13th, 2020) We all knew this was coming. In fact, some of us have been expecting it for years. Various rumor outlets are saying that Apple will announce at WWDC that they’re transitioning the Macintosh line from… Continue reading ARM Macs are coming, and faster than you think
Movie Mini-Review: Rampage
Rampage was…not good. (Warning – “spoilers” below, though honestly, there’s not much to spoil)I see you folks in the back, snickering and saying “well, what did you expect?”. Here’s the thing though – Rampage was probably the most-disappointing movie I’ve seen in the last year. It’s an onion of layered badness. Even The Rock couldn’t save… Continue reading Movie Mini-Review: Rampage
Mergers: The Good
(intro blog post here) How to help your acquired employees succeed Out of the 6 acquisitions I’ve been involved with, two really stand out as positive experiences, both for the acquired and the parent company. Here’s what was different about those two mergers, as opposed to the ones that didn’t go so well. Integrate the… Continue reading Mergers: The Good
Mergers: The Good, The Bad, and The Ugly
You’ve been acquired how many times? In my career, I’ve been fortunate enough to have worked for a number of small software/hardware companies, several of which were absorbed by much larger companies. I though tit’d be interesting to compare and contrast some of the ways the various mergers went good and bad, and what acquiring… Continue reading Mergers: The Good, The Bad, and The Ugly
That delicate line between security and convenience
A key problem, maybe the key problem in software security is how to properly balance user convenience with security. Adding additional security to a system often includes extra work, more time, or other compromises from the end-user. And reasonable people can disagree about where the line is for the appropriate trade-off. That iPhone camera permissions “flaw” There… Continue reading That delicate line between security and convenience
"Responsible Encryption" – what does that mean?
This weekend I read this excellent article by Alex Gaynor responding to Deputy Attorney General Rod Rosenstein’s remarks on encryption to two different audiences last week. Please do go and read it when you get a chance, as it delves into the sadly common tactic of pointing to a bunch of scary criminal incidents, then saying… Continue reading "Responsible Encryption" – what does that mean?