How We Know Us

  • vec2vec attacks

    vec2vec attacks

    The emergence of vec2vec translation capabilities fundamentally disrupts the security model of vector databases that relied on embedding opacity. Previously, raw embeddings were considered computationally intractable to reverse-engineer or meaningfully interpret without access to the original model and training process. The End of Embedding Opacity Vector databases have historically operated under an implicit security assumption:…

  • Selling is not the opposite of buying

    Customers buy software, but they’re sold promises.

  • The Four Myths: Why No One Wants To Buy Your Lousy Software

    It doesn’t matter if your software is amazing, no one wants to buy what you’re selling. Customers don’t care what features it has, not really. They care what it can do for them. It’s not until you really spend time with customers that you can find that magical “market fit” and understand the difference between…

  • Alpha and Beta of Software Risk

    When you customize software, you create more unique risk, and remove yourself from the pool of shared risk. Shared risk is good, as there’s a good chance someone else might encounter a problem before you, and collectively you can encourage the vendor to fix it. Selective unique risk is good because it can be a…

  • Control Charts and GTD

    I wrote this some while back during my eighth week using Todoist as my task tracking software. Every time I pick up a new one, I start over with what I remember from half-heartedly working through David Allen’s Getting Things Done methodology. It just happens that about four weeks into using Todoist, I started reading…

  • Valuing Agility in IT

    Every vendor offering you a cloud product touts their ability to provide agility to your IT organization. But, how do you place a value on agility in order to prioritize IT projects? There are a number of economic tools that come up frequently in describing value of software investments. I favor a simple economic approach:…

  • A Nephew’s Advice for New Fathers

    Be nice to the baby Only gentle tickles Wake up early so Auntie doesn’t know I give the baby candy or ice cream Don’t let the baby go on a boat until old enough. 4 or 5? Don’t let the baby play basketball until 10 or 11 years old. Unless there’s a lower basketball hoop.…

  • Ansible, Simple, and Anti-Fragility

    Once upon a time, Red Hat acquired a company called Ansible. Right before the transaction closed, The Boss called and said, “Erich, I want you to make Ansible part of Red Hat. Don’t @#$% it up.” That’s when my real adventure with automation began. Ok, the tech is nearly as amazing as the people, but…

  • Your podcast made me buy a new phone

    I have an iPhone 6. It is not a happy phone. It is sad, angry, and generally disappointed to still be in commission and yearns to be put out on a ice flow. It generally expresses its displeasure by passive aggressively inventing remaining battery percentage, rebooting at whim, and pretending storage is full. So, long…

  • Repairing the Crown

    Should you ever have to repair a 1950-something Crown Range, they’ve done something smart. I had to figure it out, but it’s smart. Philips head screws are for holding things together (like sides the over doors), and slotted screws are for attaching things onto other things (like hinges). They provided a clear visual signal about…

Got any book recommendations?