Feeds

Who should be America's CTO?

Vote now and tell us

  • alert
  • submit to reddit

Seven Steps to Software Security

Ted Dziuba

Ted Dziuba

Think of Ted as the antidote to the Lessig candidacy. Like Larry, he's been funded by Google - but there the similarity ends. While a Lessig CTOship would mean lots of blogs and wikis, and really expensive consultants to make sure Federal drones use them, a Tech Czar Dziuba would surely take an axe to sloppy Javascript and grossly baroque MySQL implementations. At Uncov and now as a Reg columnist, he's the scourge of Web 2.0 FAIL. Instead, Ted espouses old-fashioned engineering values like uptime, resilience, data integrity and choosing the right tool for the job. But don't hold that against him. Would he run? It's Friday afternoon, and we couldn't be bothered to ask. But we will, soon.


Jeff Merkey

"I love British girls!" is how Jeff Merkey greeted us on our one and only interview with him. "They've got the biggest tits in the world!" We've been impressed ever since. A former Novell CTO, Merkey's feuds are the stuff of legend: targets include Wikipedia, Groklaw, Slashdot and Bruce Perens (because Linux is used by terrorists). After Merkey's son fell ill from E.Coli poisoning after eating spinach on a Delta Airlines flight, Merkey sued both the airline, and its food supplier Natural Selection Foods (the latter for emotional distress). Merkey argued that use of the brand Natural Selection "...[implied] that the Plaintiff's 23 month old son...will be subject to Charles Darwin's theories of Natural Selection by virtue of not possessing an immune system capable of combating E.Coli and its deadly HES-inducing shiga toxins". A Merkey CTOship would not be dull.

Seven Steps to Software Security

Next page: Siegfried and Roy

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.