'

David Gewirtz

In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, CBS Interactive's Distinguished Lecturer David Gewirtz is an author, U.S. policy advisor and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing. David is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.

Latest Posts

On the death of SOAP

On the death of SOAP

In a series of posts, Carlos Peres declares SOAP comatose, but notofficially dead and then adds a fewnails to the coffin. Says Carlos:Today, half a year since my prediction of the rise of REST and the fall ofSOAP, denial has been now replaced with panic.

March 25, 2005 by in Enterprise Software

ETech summary, day 3

ETech summary, day 3

This morning's opening keynote presenter was Larry Lessig, a natural at a conference about remixing. Larry gives an amazing presentation--very entertaining and informative.

March 17, 2005 by in Networking

ETech summary, day 2

ETech summary, day 2

This morning's events were geared more to the social side of emerging technology. Neil Gershenfeld, the Director of the Center for Bits and Atoms at MIT spoke about giving people in developing countries the means of fabricating things as a means of economic development (see Chris Jablonski's write-up as well).

March 16, 2005 by in Hardware

ETech summary, day 1

ETech summary, day 1

ETech has lived up to its reputation for delivering new and interesting ideas. The morning was filled with short lightening talks (what O'Reilly calls "higher order bits) by some of the people making technology, including a talk by Danny Hillis on Applied Minds and an announcement of a new search platform, called A9, from Amazon.

March 15, 2005 by in Enterprise Software

The Broadband wars need recruits

The Broadband wars need recruits

If you lived in Orem, Utah, a town of nearly 100,000 people south of Salt Lake, you'd be able to sign up for 10Mbs symmetric broadband service from a small, local ISP, MSTAR. How did this little ISP pull off this feat?

March 8, 2005 by in Networking

Putting custom back in customer

Putting custom back in customer

A Customer interaction hub (CIH) is an integrated system that supports the customer touchpoints, such as pre-sales portals, customer service, and even warranty work, in a coordinated way.

February 28, 2005 by in CXO

Seeing the News Differently

Seeing the News Differently

Once a month, I host a breakfast for anyone who bothers to show up and we sit around and discuss technology. I call it the CTO Breakfast because I want it to be fairly technical and I like a product, rather than an IT focus.

February 24, 2005 by in Big Data Analytics

You can never be too rich or too thin

You can never be too rich or too thin

In order to sell Longhorn when it launches, Microsoft has been trying to convince everyone of the importance of rich clients. Microsoft will lose its lock on the operating system if the only thing that people run on them are browsers.

February 22, 2005 by in Google

What price, Real ID?

What price, Real ID?

Declan McCullagh has a detailed piece on the Real ID legislation that just passed the US House. The legislation would effectively force the States to meet certain requirements if they expect their driver's licenses to be used as IDs for federal purposes--like getting on an airplane.

February 14, 2005 by in Legal

Going After Phishers

Going After Phishers

You've no doubt been the target of phishing scams--those e-mails that claim there's some kind of problem with one of your accounts somewhere. When you click through to a legitimate-looking Web site, you're asked for personal information that can then be used by the phishers for various nefarious purposes.

February 14, 2005 by in Security

As the Canopy Turns

As the Canopy Turns

As someone who'd been involved in Utah's high tech industry for a dozen years, I watched the founding and growth of Ray Noorda's Canopy Group with some interest and excitement. Before there were many VCs in Utah, Canopy was there, funding start-ups.

February 10, 2005 by in Legal

Real-time augmented reality

Real-time augmented reality

Augmented reality systems essentially bring the special effects ofmovies into more practical uses. Maybe one of the simplest examples are thesystems that let you see what your house will look like with the paintscheme you've picked out.

February 7, 2005 by in CXO

Top Stories