JF

Josh Fruhlinger

Contributor at cio.com

Hello! I'm a writer, performer, and professionally funny person who lives in Los Angeles. I have been online since 1992 and covering tech since the first dot-com boom. I am interested in how the promises of new technology play out (for good or ill) in the real world, how organizations deal (or fail to deal) with tech change, and the history of IT. https://www.jfruh.com/

  • Los Angeles, California, United States

Publications

  • csoonline.com
    13 articles
  • InfoWorld
    10 articles
  • LeadDev
    6 articles
  • infoworld.com
    5 articles
  • networkworld.com
    2 articles
  • cio.co.ke
    2 articles
  • cio.com
    2 articles

Writes Most On

CloudComputingPhishingSecurityHackerMalwareOpensourceModelInternationalDataGroupEncryptionGoogleVulnerabilityRansomwareComputerSecurityMicrosoftWindowsMicrosoftIntelligenceInformationSecurityRansomBitcoinDenialofserviceAttackSourceCodeIBMOperatingSystemPersonalComputerSoftwareDevelopmentUnitedStatesLinuxArtificialIntelligenceAmazonWebServicesFloppyDiskDepartmentsOfFranceUnixJavaUkraineGartnerRussianLanguageApplicationProgrammingInterfaceRussiaMemoryVirusJavaScriptHIVAWSAPIDataSecurityAmazonAntivirusSoftwareCyberattackInternetAIProteinproteinInteractionInfection
  • Can AI solve your technical debt problem?
    29 Apr—CIO Magazine
    AI coding tools are reshaping how developers tackle tech debt. But human judgment is still essential to understanding crucial context. IT leaders know they must eventually deal with technical debt, but because addressing it doesn’t always directly result in increased revenue or new capabilities, it can be difficult to get business management to take it seriously. But technical debt can undercut an organization’s ability to innovate long term, and the shortcuts taken during initial development...
  • —InfoWorld
  • Data mesh vs. data fabric vs. data virtualization: There’s a difference
    21 Apr—InfoWorld
    Understanding the differences between data mesh, data fabric, and data virtualization can help organizations turn scattered data into a strategic advantage. Organizations are getting serious about extracting value from the data they produce and collect, even when that data is spread out across multiple clouds, data centers, and silos. Three terms you might hear when learning techniques for this are data mesh, data fabric, and data virtualization. The three concepts might even seem to overlap...
  • —LeadDev
  • What is zero trust? The security model for a distributed and risky era
    28 Feb—CSO Online
    A zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach. What is zero trust? Zero trust is a cybersecurity model or strategy in which no person or computing entity is considered inherently trustworthy, regardless of whether they are inside or outside the organization’s network. It’s distinct from a more traditional way of thinking about computer networks that considers everything inside some defined boundary — everyone on...