Writing Samples
Browse selected work below. Additional samples available on request.
- Patching Vulnerabilities in AI Chips – The Communications of the ACM
- You Deserve Some Cybersecurity Today – The Communications of the ACM
- Juice Jacking – The Communications of the ACM
- The Pros and Cons of Zero Trust – The Communications of the ACM
- Internal Chat Logs of Ransomware Group Leaked – The Communications of the ACM
- AI Empowers Novices to Launch Cyberattacks – The Communications of the ACM
DrChrono mobile EHR app review – PracticeLink Magazine
How 5G Wireless Could Transform Business – BizTech
Life on the Network Edge – Fortune
Li-Fi: High-Speed communication via LED Modulation– ArchitecturalLighting
SDN and NFV: What are the features and benefits?– TechBeacon
FP&A meets artificial intelligence– FM Magazine
An In-Depth Look Into Machine Learning– CyberCoders.com
Top In-Demand Skills for Cloud Security– CyberCoders.com
Where is the demand for Microsoft Windows skills in 2015?– CyberCoders.com
How to Transition Your IT Support Gig Into a Higher Level Tech Job– CyberCoders.com
What is the demand for iOS skills?– CyberCoders.com
Six Emerging Startup Cities for 2015– CyberCoders.com
How to Add Experience In DevOps To Your Resume– CyberCoders.com
Three Big-Paying, Big Data Jobs– CyberCoders.com
Why is There Such a Talent Drought for Build-Release Engineers?– CyberCoders.com
Why Linux is in extremely high demand– CyberCoders.com
Is 5G Opening Security Holes in the Internet of Things?– Communications of the ACM
The Challenges of Protecting US
Airports– Faulkner
Brash botnets are bilking you and your customers– Hosting Standard
What is bot traffic?– PerimeterX
EMAIL AT: david@davidgeer.com






