Writing Samples
Browse selected work below. Additional samples available on request.
- Patching Vulnerabilities in AI Chips â The Communications of the ACM
- You Deserve Some Cybersecurity Today â The Communications of the ACM
- Juice Jacking â The Communications of the ACM
- The Pros and Cons of Zero Trust â The Communications of the ACM
- Internal Chat Logs of Ransomware Group Leaked â The Communications of the ACM
- AI Empowers Novices to Launch Cyberattacks â The Communications of the ACM
DrChrono mobile EHR app review â PracticeLink Magazine
How 5G Wireless Could Transform Business â BizTech
Life on the Network Edge â Fortune
Li-Fi: High-Speed communication via LED Modulationâ ArchitecturalLighting
SDN and NFV: What are the features and benefits?â TechBeacon
FP&A meets artificial intelligenceâ FM Magazine
8 insights boards should know about artificial intelligenceâ FM Magazine
An In-Depth Look Into Machine Learningâ CyberCoders.com
Top In-Demand Skills for Cloud Securityâ CyberCoders.com
Where is the demand for Microsoft Windows skills in 2015?â CyberCoders.com
How to Transition Your IT Support Gig Into a Higher Level Tech Jobâ CyberCoders.com
What is the demand for iOS skills?â CyberCoders.com
Six Emerging Startup Cities for 2015â CyberCoders.com
How to Add Experience In DevOps To Your Resumeâ CyberCoders.com
Win Big By Training for the Coming Boom in SDN/Virtualized Networkingâ CyberCoders.com
Three Big-Paying, Big Data Jobsâ CyberCoders.com
Why is There Such a Talent Drought for Build-Release Engineers?â CyberCoders.com
Why Linux is in extremely high demandâ CyberCoders.com
Is 5G Opening Security Holes in the Internet of Things?â Communications of the ACM
The Challenges of Protecting US
Airportsâ Faulkner
How studying the blackhat community can help enterprisesâ TechTarget
Brash botnets are bilking you and your customersâ Hosting Standard
What is bot traffic?â PerimeterX
Breach notification lawsâ CSO
EMAIL AT: david@davidgeer.com






