Showing posts with label Redundancies. Show all posts
Showing posts with label Redundancies. Show all posts

September 10, 2011

Rising From The Ashes of 9/11

From the smoldering wreckage of the 9/11 attacks, now rises the new World Trade Center (WTC) complex.

According to the Wall Street Journal (10-11 Sept. 2011), the damage from the terrorist attacks of 9/11 resulted in the collapse or partial collapse of 7 buildings including: WTC North Tower, South Tower, and Four, Fix, Six, and Seven WTCs as well the Marriott Hotel. In addition, 11 other surrounding building had major damage including 1, 2, and 3 World Financial Centers and the N.Y.P.D. Command Center.

A decade later, $11 billion has been invested in the reconstruction of the 16 acre site, including $3 billion for One WTC (at 104 stories and 1,776 feet tall)--"making it the most expensive office tower in the U.S.

The cost is being driven upward by enhanced security measures to thwart other potential attacks, and according to Fast Company (Sept. 2011) and the buildings website these include:

1) Safety Materials - Advanced safety materials include dense fireproofing and biochemical filters to protect occupants from spreading threats.

2) Structural Redundancy - Load-bearing structures are being replicated so if there is a failure, "these skyscrapers have steel connections capable of redirecting the path of the upper floors load downward through other structural members." Additionally, the sprinkler system has "two interconnected standpipes, so that if one should fail, the other can compensate."

3) Protected Core - The sprinklers and safety systems (including the buildings communications antennae and ventilation) are being located in a protected inner building concrete core to prevent their being severed or disabled.
4) Escapability - Multiple exits and backups on emergency lighting, wider staircases for escape, separate stairs for first responders, and "lifeboats"--which are elevator escape pods from protected refuge areas on specific floors take evacuees to ground level safety.

I think it is important to recognize and applaud these safety and security enhancements; together, with improvements to our counterterrorism, intelligence, and homeland security operations, we have come a long way.
However, we cannot afford to stop and get complacent with our progress--as we see with the latest security alert, this time for the 10th year anniversary of the 9/11 attack.

In protecting our homeland, we have to get it right every single time, but those who seek to attack us and our way of life, only need to "get it right" once in order to hurt and kill many innocent people.

For 9/11/11, it is a good time to reflect on where we've come, the progress to date, and recommit ourselves to "fight the good fight".

One way to do this, I believe, is through continuing investment and advancement in our technology, science, and engineering platforms. These will help us to strengthen our economy and through innovation and it's application stay ahead or leapfrog those who seek to come against us.
Stronger, safer builders are important (and should of course, be pursued), but we cannot win a war of terror by bunkering down.

Technology and innovation are our offensive weapons that will enable us to keep the enemy on the run--afraid of what we've got up our sleeves next.

(Source Photo: here)

Share/Save/Bookmark

March 27, 2008

Identifying a Phony and Enterprise Architecture

Part of what distinguishes a good enterprise architect from a mediocre one, is the ability to discern fact from fiction and the important from the mundane when it comes to the state of the enterprise. Having the skill to do this is critical to being able to establish viable targets and transition plans. A mediocre architect may collect information, but can’t spot the true nature of the enterprise, what is right and wrong with it and how it needs to course correct. The truly talented architect can make those distinctions.

Recently in the news there was an item about a doctored photo of a Tibetan antelope running harmoniously alongside the controversial high-speed train developed by China in the animals’ Himalayan habitat. When first released, this photo was accepted as genuine and only upon analysis was it discovered as a fake.

Just like with the photo of the Tibetan antelope, as enterprise architects, we must a look with circumspection and fine tuned analyses at the information presented, so that we can come to valid conclusions and not just accept everything at face value.

MIT Technology Review, 17 March 2008, reports that “new tools that analyze lighting in images help spot tampering.”

One MIT researcher states: “lighting is hard to fake…even frauds that look good to the naked eye are likely to contain inconsistencies that can be picked up by software.”

Similarly, in enterprise architecture, we need to proverbially shed light on the information we capture in the architecture to discern its meaning to the organization—are there really gaps or in our capabilities or does some executive just want to have the latest technology gadget to showcase? Are the redundancies identified in the enterprise needed for backup purposes or are they truly superfluous? Is a process efficient or is this just the way things have been done for so long, that no one really knows differently or wants to change? Is an opportunity really advantageous to the organization or is it fool’s gold?

These are tough questions and answered incorrectly, could lead the organizations down the wrong path and result in costly mistakes, such as unsatisfied customers, lost market share, wasted time and effort, and demoralized staff.

The MIT Technology Review article states: “many fraudulent images are created by combining parts of two or more photographs into a single image.”

Similarly, in enterprise architecture, facts are often misinterpreted or distorted by combining pieces of information that do not go together or by omitting information from the puzzle. For example, user needs and technology solutions can be combined as touted as the ideal solution for the enterprise, but in fact the solution is mismatched to the requirement. Or an IT investment may be heralded as the be all and end all, but critical information was not examined such as the security of the product, the vendor support and training available, the true cost including operations and maintenance in the out years and so on. So just as with photographs you can have errors of commission and omission.

Cynthia Baron, associate director of digital media programs at Northeastern University and author of a book on digital forensics states: “it’s amazing to me, some of the things that make their way onto the web that people believe are real. Many of the things that software can point out [as fraudulent], you can see with the naked eye, but you don’t notice it.”

This is the same with the information that enterprise architects analyze—so much of it is can be misinterpreted—but with a little more attention and a skilled architect, you can find the true meaning behind the data.

In the end a good enterprise architect can be worth their weight in gold to the organization.


Share/Save/Bookmark

February 8, 2008

Internet Apocalypse and Enterprise Architecture

It is the 21st century and we are a nation dependent on everything internet. We rely on the internet for communications, like email, text messaging, and even voice over IP. We also use the internet for getting news and information, social networking, storing and sharing blogs, videos, music, and photos, accessing various applications, shopping, and conducting financial transactions.

What happens if the internet is attacked or otherwise fails us?

This is the question asked in ComputerWorld, 21 January 2008: “If the internet goes down will you be ready?”

ComputerWorld states: “It’s likely that the internet will soon experience a catastrophic failure, a multiday outage that will cost the U.S. economy billions of dollars. Or maybe it isn’t likely. In any case, companies are not prepared for such a possibility.”

The Business Roundtable says: “The threat is ‘urgent and real.’ There is a 10% to 20% chance of a ‘breakdown of the critical information infrastructure’ in the next 1o years brought on by ‘malicious code, coding error, natural disaster, [or] attacks by terrorists and other adversaries.’”

What will be the effect of a major internet interruption?

An internet meltdown would result in reduced productivity and profits, falling stock prices, erosion of consumer spending, and potentially a liquidity crisis.” It would disrupt our everyday ability to communicate, get and share information, work and conduct transactions. And let’s not forget the effect on the human psyche—there would be chaos.

Why have we not prepared ourselves adequately?

The Business Roundtable says that “business executives often fail to realize how dependent they have become on the public network—for email, collaboration, e-commerce, public-facing and internal Web sites, and information retrieval by employees.”

Where are we most vulnerable?

The Internet Corporation for Assigned Names and Numbers (ICANN) says that “the Internet is pretty robust at the physical layer. There are just too many alternate paths available. But the Internet is not so robust at other layers.” Hence, the risk of operating system failures, penetration by worms, and denial of service attacks.

Is there any reason for optimism?

The CIO of Yuma County, Arizona, reminds us that the Internet “having been based on the Arpanet [from DoD] and designed to keep functioning when pieces are broken, it seems less likely that the entire Internet would stop working.”

What can enterprises do to prepare for the worst?

Of course, all organizations need to fully address security concerns in terms of managerial, operational, and technical controls.

They need the best and brightest security personnel.

Additionally, they need to perform regular risk assessments, vulnerability testing, intrusion detection and prevention, back-up and recovery.

They need to have strict access controls, security awareness training of employees and contractors, and an IT security policy.

Our organizations need a comittment to continuity of operations planning (COOP).

ComputerWorld points out that the financial services sector is out in front in making preparations Here’s some of the architectural preparations that financial companies have undertaken:

  • Dedicated networks—“set up dedicated networks independent of phone companies.”
  • Guaranteed diverse routing—“negotiate more aggressively with communications companies to guarantee diverse routing.”
  • Geographic dispersal—“separate data centers and communications centers more widely geographically.”

In general, enterprises need “diversity and redundancy” of communications.

Most importantly, we need to recognize the risks out there and prepare, prepare, prepare.


Share/Save/Bookmark