Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

April 6, 2011

Ads Here, There, Everywhere


This is wild--Adzookie, a mobile advertising company that puts location-based ads out on cell phones, is doing some unbelievable advertising of its own...

They are offering to paint people's houses and even pay their mortgages every month that you let them have their brightly colored billboard painted onto the side of your house.

In less than a day, they got applications from 1000 homeowners (and even one church)!

Is this a sign of the tough economic times or what?

A number of important lessons here:

1) In case we already didn't learn from Google, advertising is really big business--my G-d, this company will pay your mortgage for you just to advertise on your house. (okay it is a big advertisement and all...)

2) Advertising going online, is old news; the new news is that it's going mobile, big time. Folks, the ads are following us. Wherever we go, the ads will be there. From print to TV to billboards on the side of the road and at bus stops, to the Internet and to our smartphones--there is no escape!

3) People will do almost anything for money (this is an old lesson revisited)--even make their "home sweet homes" into the laughing stock of the neighborhood--or do some people actually think this looks cool?

4) Technology is an enabler to make our lives more convenient (news, shopping, etc.) and a richer experience, but it also lets those obtrusive advertisements pop up or crawl across the computer screen when/where NOT desired. As technology is part of virtually every facet of our lives, the potential for advertising here, there, and everywhere can really go overboard. Perhaps, the time is ripe for additional privacy settings on our computers/phones, so that we could block ads (when we want to) and have the equivalent of a "do not call list" for those pesky ads that just never seem to give up--like the Energizer Bunny--"they just keep going and going and going."

When it comes to technology (and the rest of our environment), I believe that we have to be able to control the flow--whether it's information or advertising.

Even too much of a good thing, can be a real eye sore.

Share/Save/Bookmark

April 2, 2011

The Cost of Underestimating Technology


While research is important and I respect the people who devote themselves to doing this, sometimes they risk being disconnected from reality and the consequences associated with it.

From the Wall Street Journal, 2 April 2011--two economists calculated that "$1,700 is the benefit the average American derives from personal computers each year."

They call this the "benefit we get from computers above and beyond what we pay for them."

To me, this figure seems inconsistent with common sense and the realities on the ground.

In an information age, where we are connected virtually 24 x 7 and can download hundreds of thousands of apps for free, endlessly surf the internet, shop and bank online, get much of our entertainment, news, and gaming on the the web, and communicate around the globe by voice, video, and text for the cost on a monthly high speed connection, I say hogwash.

Moreover, we need to factor in that most of us are now information workers (about 20%) or depend on technology in performing our jobs everyday and earning our living.

Just yesterday in fact, the Wall Street Journal reported that more people work for the government (22.5 million--forget the private sector information workers for the moment) than in construction, farming, fishing, forestry, manufacturing, mining, and utilities combined!

Additionally, at work, we are using computers more and more not only for transaction processing, but also for content management, business intelligence, collaboration, mobility (and robotics and artificial intelligence is coming up fast).

Finally, technology enables breakthroughs--in medicine, energy, environment, education, materials sciences, and more--the impact of technology to us is not just now, but in the potential it brings us for further innovations down the road.

So is the benefit that you get from computers less than $5 day?

I know for me that's the understatement of a lifetime.

Apparently by some, technology continues to be misunderstood, be undervalued and therefore potentially risks being underinvested in, which harms our nations competitiveness and our collective future.

As much respect as I have for economics, it doesn't take an economist to think with common business sense.

Share/Save/Bookmark

February 22, 2011

The Little Techno Bus That Could




In an accomplishment sense, I am very proud of what Pope County, Arkansas is doing in terms of advancing education with technology on school buses for K-12 through the Aspirnaut program (photos from their site), founded and supported by Vanderbilt University.


Government Technology Magazine reports in February 2011 that Aspirnaut is transforming school buses into mobile classrooms, so that ”idle time is transformed into extended learning time with laptop computers and Internet access.”


The Hector School District buses are now equipped with computer screens, earphone jacks with headphones, wireless Internet, and scanning devices to record bus activity.


“The five 19-inch customized computer screens stream math and science content from PBS, NASA, the Discovery Channel, CBS News, and the Smithsonian Institution for students to watch on their hour-long rides to/from school. The screens also include video-conferencing capability.”


Students are seated on the bus in groups by age and grade to listen to their specific curriculum by plugging their headphones into jacks beneath their seats. The content of each bus-seating zone is then correlated to what the students are learning in the classroom.


Dr. Julie Hudson, co-founder of the program in 2007, is looking to improve student’s achievements, especially in Science, Technology, Engineering, and Math (STEM). These are learning areas where we have fallen dangerously behind in national rankings, and this is seen as harming our innovativeness and competitive capacity for the future.


On one hand, I think that this type of extended learning program is very valuable to our students and provides them the opportunity to get additional constructive learning time in. Also, it’s great to distract them from getting into potential trouble on the ride home. :-)


Yet, on the other hand, I am also concerned that we continue to put more and more pressure on our children to seemingly always be productive, learning, and competing. Some examples of this are not just extended learning days (on buses or off), but also extended school years, even summer school, AP classes, SAT courses, some wonderful volunteer programs, internships, oodles of extra-curricular activities, side jobs, and more. Certainly seems like it’s not easy to be a kid these days!


Now, even a simple bus ride to/from school/home is no longer a time to unwind, sleep, socialize, listen to music, play video games, or just be kids. Even the choice of video content on the buses is purely educational and there is nothing social, fun, or relaxing for the children anymore. How about an episode of The Brady Bunch?


While, I certainly understand the need for us to advance our education, skills, and competitive positioning, and the learning bus is a great concept to move us towards that. However, I cannot help but remember a more innocent and carefree time in my own childhood, where there was “a time and place for everything.”


Then (not that long ago!), we took learning seriously and worked hard—always with a focus on the future (What will I be…Where do I want to end up…How can I live up to my potential?), but we also made sure to have time for friends and fun—downtime and think time. Today however, with the high-tech, always on, 24/7 society that we are creating for our children and ourselves, are we losing a sense of balance, perspective, even our innocence (so to say)?


In relation to this, I wonder sometimes about the Kingdom of Bhutan’s concept of measuring Gross National Happiness instead of what we measure Gross National Product, and I ask myself, where is our school bus heading?


Share/Save/Bookmark

February 15, 2011

Social Media--The Train Has Left The Station

This video is a great explanation of the POWER of social media.

"We don't have a choice on whether we DO social media, the questions is how well we DO it." - Erik Qualman

When it comes to social media, "resistance is futile"--we are an INTERCONNECTED society and if you don't get that, you are going to be left behind, period.

Share/Save/Bookmark

January 22, 2011

When My Friend Got Hacked

True story.

So an old friend of mine had his account hacked on Facebook.

And the hacker is sending chat messages to my friend’s Facebook contacts—like me—pretending to be him—with his picture and name and all his online information.

He says that he is stuck in London, just got mugged—at gunpoint—losing his money and phone and needs my help.

At first, I’m thinking oh crap; my friend is in trouble and needs me. Then, I’m like wait a second, he’s pulling my leg. So I ask “are you joking?”

The hacker—pretending to be my friend—continues how it was such a terrible experience, but thank G-d they are still alive.

I’m on the other end of this chat—and questioning now if this person is really who they say they are—despite the REAL picture and profile.

I ask who are you with?

The hacker replies with the name of my friend’s wife. Her real name!

And the hacker continues with the mugging story and how they are leaving in a few hours for their return flight to the States, but need help.

Ok, I am happy to help my friends, but I want to know this is really my friend. Behind the scenes, I am contacting other mutual friends, family and so on to verify this story and resolve this.

On the chat, I ask—can you tell me something that only the two of us would know?

The hacker starts flipping out and gives me "?!?!?!...."

I repeat my question and ask if the hacker understands.

The hacker responds that they do.

And then ignoring my questioning, proceeds with the storyline asking me to wire money and that it will be okay, because they will need identification to retrieve the wire.

Now I ignore the hacker’s request and go back to my question about who this person on the other end of the chat really is?

No response.

"U there?"

Hacker is offline...for now.


Share/Save/Bookmark

January 16, 2011

"Your Brain On Google"

 
Amazing video called "Digital Nation."
Some great points from the interviewees at MIT, Stanford, and more:
- "We are immersed in technology all the time."
- "Technology is like oxygen."
- "Well over half our lives exist in the digital world now."
- "We are constantly multitasking and distracted."
- "The world has sped up."
- "We just want to push the pause button."
- "The Internet has changed from things one does to how one lives."
- "We are changing what it means to be human."

- "We are rewriting the rules of interaction for human beings."

- "Can we solve the alienation that technology has created with more technology?
- "Does increasing use of technology have diminishing returns at some points?"
These questions and thoughts really resonate with me.
Looking back in my own life, things seemed so much simpler 10, 20, and 30 years ago.
Then we were less connected online and maybe a lot stupider intellectually, but more connected in real ways--doing real things with family, friends, and community.
Life is certainly faster now, but are we happier as human beings?
Are we losing ourselves and becoming part of the vast interconnected cyberspace almost as half-humans and half-machines ourselves?

Share/Save/Bookmark

January 9, 2011

The Center Of Gravity Is Information

Center of Gravity (COG) is a military concept that Dr. Joseph Strange defines as “primary sources of moral or physical strength, power, and resistance.” From a military perspective, this is where we should concentrate when attacking the enemy. As Prussian strategist Carl von Clausewitz states, “that is the point against which all our energies should be directed.”

In “Center of Gravity Analysis” (Military Review, July/August 2004), Army Colonel Dale Eikmeier describes the framework for COG and how an enemy (your threat) attempts to exploit them, as follows:

· Center of Gravity—the organizations that do the work (e.g. the military/industrial complex)

· Critical Capabilities (CC)—the strengths of the organization—its “primary abilities”

· Critical Requirements (CR)—the supplies that a COG use—the inputs that are their opportunities, if leveraged for future plans

· Critical Vulnerabilities (CV)—the vulnerabilities a COG has—e.g. exposed or unguarded critical infrastructure

From an enterprise architecture perspective, I greatly appreciate this analysis of COG as it aligns beautifully with Albert Humphrey’s famous Strenghts, Weaknesses, Opportunities, and Threats (SWOT) Analysis for organizational strategic planning.

Aside from typical SWOT analysis to develop your organization’s strategy, the COG analysis adds greater offensive analysis to SWOT--like the military, organizations using the COG model can disrupt competitors’ advantages by seeking to weaken them where they are most vulnerable.

For example, EA used in this fashion may lead a company to build a sophisticated online sales site that directs customers away from your competitor’s retail location. Similarly, acquiring a major supplier (i.e. vertically integrating) may disrupt a competitors’ supply capability, and so on. The point is that EA becomes a force for attack rather than a mere planning tool or information asset.

It is at this point that I disagree with the assertion in the article that “Information is not power; it is a tool, an enabler. It helps wield military or economic power. By itself, it is simply information.”

Far to the contrary, information is one of the greatest assets that we have. It is the way that an advanced, intellectually based society competes. Of note, our declining performance in Science, Technology, Engineering, and Mathematics (STEM), which is so greatly worrisome to our leadership, is of concern because it is directly a threat to our competitive advantage, both militarily and economically, in the global environment.

Information, as embodied by the Internet, is now the center of our society. With it, we perform critical tasks of information sharing, collaboration and education. Used effectively, our military has developed robust command, control, communications, computers, intelligence, reconnaissance, and surveillance (C4ISR)—all information-based. Similarly, our industry is highly competitive and advanced because of the engineering, innovation, and people behind it.

Enterprise architecture, once a small part of the IT infrastructure, can actually play a far greater role in the information society if we allow it to. We have morphed from the industrial age of the 18th and 19th centuries to a highly advanced information society that creates new sources of critical capability, but also new critical vulnerabilities that must be defended. And we must also leverage the vulnerability of our enemies in order to stay viable. Whether it’s cyber-warfare or economic survival, information is at the heart of everything we are successfully doing today.


Share/Save/Bookmark

May 29, 2010

Internet, Anything But Shallow

Over time, people have transitioned the way they predominantly get their information and learn, as follows:
1) Experiential—people used to learn mostly by doing—through their experiences, although these were usually limited in both time and space.
2) Reading—With the printing press, doing was supplanted by reading and information came from around the world and passed over from generation to generation.
3) Television—Active reading was upended by passive watching television, where the printed word “came alive” in images and sounds streaming right into our living rooms.
4) Virtuality—And now TV is being surpassed by the interactivity of the Internet, where people have immediate access to exabytes of on-demand information covering the spectrum of human thought and existence.

The question is how does the way we learn ultimately affect what we learn and how we think—in other words does sitting and reading for example teach us to think and understand the world differently than watching TV or surfing the Internet? Is one better than the other?

I remember hearing as a kid the adults quip about kids sitting in front of the TV like zombies! And parents these days, tell their kids to “get off of Facebook and get outside and play a little in the yard or go to the mall”—get out actually do something with somebody “real.”

An article in Wired Magazine, June 2010, called “Chaos Theory” by Nicholas Carr states “even as the Internet grants us easy access to vast amounts of information, it is turning us into shallower thinkers, literally changing the structure of our brain.”

Carr contents that the Internet is changing how we think and not necessarily for the better:

1) Information overload: The Internet is a wealth of information, but “when the load exceeds our mind’s ability to process and store it, we’re unable to retain the information or to draw connections with other memories…our ability to learn suffers and our understanding remains weak.”
2) Constant interruptions: “The Internet is an interruption system. It seizes out attention only to scramble it,” though images, videos, hypertext, email, IM, tweets, RSS feeds, and advertisements.
3) “Suckers for Irrelevancy”: “The stream of new information plays to our natural tendency to overemphasize the immediate. We crave the new even when we know it’s trivial.”
4) “Intensive multitasking”: We routinely try to do (too) many things online at the same time, so that we are predominantly in skimming mode and infrequently go into any depth in any one area. In short, we sacrifice depth for breadth, and thereby lose various degrees of our ability in “knowledge acquisition, inductive analysis, critical thinking, imagination, and reflection.”
While I think that Carr makes some clever points about the dangers of Internet learning, I believe that the advantages of the Internet far outweigh the costs.

The Internet provides an unparalleled access to information and communication. It gives people the ability to get more information, from more sources, in more ways, than they would’ve in any of the other ways of learning. We are able to browse and search—skim or dig deep—as needed, anytime, anywhere.

With the Internet, we have access to information that exceeds the experiences of countless lifetimes, our world’s largest libraries—and TV isn’t even a real competitor.

At the end of the day, the Internet is a productivity multiplier like no other in history. Despite what may be considered information overload, too many online interruptions, and our inclinations to multitasking galore and even what some consider irrelevant; the Internet is an unbelievable source of information, social networking, entertainment, and online commerce.

While I believe that there is no substitute for experience, a balance of learning media—from actually doing and reading to watching and interacting online—make for an integrated and holistic learning experience. The result is learning that is diversified, interesting, and provides the greatest opportunity for everyone to learn in the way that suits him or her best.

Moreover, contrary to the Internet making us shallower thinkers as Carr contends, I think that we are actually smarter and better thinkers because of it. As a result of the Internet, we are able to get past the b.s. faster and find what we are looking for and what is actually useful to us. While pure linear reading and thinking is important and has a place, the ability online of the semantic web to locate any information and identify trends, patterns, relationships, and visualize these provides an added dimension that is anything but shallow.

Share/Save/Bookmark

April 13, 2010

We Can't Ignore or Fear Technology For Long

New Article by Andy Blumenthal in Architecture and Governance Magazine (April 2010)

http://tinyurl.com/y3xgrlb

__________________________________

When it comes to new technology, first comes ignorance, then comes fear, then comes the embrace and rush to the IT department to make it happen—now!

This scenario plays out again and again in organizations—there are three key phases to technology adoption.

Ignorance—people are unaware, misinformed, or just don’t understand the potential that a new technology holds. In some cases, it’s because they generally haven’t been exposed to the technology, in other cases, it is because they are going forward with eyes wide-shut (what they don’t know can’t harm them or so they think).

Fear—OMG. A new technology; I can’t deal with this. “I’m used to doing it X way.” “Why do we have to change.” “I can’t learn this new technology.” There is fear of something new, of change, of the unknown.

Embrace—The acknowledgement that a new technology is important to the organization; that it can’t be ignored; that it isn’t going away; that the competitors are already getting onboard. Oh uh. Get the CIO in here. We need this technology, now! Where are we going to find finding for it this year (or quarter, whatever). We need to reprioritize our IT projects, so this is at the top (or near it). Let’s get everyone right on this. Can we meet early this week?

I read an interesting article in Public CIO magazine (January 2010) called “A Mile Wide And An Inch Deep,” about how social media is becoming pervasive in government.

In the article it states: “Last year, a Public CIO reader survey found that social media didn’t make the list of the top 10 technology priorities for 2009. Today, it’s become the No. 1 topic among public CIOs.”

In between not making the top 10 technology list and becoming No. 1, social media was vilified as being something that would make the organization lose control of its message, that was a security risk, and that was a colossal waste of employees’ time and should be banned (or blocked and it was by 40% of organizations).

As the pace of technology innovation increases, the lifecycle of adoption has also rapidly advanced. For example, with social media, we went from ignorance to fear to the embrace in one year flat!

Chris Curran, chief technology officer for Diamond Management and Technology Consultants Inc., is quoted in the article as stating:

“If you rewind to 1995, the attitude back then was, “No Internet use at work.” Then it became, “No Internet shopping during work hours.” But over time, the issue just went away, because a majority of employees are good people, hardworking and productive. Some people are going to do stupid things whether they have access to social networking or not. But it doesn’t make sense to ignore a social trend that is bigger than your organization.”

You can’t ignore important new technologies or let fear get the better of you. At one time, people were saying oh no we can’t change from paper communications to email. We need everything hardcopy. And that changed. Now email is the norm or should I say was the norm, because social computing for the younger generation is becoming the new email.

The answer for IT leaders to advance organizational adoption of valuable new technologies is to:

· Create awareness and understanding of new technologies—the benefits and the risks (and how they will be mitigated).

· Establish sound planning and IT governance processes for capturing business requirements and aligning new technologies to best meet these.

· Provide new technologies coupled with ample communications and training to ensure that the technologies are not just more shelfware, but that they are readily adopted and fulfill their potential in the organization to advance the mission and productivity.

The phases of technology adoption: Ignorance, fear, and embrace are not abnormal or bad; they are human. And as people, we must have time to recognize and adjust to change. You can’t force technology down people’s throats (proverbially speaking) and you can’t command organizational readiness and poof, there it is. But rather, as IT leaders, we need to be sensitive to where people and organizations are at on the adoption lifecycle and help to identify those emerging technologies with genuine net benefits that can’t be ignored or feared—they must be embraced and the sooner the better for the organization, its people, and all its stakeholders.


Share/Save/Bookmark

April 10, 2010

Knowing Who Your Friends Are

You’re on the Internet doing your business, but who is at the other end and how do you know that you can trust them?

That is what so called Reputation Systems are all about—creating mechanisms to authenticate the identities of partners online and measure just how trustworthy they are or aren’t.

Some familiar examples of reputation systems include everything from scores for vendors on Amazon or eBay to activity statistics on Twitter to recommendation distinctions on LinkedIn to networks on Facebook.

The idea is that we measure people’s trustworthiness through the number of transaction they conduct, reviews and recommendations they receive, and associations they keep.

These are all instances of how we unmask the identities and intent of those we are dealing with online—we obtain 3rd party validation. For example, if a vendor has hundreds or thousands of transactions and a five star rating or 99% positive reviews or is a select member of a power seller” network or other select organization, we use that information of past performance to justify our current or future transactions or associations with them.

MIT Sloan Management Review, Spring 2010, has an article about reputation systems called “Online Reputation Systems: How to Design One That Does What You Need.”

According to the article, reputation systems are “the unsung heroes of the web,” because “they play a crucial role is building trust, promoting quality, improving collaboration and instilling loyalty.”

Without some way of knowing whom we are sending a credit card payment to, friending, or chatting with on the Internet, we would be violating the cardinal rule of safety that our parents and teachers taught us from the earliest time that we could understand that you “don’t talk to strangers.”

I remember a very good video for children produced by Service Corporation International (SCI) called “Escape School,” which taught just such lessons by Bob Stuber a former police officer and child safety expert.

Even as we grow up though the dangers from people criminals and predators still exist; hopefully we are a little older and wiser in recognizing it and dealing with it, but this is not always the case.

For example with online dating networks, people sometimes pretend that they are a rich brain surgeon or the proverbial “tall, dark, and handsome” physique to lure someone on a date, only to be exposed for who they really are upon the first date.

People are inherently driven to connect with others, and online we are able to connect easier then ever before—with people from all over the globe, virtually anytime of the day or night—and it is often tempting to let our heart lead and dismiss any concerns about who we are dealing with. Further, the veil of anonymity online seems to only heighten the opportunities for abuse.

The dangers of people pretending to be something they are not and the need for recognizing whom we are dealing with is an age old problem that society struggled with—from the snake oil salesman of time past to those occasional dishonest vendor on sites like eBay today.

The MIT article states “Small, tightly knit communities arguably do not need central reputation systems, since frequent interactions and gossip ensure that relevant information is known to all. [However,] the need for a central system increases with the size of the community and the lack of frequent interaction among members. In web-based communities with hundred or thousands of members, were most members typically know each other only virtually, some form of reputation system is always essential.”

Predators act out online everyday using social engineering to trick people into divulging personnel or organizational information, getting them to send money (like the fake emails from Nigeria or a lottery) or sending out malware when you click on the link that you know you shouldn’t be doing.

Another example with children is evident on NBC Dateline’s “To Catch A Predator” series where Chris Hansen stakes out the child predators who arrange meetings with kids in chat rooms on the Internet and then make their appearance at their homes or other meeting spots. Child predators prey on the fact that the children online don’t realize who they are dealing with and what their evil intentions are. Thank G-d, law enforcement and NBC has been able to turn the tables on some of these predators when law enforcement is pretending to be the vulnerable kids in order to catch the predators---who are fooled into thinking they are talking to children, only to be caught often literally “with the pants down.”

Whether we are socializing online, surfing the Net, or conducting some form of ecommerce, we must always pay attention to the identification and reputation on those we deal with. As the MIT article points out, with reputation systems, we can use ratings, ranking, and endorsements to build up information on ourselves and on others to build trust, promote quality, and sustain loyalty.

Of course, even with reputation systems, people try to manipulate and game “the system,” so we have to be ever vigilant to ensure that we are not duped by those hiding their true intentions or pretending to be somebody or something they are not.

As social creatures, optimists, and those of faith, we are tempted to just trust, but I prefer the motto of “trust and verify.”


Share/Save/Bookmark

April 3, 2010

Reality Trumps Virtuality

What a crazy news story (reported through South Korean news media)—and true. This South Korean couple, addicted to a video game, ends up starving their 3-month old child to death.

The video game that the couple was addicted to happened to be about raising a virtual child—of all things.

The couple—a 41 year old father and 25 year old mother were both unemployed—and fed their child only once a day, while they spent 4-6 hours a day playing games at the Internet café.

When the child died, the couple was playing video games all night long.

This is an unbelievably tragic story that defies logic, where troubled parents caught in the web of the virtual world, abrogate their responsibilities to themselves and their child in the real world.

So are these two parents just a bunch of whack jobs…an oddity that we shake our heads at disapproving or is this something more?

While the American Medical Association has so far declined to include Internet Addiction Disorder in the Diagnostic Statistical Manual, pending further study, we know that we as a society have become in a sense obsessed (although maybe not yet clinically) with everything online—getting information, communicating, networking, shopping, and gaming—and for the most part, we love it!

Some programs like Second Life even go so far as to create virtual worlds where people interact with each other through avatars. They meet, socialize, and participate in activities in a world of only composed of 3-D models—where reality is what programmers make of it—in a coding sense.

Social networks, like Facebook, MySpace, LinkedIn, and numerous specialized online communities—for all sorts of shared interests from books to music, dating to investing, and philanthropy to travel—are available to chose from and are widely popular destinations.

It seems truly that many people have become more comfortable living in the IP address on the World Wide Web than at their street address within their true day-to-day realities. Their chosen avatars, pseudo-names, and online profiles often far more exciting then the persons, occupations, and lifestyle they physically inhabit. The virtual world has become an escape for many, and a place many are all too happy to engross themselves in 2, 4, 6 or more hours a day.

What happens to the occupants of our real world, when we choose to retreat to virtual worlds?

Well at the extreme is the fate of the 3-month old baby who died of neglect and hunger. More common are spouses and children, and others—family, friends and associates—who are increasingly physically and emotionally distant.

Our connection to people in real life—around us—are traded in for long-distance, abstract, and virtual relationships with people we often hardly know on the Internet.

We routinely trade emails, instant messages, tweets, and blog comments, with people who we hardly know—often do not even know people’s real names and cannot pronounce their presumed cities of residence.

While the Internet is in many ways miraculous in its ability to bring us together—across time and space, in other ways it can potentially substitute the surreal for the real, the meaningless for the meaningful, and empty chatter with people we barely know and never really will for true giving with people we absolutely care about.

At the extreme, we cannot let real children die because we are hiding in cyberspace feeding our virtual addiction. In more common terms, we must not trade our most important real world relationships and activities for those that are phantom experiences in cyberspace.

It is great to extend our reach with the Internet, but it is not okay to do so at the expense of those that are truly at arms reach. We must find a balance between the two worlds we now live in—real and virtual!

While there is every reason to love the Internet—communication, connection, and convenience—it has also become a retreat from people’s very real world problems.

When Online, people are not hungry, not sick, not unemployed, not lonely, not judged—instead they are in a sense one with everybody else in a common pool of bite and bytes—where no one knows them or their situations. Online, they are anonymous, no ones and at the same time anyone they want to be.

The Internet is a great place to be—to escape to—sort of the like the Holodeck on the Star Trek. Choose your program—and you can be in any time and at any place—interacting with anybody. It is not real, but it feels real when you are there.

I remember when I used to watch Star Trek and be fascinated by the experiences the characters had when they went into the Holodeck’s alternate reality. At the same time (and I think this was the intention of the show), after awhile I found myself wanting the characters to get back to reality and deal with the issues that they truly had to face. Somehow watching them escape “too much” wasn’t very satisfying.

To me, real relationships, even with and maybe because of their inherent challenges and tests, is more satisfying than virtuality, because of the deeper impact of the actions and interactions. Cyberspace is a great augmented reality, but it cannot replace reality.

In the end, being online is a nice place to visit (and there are a lot of benefits to being there), but I wouldn’t want to live there all the time and miss the real fun.


Share/Save/Bookmark

February 12, 2010

The Do It Yourself Future

Technology is the great emancipator. With it we can do things ourselves that we needed others to do for us before.

Of course, the examples are endless. As we approach tax season, just think how many people do their own taxes online with TurboTax or other online programs when before they needed an accountant to do it for them. Similarly, it was common to have secretaries supporting various office tasks and now we pretty much have all become our own desktop publishers and office productivity mavens. I remember having a graphics department years ago for creating presentations and a research department for investigating issues, events, people, and causes, now with all the productivity tools and the Internet, it’s all at our fingertips.

Wired Magazine, February 2010 in an article called “Atoms Are The New Bits” by Chris Anderson states that “the Internet democratized publishing, broadcasting, and communications, and the consequence was a massive increase in the range of participation and participants in everything digital.”

With technology, we are free to help ourselves. We are independent, self-sufficient, and that’s typically how we like it. And not only are we able to do for ourselves, but the barriers to entrance for entrepreneurs and small companies have come way down.

The author states: “In the age of democratized industry, every garage is a potential micro-factory, every citizen a potential entrepreneur.” Similarly, Cory Doctorow wrote in The Makers that “The days of General Electric, and General Mills, and General Motors are over. The money on the table…can be discovered and exploited by smart, creative people.”

We all know how Steve Wozniak and Steve Jobs, working out of a garage building computers, started Apple. Similarly, how Michael Dell started operations out of his dorm room. Nowadays, we see more and more people going out on their own as contract workers and as teleworkers, not tied to particular companies or work locations. They have been freed by technology to work for whom they want and where they want.

At the extreme and in certain cases, there is a perception that “working with a company often imposes higher transaction costs then running a project online…Companies are full of bureaucracy, procedures, and approval processes, a structure designed to defend the integrity of the organization...[instead] the new industrial organizational model [is] built around small pieces loosely joined. Companies are small virtual, and informal. Most participants are not employees. They form and re-form on the fly driven by ability and need rather than affiliation and obligation.”

While I do not believe that companies will be disadvantaged for large and complex projects like building a bridge or designing a new commercial airline, there is no doubt that technology is changing not only what we can do ourselves, but also how and when we associate ourselves with others. We can do work for ourselves or for others practically on the fly. We can communicate immediately and over long distances with ease. We can form relationships on social networks for specific tasks or as desired and then reorient for the next. There is a new flexibility brought about by a do it yourself culture facilitated with simple, affordable, and readily available technology, and this DIY phenomenon is only going to increase and accelerate as the technology advances further and further.

Some important implications are as follows:

  • One, we need to constantly look for cost-savings in the organization and at home from the new technologies that we are bringing online enabling us to do more ourselves—there are cost offsets for the support we needed before and no longer require.
  • Secondly, we need to encourage our employees to take advantage of the new technologies, to learn them, and use them to their utmost and not to fear them.
  • Thirdly, the next generation of workers is going to demand more flexibility, empowerment, and continued work-life balance based on their increasing ability to go it alone, if necessary.
  • Finally, new technologies that are user-centric—easy to use and useful—will outperform technologies that are overly complex and not intuitive; the new normal is do it yourself and technologies that don’t simply enable that will be finished.


Share/Save/Bookmark

December 7, 2009

Let's Not Understate the Cyber Threat

Wow. I read with some surprise and consternation an article in Government Computer News, 4 December 2009. In this article, the author portrays the fears of a “digital Pearl Harbor” or overwhelming cyber attack on the United States as overblown—almost as if it’s of no real possibility or significant impact. In short, the article states:

“What good would it do an attacker to take down the vital U.S. networks? While the damage to this country could be great, the benefit to an attack would be nil if it could not be followed up. The real threat of cyber warfare is not in stand-alone attacks, but in attacks coordinated with military action.”

While, I agree that a coordinated attack is obviously more dangerous than a cyber attack alone, the threat and potential damage of a cyber attack could potentially be devastating—with or without military action.

Let’s think for a second about how the military traditionally projects force around the world through conventional warfare—taking control of the air, land, and sea. Control the sea-lanes and you have power over 90%+ of international commerce. Control the land and you have power over people’s daily lives—including their ability to satisfy even basic needs for food, clothing, and shelter, their personal safety, and even their ability to govern themselves. Control the air and you control freedom of movement on the ground, people’s basic comings and goings. Traditional military power can affect just about every facet of people’s lives including ultimately the taking of life itself i.e. paying “the ultimate price.”

Now think for a second, about what a massive cyber attack could potentially do to us. At this stage in history, we have to ask ourselves not what elements could be affected by cyber attack, but what elements of our lives would not be impacted? This is the case since virtually our entire civil and elements of the military infrastructure are dependent on the Internet and the computers that are connected to them. If you “pull the plug” or corrupt the interconnected systems, “watch out” seems apropos.

The same areas that are vulnerable to traditional military attack are threatened by cyber attack: Commerce, Energy, Transportation, Finance, Health, Agriculture, (Defense)…are all deeply interwoven and dependent on our interconnected computer systems—and this is the case more and more.

Think e-Commerce, online banking and finance, manufacturing production systems, transportation systems, food production and safety, the energy grid, electronic health records, C4ISR, and so on.

While thank G-d, we have been spared a really devastating attack to date (if you exclude the massive data compromised/stolen in recent cyber attacks), we would be derelict in responsibilities for ensuring safety and security if we thought that was it.

Further, while unpleasant as it may be, we should consider the impact in terms of potential for physical harm or loss of life in the event of a serious cyber attack?

While many brush aside this possibility, there is certainly the potential. Even putting aside the potential public panic/chaos and ensuing loss of life and property that could occur in a serious attack, how about just taking out a single, major facility—like a dam, power plant, reservoir, electrical hub, transportation system, and so on. This is an important focus of efforts to ensure critical infrastructure protection, a public-private sector partnership initiative.

Rep. Lamar Smith, R-Texas said "Until we secure our cyber infrastructure, a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives.”

Sure, a severe and consequential attack would require ample skills, knowhow, resources, and sophistication—it is no small feat—but with the hosts of cyber criminals, terrorists, and hostile nation states out there increasingly trying to hack our systems, there is valid cause for concern.

This recognition of what’s possible does not mean it is probable or imminent. However, the awareness and understanding of our increasing dependence on the Internet and related systems and the acknowledgement that there are those out there—as in 9-11—who seek to do our country harm, should not blind us with fear, but rather spark us to constructively deal with the challenge and take proactive actions to secure the ever expanding realm of cyberspace.

The Executive Summary in the CyberSpace Policy Review that was conducted by the White House in 2009 sums it up, this way:

“The globally-interconnected digital information and communications infrastructure known as “cyberspace” underpins almost every facet of modern society and provides critical support for the U.S. economy, civil infrastructure, public safety, and national security. This technology has transformed the global economy and connected people in ways never imagined. Yet, cybersecurity risks pose some of the most serious economic and national security challenges of the 21st Century.”

We should not and cannot understate the possible threats against our nation, but rather we need to act responsibility and rationality, with resolve to protect our nation, before and not only after. As the CyberSpace Policy Review states:

“The Nation’s approach to cybersecurity over the past 15 years has failed to keep pace with the threat. We need to demonstrate abroad and at home that the United States takes cybersecurity-related issues, policies, and activities seriously.”

Fortunately, our nation has recognized the potential threat and is acting, as Security Focus reported on June 24, 2009: “The U.S. Secretary of Defense ordered the military to create a unified command to act as the nation's central hub for cyber capabilities and commanded the Pentagon to develop a policy framework for cyberspace operations.”

On a personal note, I am grateful for the many good, hardworking people in our military, civilian and private sector that are working to secure cyberspace for us, and believe we need to do this with vigor and resolve. It’s necessary in order to safeguard our future that is ever reliant on technology.


Share/Save/Bookmark

November 15, 2009

Cloud Computing, The Next Evolution

On November 4-5 2009, I attended a good CSC Leading Edge Forum on Cloud Computing.

The kickoff by W. Brain Arthur was a highlight for me (he is the author of The Nature of Technology). He provided an excellent conceptualization of cloud and it’s place in overall technology advancement and body of world innovation. Essentially, he sees cloud in the 2000’s as the next evolution from the Internet in the 1990s. As such, the cloud is computational power in the “virtual world,” providing a host of benefits including easy access, connectivity, and cost efficiency. He sees the cloud coming out of the initial frenzy and into a industry sort-out that will result in a stable build out.

Another great speaker was David Moschelle from CSC who talked about the myriad benefits of moving to cloud such as scalability, self-service, pay as you go, agility, and ability to assemble and disassemble needed components virtually on the fly. With the cloud, we no longer have to own the computing means of production.

Of course, we also talked about the challenges, particularly security. Another speaker also spoke about the latency issues on the WAN with cloud, which currently limits some usability for transactional processing.

Over the course of the forum numerous examples of success were given including Bechtel achieving a 90% cost advantage by moving storage to the cloud. Others, such as Amazon were able to put up new web sites in 3 weeks versus 4-6 months previously. Also, Educational Testing Service as another example is using cloud bursting, since they tend to run data center at known cyclical peaks.

Others connected cloud with social computing: “the future of business is collaboration, the future of collaboration is in the cloud.”

In terms of the major types of cloud, I thought the relationship between responsibility and control was interesting. For example:

  • Software as a Service -- more “freedom” from responsibility for service, but less freedom to change service (i.e. less control)
  • Platform as a Service – (Hybrid)
  • Infrastructure as a Service – less freedom from responsibility for actual end-user services, more freedom to change service provision (i.e. more control)

In all cases, the examples demonstrated that organizations do not have a lot of leeway with SLAs with cloud providers. It’s pretty much a take it or leave it proposition. With liability to the vendor for an outage being limited to basically the cost of the service, not the cost of lost business or organizational downtime. However, it was noted that these mega-vendors providing cloud services probably have a better availability and security than it’s customers could have on their own. In other words, an outage or security breach will either way cost, and where is there a greater chance of this happening?

Sort of a good summary was this: “Leading companies are moving development/test and disaster recovery to the cloud,” but then this will reverse and companies will actually move their production in the cloud and provide mainly a back up and recovery capability in house. This is similar to how we handle energy now, were we get our electricity from the utilities, but have a back-up generator should the lights go dark.


Share/Save/Bookmark