Showing posts with label Social Media. Show all posts
Showing posts with label Social Media. Show all posts

September 23, 2010

World 2020

Forbes Magazine (7 September 2010) has an interesting look ahead at the world over the next ten years.

There were some notable predictions that stood out in terms of the good, the bad, and the ugly:

  • 2011: The Terrafugia flying car goes on sales for $200,000. (GOOD—roads are congested)
  • 2012: Oil prices skyrocket following Israeli raid on Iranian nukes. (GOOD—nuclear non-proliferation/ BAD—oil prices) Facebook IPOs at $40 billion. (GOOD—social media still sizzling)
  • 2014:Marines deploy tens of thousands of HULC3 exoskeletons—robotic suits—to soldiers in Afghanistan. Lockheed Martin suits increases strength and endurance. (GOOD—“the edge” goes to our warfighters)
  • 2016: First Internet balloting for U.S. President with 7% of votes cast online. (GOOD—the old ballot machines are so like “yesterday”)
  • 2018: Trans Euro-Asia Express—world’s fastest train arrives in Paris from Bejing, break 300 MPH record. (Good—alternative to airlines)
  • 2019: U.S. Life expectancy declines for first time in a century; doctors blame 55% obesity rate. (UGLY—“meaning really bad”—national health is in serious jeopardy)
  • 2020: WalMart sales pass $1 trillion...now employs 5 million worldwide. (GOOD—low prices/BAD—low paying jobs) First privately owned spacecraft lands 6 men and 2 women on moon. (GOOD—Thanks Virgin Galactic; Star Trek is a closer reality: "To boldly go...")

Here are ten more predictions I’d like to see (from Forbes or others) in terms of what happens to:

  1. World peace (e.g. Middle-east)
  2. Cure for cancer (and other horrible illnesses)
  3. Economy
  4. Federal deficit
  5. Freedom and human rights
  6. Environment (including global warming)
  7. Osama bin Laden (and his terrorist henchmen)
  8. Everything new technology (insatiable appetite for this one!)
  9. Best careers (so I can advise the youngsters)
  10. Stock market (hey, wouldn’t it be great to know) :-)

Share/Save/Bookmark

August 17, 2010

Social Networking, Blogging, and Tweeting in Plain English

Here are some great little videos that explain Social Networking, Blogging, and Tweeting in Plain English:

1) Social Networking

2) Blogging

3) Tweeting

Check out these and other social media learning resources, policies and procedures, discussion forums and more at the Department of Defense (DoD) Social Media Hub.

Share/Save/Bookmark

April 13, 2010

We Can't Ignore or Fear Technology For Long

New Article by Andy Blumenthal in Architecture and Governance Magazine (April 2010)

http://tinyurl.com/y3xgrlb

__________________________________

When it comes to new technology, first comes ignorance, then comes fear, then comes the embrace and rush to the IT department to make it happen—now!

This scenario plays out again and again in organizations—there are three key phases to technology adoption.

Ignorance—people are unaware, misinformed, or just don’t understand the potential that a new technology holds. In some cases, it’s because they generally haven’t been exposed to the technology, in other cases, it is because they are going forward with eyes wide-shut (what they don’t know can’t harm them or so they think).

Fear—OMG. A new technology; I can’t deal with this. “I’m used to doing it X way.” “Why do we have to change.” “I can’t learn this new technology.” There is fear of something new, of change, of the unknown.

Embrace—The acknowledgement that a new technology is important to the organization; that it can’t be ignored; that it isn’t going away; that the competitors are already getting onboard. Oh uh. Get the CIO in here. We need this technology, now! Where are we going to find finding for it this year (or quarter, whatever). We need to reprioritize our IT projects, so this is at the top (or near it). Let’s get everyone right on this. Can we meet early this week?

I read an interesting article in Public CIO magazine (January 2010) called “A Mile Wide And An Inch Deep,” about how social media is becoming pervasive in government.

In the article it states: “Last year, a Public CIO reader survey found that social media didn’t make the list of the top 10 technology priorities for 2009. Today, it’s become the No. 1 topic among public CIOs.”

In between not making the top 10 technology list and becoming No. 1, social media was vilified as being something that would make the organization lose control of its message, that was a security risk, and that was a colossal waste of employees’ time and should be banned (or blocked and it was by 40% of organizations).

As the pace of technology innovation increases, the lifecycle of adoption has also rapidly advanced. For example, with social media, we went from ignorance to fear to the embrace in one year flat!

Chris Curran, chief technology officer for Diamond Management and Technology Consultants Inc., is quoted in the article as stating:

“If you rewind to 1995, the attitude back then was, “No Internet use at work.” Then it became, “No Internet shopping during work hours.” But over time, the issue just went away, because a majority of employees are good people, hardworking and productive. Some people are going to do stupid things whether they have access to social networking or not. But it doesn’t make sense to ignore a social trend that is bigger than your organization.”

You can’t ignore important new technologies or let fear get the better of you. At one time, people were saying oh no we can’t change from paper communications to email. We need everything hardcopy. And that changed. Now email is the norm or should I say was the norm, because social computing for the younger generation is becoming the new email.

The answer for IT leaders to advance organizational adoption of valuable new technologies is to:

· Create awareness and understanding of new technologies—the benefits and the risks (and how they will be mitigated).

· Establish sound planning and IT governance processes for capturing business requirements and aligning new technologies to best meet these.

· Provide new technologies coupled with ample communications and training to ensure that the technologies are not just more shelfware, but that they are readily adopted and fulfill their potential in the organization to advance the mission and productivity.

The phases of technology adoption: Ignorance, fear, and embrace are not abnormal or bad; they are human. And as people, we must have time to recognize and adjust to change. You can’t force technology down people’s throats (proverbially speaking) and you can’t command organizational readiness and poof, there it is. But rather, as IT leaders, we need to be sensitive to where people and organizations are at on the adoption lifecycle and help to identify those emerging technologies with genuine net benefits that can’t be ignored or feared—they must be embraced and the sooner the better for the organization, its people, and all its stakeholders.


Share/Save/Bookmark

January 24, 2010

Andy Blumenthal Talks About Social Media At AFCEA Breakfast

Speaking - Afcea - January 2010 by Andy Blumenthal
Download now or listen on posterous
Speaking-AFCEA-Jan 2010.mp3 (10938 KB)

Subscribe to my podcast feed here: itpc://andyblumenthal.posterous.com/rss



Share/Save/Bookmark

January 21, 2010

Andy Blumenthal Talks About Social Media

Check out this SlideShare Presentation:
Share/Save/Bookmark

January 16, 2010

Customer-driven IT Management

For many years, we have witnessed the failures of excessively product-driven management, where companies focus on the development and sales of products (from automobiles to toaster ovens) to their customers—whether the customers really want those products or not. This was epitomized by the “build it and they will come” mentality.

Numerous companies faltered in this over-the-top product mindset, because they were focused not on satisfying their customer’s needs, but on selling their wares. Think GM versus Toyota or the Days Inn versus The Four Seasons.

Now however, organizations are moving from product- to customer-focused management, with the basic premise that organizations need to engage with their customers and assist them in getting the most value out of whatever products meet their requirements best. In the world of IT, this is the essence of user-centric enterprise architecture, which I created and have been advocating for a number of years.

Harvard Business Review, in January-February 2010, has an article titled “Rethinking Marketing” that asserts that “to compete, companies must shift from pushing individual products to building long-term customer relationships.”

· Product-driven companies—“depend on product managers and one-way mass marketing to push a product to many customers.”

· Customer-driven companies—“engage individual customers…in two-way communications, building long-term relationships.”

The old way of doing business was to focus on the products that the company had to offer and “move inventory” as quickly and profitably as possible. I remember hearing the sales managers yelling: “sell-sell-sell”—even if it’s the proverbial Brooklyn Bridge. And the driver of course, was to earn profits to meet quarterly targets and thereby get bigger bonuses and stock options. We saw where that got us with this last recession.

The new way of doing business is to focus on the customer and their needs, and not any particular product. The customer-driven business aligns itself and it’s products with the needs of its customers and builds a long-term profitable relationship.

“In a sense, the role of customer manager is the ultimate expression of marketing find out what the customer wants and fulfill the need), while the product manager is more aligned with the traditional selling mind-set (have product, find customer).”

The new model for a customer-driven enterprise is the epitome of what social computing and Web 2.0 is really all about. In the move from Web 1.0 to 2.0, we transformed from pushing information to stakeholders to having a lively dialogue with them using various social media tools (like Facebook, Twitter, blogs, discussion boards, and many more)—where customers and others can say what they really think and feel. Similarly, we are now moving from pushing products to actively engaging with our customers so as to genuinely understand and address their needs with whatever solutions are best for them.

In a customer-focused organization, “the traditional marketing department must be reconfigured as a customer department [headed by a chief customer officer] that puts building customer relationships ahead of pushing specific products.”

I think that the new organizational architecture of customer-driven management is superior to a product-focused one, just as a emphasis on people is more potent that a focus on things.

Similar to customer-driven management, in User-centric enterprise architecture, we transform from developing useless “artifacts” to push out from the ivory tower to instead create valuable information products based on the IT governance needs of our customers.

Further, by implementing a customer-focus in information technology management, we can create similar benefits where we are not just pushing the technology of the day at people, but are rather working side-by-side with them to develop the best solutions for the business that there is.


Share/Save/Bookmark

November 22, 2009

Personal Technology Trumps Work IT

The pendulum has definitely swung—our personal and home technology is now often better than what we are using in the office.

It wasn’t always that way. Early on, technology was mysterious to those not professionally engaged as system engineers or IT professionals. Technology was expensive and made sense for business purposes, but not for home use. IT was a professional enabler to get the job done, but consumer applications were scarce and not intuitive for anything but the office.

The world has turned upside down. Now as consumers, we are using the latest and greatest computers, smart phones, gaming devices, and software applications, including everything social media and e-Commerce, while in the office, we are running old operating systems, have nerdy phones, locked down computers, applications that aren’t web-enabled, and social media that is often blocked.

The Wall Street Journal (16 November 2009) summed up the situation this way:

“At the office, you’ve got a sluggish computer running aging software, and the email system routinely badgers you to delete message after you blow through the storage limits set by your IT department. Searching your company’s internal website feels like being transported back to the pre-Google era of irrelevant results…This is the double life many people lead: yesterday’s technology for work, today’s technology for everything else…The past decade has brought awesome innovations to the marketplace--Internet search, the iPhone, Twitter, and so on, but consumers, not companies, embrace them first and with the most gusto.”

What gives and why are we somehow loosing our technical edge in the workplace?

Rapid Pace of Change—We have been on technological tear for the last 20 years now; virtually nothing is the same—from the Internet to cloud computing, from cell phones and pagers to smart phones and iPhones, from email to social media, and so much more. From a consumer perspective, we are enamored with the latest gadgets and capabilities to make our life easier and more enjoyable though technology. But at work, executives are tiring from the pace of technological change and the large IT budgets that are needed to keep up with the Jones. This is especially the case, as financial markets have seized in the last few years, credit has tightened, revenue and profitability has been under extreme pressure, and many companies have laid off employees and others have even gone kaput.

Magnificent Technology Failures—Along with the rapid pace of change, has come huge IT project failure rates. The Standish group reported this year that 82% of IT projects are failing or seriously challenged. Why in the world would corporate executives want to invest more money, when their past and present IT investments have been flushed down the toilet? Executives have lost faith in IT’s ability to upgrade their legacy systems and fulfill the promises behind the slew of IT investments already made. Related to this is the question of true cost-benefit and total cost of ownership of all the new technologies and their associated investments—if we haven’t been able to achieve or show the return on investment on all the prior investments, why should we continue investing and investing? Is the payoff really there? Perhaps, we are better off putting the dollars into meeting core mission requirements and not overhead, like IT?

Security Risks Abound—With all the technology has come a whole new organizational risk set in terms of IT security. Organizations are hostage to cyber criminals, terrorists, and hostile nation states who can with a few keyboard strokes or mouse clicks disable the company transaction capability, wipe out its memory, steal its information, or otherwise neutralize it from functioning. And the more technology we add, the more the risk level seems to increase. For example, the thinking goes that we were safer when we ran everything in a locked down, tightly controlled, mainframe environment. The more we push the envelope on this and have moved to client server, the web, and now to even more transparency, information sharing, and collaboration—through social media, cloud computing, and World 2.0—the thinking is that we are potentially more open to local and global threats than ever before. Further, with the nation under virtually constant cyberattack and our capabilities to slow or stop these attacks seemingly not existent at this time, executives are reluctant to open up the technology vulnerability spigot any further.

While there are many other reasons slowing or impeding our technology adoption at work, we cannot stop our march of IT advancement and progress.

We are in a global competitive marketplace and the world waits for no one. The problems resulting from the speed and cost of change, the high IT project failure-rate, and the cybersecurity danger/challenges cannot be allowed to inhibit us from progress. We must address these issues head on: We have got to achieve efficiencies from technological advancement and plow the cost-savings into next generation technologies. We have got to drastically improve our IT project success rate though mature implementations of enterprise architecture, IT governance, project management, customer relationship management, and performance measurement (Reference: The CIO Support Services Framework). And we must invest heavily in IT security—with money, people, policy, training, new technology safeguards, and more.

Innovation, technological prowess, and information superiority is what gives us our edge—it is tip of our spear. So yes, we must carefully plan/architect, wisely invest, execute well, and secure our IT. But no, we cannot dismiss the evolving technologies outright nor jump in without proper controls. We must move rationally, but determined into the future.


Share/Save/Bookmark

November 7, 2009

A Vision of User-centric Communication Design

[Authored by Andy Blumenthal and published in Architecture and Governance Magazine November 2009]

As technology has advanced in leaps and bounds over the last 30 years, so has the number of information devices—from phones to faxes, pagers to PDAs, desktops to Netbooks—and it goes on and on.

Some devices, despite having outlived their useful lives, have been slow to disappear from the scene completely. For example, fax machines are still in our offices and homes, although now often combined with other de- vices such as the “all-in-one” copier, printer, scanner, and fax. However, why with the ability to scan and e-mail with attachments, do we even need to fax at all anymore?

Similarly, at one time, pagers were all the rave to reach someone 911. Then cell phones and PDAs took over the scene. Nevertheless, paging never fully went away; instead, it was replaced by “press 1 to send this per- son a page.” However, why do we need to page them at all anymore, if we can just leave them a voice mail or instant message?

It seems as if legacy technology often just doesn’t want to die, and instead of sun-setting it, we just keep packaging it into the next device, like the phone that comes with e-mail, instant messaging, texting, and more. How many ways do we need to say hello, how are you, and what time will you be home for dinner?

When is technology enough and when is it too much?

Of course, we want and love choice—heck, we’re consumers to the core. Technology choice is like having the perfect outfit for every occasion; we like to have the “right” technology to reach out to others in a myriad of different ways for every occasion.

Should I send you an e-mail on Facebook or should I “poke” you or perhaps we should just chat? Or maybe I should just send you a Tweet or a “direct message” on Twitter? No, better yet, why don’t I send you a message on LinkedIn? Anyway, I could go on for about another three paragraphs at least on how I should/could contact you. Maybe I’ll hit you up on all of them at the same time and drive you a little nuts, or maybe I’ll vary the communications to appear oh so technically versatile and fashionable.

Yes, technology choice is a wonderful thing. But it comes at a price. First, all the communication mediums

start to become costly after a while. I can tell you from my cell phone bill that the cost of all these options— e-mail, texting, Internet, and so on—definitely starts to add up. And don’t forget all the devices that we have to schlep around on our belts (I have one cell phone on each side—it’s so cool, like a gunslinger from the Wild West), pockets, and bags—where did I leave that de- vice? Let’s not forget the energy consumption and eco- unfriendliness of all these gadgets and all the messy wires.

Additionally, from a time-is-precious perspective, consider the time sinkhole we have dug for ourselves by trying to maintain a presence on all of these devices and social networking sites. How many hours have we spent trying to keep up and check them all (I’m not sure I can fully remember all my e-mail accounts anymore)? And if you don’t have single sign-on, then all the more hassle— by the way, where did I hide my list of passwords?

Next out of the gate is unified communications. Let’s interoperate all those voice mail accounts, e-mail ac- counts, IM, presence, and social media communications. Not only will your phone numbers ring to one master, but also your phone will transcribe your voice mails— i.e., you can read your voice mail. Conversely, you can listen to your e-mail with text-to-speech capability. We can run voice-over-IP to cut the traditional phone bill and speed up communications, and we can share nonreal-time communications such as e-mail and voice mail with real-time communication systems like our phone.

So, we continue to integrate different communication mediums, but still are not coalescing around a basic device. I believe the “communicator” on Star-Trek was a single device to get to someone on the Enterprise or on the planet surface with just the tap of a finger. Perhaps, our reality will some day be simpler and more efficient, too. When we tire of playing with our oodles of technology “toys” and signing up for myriad user accounts, we will choose eloquence and simplicity over disjointed—or even unified—communications.

As the founder of User-centric Enterprise Architecture, my vision is to have one communicator (“1C”) device, period. 1C is an intelligent device. “Contact John,” okay—no phone number to dial and no e-mail to address. 1C knows who John is, how to reach him, the best way to contact him, and if he is available (“present”) at the moment or not. 1C can take a message, leave a message, or communicate in any way (voice, text, video, virtual) that an individual prefers and that is appropriate for each portion of a particular communication to ensure that the communication intended is the communication received. 1C is not limited to a one-on-one communications, but is open to conferencing—as needed. Mention the need for Cindy to be in on the communication and instantaneously, Cindy is on and then off again. 1C is ubiquitous in time and space—I can send you a communication to arrive now or next week, when you’re here or there, when you’re in country or out, in a car, on a flight, on a ship, or underwater—it doesn’t matter. Like telepathy, the communication reaches you effortlessly. And, of course, 1C translates languages, dialects, acronyms, or concepts, as needed—truly it’s a “universal communicator.”

The closest we’ve come so far is probably the Apple iPhone, but with some 50,000 apps and counting, it is again too focused on the application or technology to be used, rather than on the user and the need.

In the end, it’s not how many devices or how many accounts or how many mediums we have to communicate with, but it is the communication itself that must be the focus. The 1C of the future is an enabler for the communication—anytime, anywhere, the right information to the right people. The how shouldn’t be a concern for the user, only the what.


Share/Save/Bookmark

September 15, 2009

Happy Birthday Internet

On September 2, 2009, the Internet celebrated its fortieth birthday.

ComputerWorld (14 Sept. 2009) reports that 40 years ago “computer scientists created the first network connection, a link between two computers at the University of California, Los Angeles.” This was the culmination of research funded by the Defense Advanced Research Projects Agency (DARPA) in the 1960s.

This information technology milestone was followed by another, less than two months later, on October 29 1969, when Leonard Kleinrock "sent a message from UCLA to a node at the Sanford Research Institute in Palo Alto, California."

While the Internet conceptually become a reality four decades ago, it didn’t really go mainstream until almost the 1990’s—with the founding of the World Wide Web project in 1989, AOL for DOS in 1991, and the Mosaic browser in 1993.

Now, I can barely remember what life was like before the Internet. Like the black and white pictures of yester-year: life was simple and composed, but also sort of lifeless, more boring indeed, and less colorful for sure. In other words, I wouldn’t want to go back.

Also, before the Internet, the world was a lot smaller. Even with connections to others far away—by phone and by plane—people’s day-to-day connections were more limited to those in close proximity—on their block, down on Main Street, or in and around town. It took an extra effort to communicate, share, deal, and interchange with people beyond the immediate area.

At present with the Internet, every email, chat, information share, e-commerce transaction, social media exchange, and application are a blast across the reaches of cyberspace. And like the vastness of the outer space beyond planet Earth, cyber space represents seemingly endless connectivity to others over the Internet.

What will the Next Generation Internet (NGI) bring us?

ComputerWorld suggests the following—many of which are already with us today:

  • Improved mobility—like “showing you things about where you are” (for example, where’s the nearest restaurant, restroom, or service station or even where are your friends and family members).
  • Greater information access—“point your mobile phone at a billboard, and you’ll see more information” about a particular advertisement.
  • Better e-commerce—“use the Internet to immediately pay for goods.”
  • Enhanced visualization—Internet will “take on a much more three-dimensional look.”

I believe the future Internet is going to be like Second Life on steroids with a virtual environment that is completely immersive—interactive with all five senses and like speaking with Hal the computer, answering your every question and responding to your every need.

It’s going to be great and I’m looking forward to saying “Happy Birthday Internet” for many more decades, assuming we don’t all blow ourselves out of the sky first.


Share/Save/Bookmark

September 4, 2009

Internet Addiction—The Real Thing

Yes, people talk about having an Internet addiction and chuckle. But this is becoming the real thing!

AP (3 September 2009) reports that ReSTART, the first U.S. residential treatment center for Internet addiction opened near Redmond (home of Microsoft).

The center offers a 45-day program costing $14,000 to treat pathological computer use.

This includes “obsessive use of video games, texting, Facebook, eBay, Twitter” and more.

So far only one patient is in treatment, but more are sure to be coming.

“There are many such treatment centers in China, South Korea, and Taiwan—where Internet addiction is taken very seriously—and many psychiatric experts say it is clear that Internet addiction is real and harmful.

How does using the Internet or computer harm people?

The effects of addiction are no joke. They range from loss of a job or marriage to car accidents for those who can’t stop texting while driving. Some people have did after playing video games for days without a break, generally stemming from a blood clot associated with being sedentary.”

Experts are debating whether to include Internet Addiction in the next version of the Diagnostic Statistical Manual for Mental Disorders 2012.

“’Internet addicts’ are folks who have severe depression, anxiety, disorders, or social symptoms that make it hard for them to live a full, balanced life and deal face-to-face with other people.”

What are the warning signs (according to AP)?

  • Preoccupied thinking about computers and the Internet
  • Using it longer than intended
  • Using it for increasing amounts of time
  • Repeatedly making unsuccessful efforts to control use
  • Jeopardizing relationships, school or work to spend time online
  • Lying to cover the extent of use
  • Using it to escape problems or feelings of depressions

I suppose everything can be taken to an extreme even computer use. In which case, even highly useful, productive, and transformative information technology can be misused and abused.

Oddly enough, we seem to be feeding the addiction like a glutton—there is an almost endless array of new computer gadgets and applications giving almost endless reason to get online and soak up all the information, social media, e-commerce, and entertainment available. It’s all very alluring and compelling.

Seems pretty easy for people to go of the deep end with this.

So when was the last time you stayed off the Internet for more than 24 hours? How many of you are compulsively checking email, Blackberrys, Facebook, Twitter, IM, texting, and surfing the net? I would even throw in compulsively on the cell phone—yap, yap, yap.

Will there come a time when people reject this 24/7/365 e-lifestyle and push for greater online moderation?

Looking at other types of addictions, at one time people smoked like chimneys and then the realization of the negative side effects led to people putting on the nicotine patches or otherwise going cold turkey, either kicking the habit or greatly cutting back.

The same occurred with a period in society of heavy drinking/alcoholism followed by prohibition and then a more moderate acceptance of social drinking.

It seems that the addiction line gets crossed when people can no longer control their behavior and it results in them hurting themselves or others.

The problem is that we don’t have very good foresight with any of this and we only tend to see the negative consequences of overuse/abuse only after some time—that the empirical nature of science.

So will we wait for a higher prevalence of socio/psychological disorders from Internet addiction, greater numbers of burnt out workers, higher divorce rates, more child neglect, further accidents because people can’t stop their darn texting while driving OR will we be able to foresee the unintended, but certain effects of doing too much of a good, Internet thing?


Share/Save/Bookmark

August 30, 2009

Privacy vs. Exhibitionism

We are a nation torn between on one hand wanting our privacy safeguarded and on the other hand wanting to share ourselves openly and often on the Internet—through Social Media, e-Commerce, e-mail, and so forth.

These days, we have more information about ourselves available to others than at any time in history. We are information exhibitionists—essentially an open book—sharing virtually everything about ourselves to everybody.

Online, we have our personal profile, photos, videos, likes and dislikes, birth date, addresses, email and phone contacts, employer, resume, friends and family connections, banking information, real estate transactions, legal proceedings, tax returns, and more. We have become an open book to the world. In a sense we have become an exhibitionistic nation.

While we continue to friend, blog, tweet, and post our thoughts, feelings, and personal information online, we are shocked and dismayed when there is a violation of our privacy.

How did we get to this point—here are some major milestones on privacy (in part from MIT Technology Review--July/August 2009):

1787—“Privacy” does not appear in Constitution, but the concept is embedded in protections such as “restrictions of quartering soldiers in private homes (Third Amendment), prohibition against unreasonable search and seizure (Fourth Amendment), prohibition against forcing a person to be a witness against himself (Fifth Amendment).

1794—Telegraph invented

1876—Telephone invented

1890—Boston Lawyers Samuel Warren and Louis Brandeis wrote in Harvard Law Review of “the right to be let alone” and warned that invasive technologies threatened to take “what was whispered in the closet” and have it “proclaimed from the house-tops.”

1914Federal Trade Commission Act prohibits businesses from engaging in “unfair or deceptive acts or practices”; has been extended to require companies to write privacy policies describing what they do with personal information they collect from customers and to honor these policies.

1934Federal Communications Act limits government wiretapping

1969—ARPANet (precursor to Internet) went live

1970Fair Credit Reporting Act regulates collections, dissemination, and use of consumer information, including credit information

1971—First e-mail sent.

1973—Code of Fair Information Practices limits secret data banks, requires that organizations ensure they are reliable and protected from unauthorized access, provides for individuals to be able to view their records and correct errors.

1974—Privacy Act prohibits disclosure of personally identifiable information from federal agency.

1988—Video Privacy Protection Act protects against disclosure of video rentals and sales.

1996—Health Insurance Portability and Accountability Act (HIPPA) protects against disclosures by health care providers.

1999Scott McNealy, CEO of Sun Microsystems states: “You have zero privacy anyway. Get over it.”

2000—Children’s Online Privacy Protection Act prohibits intentional collections of information from children 12 or younger

2001—USA Patriot Act expands government’s power to investigate suspected terrorism acts

2003—Do Not Call Implementation Act limits telemarketing calls

2006—Google Docs release for creating and editing docs online

2009—Facebook 4th most popular website in the world

As anyone can see, there is quite a lot of history to protecting privacy. Obviously, we want to be protected. We need to feel secure. We fear our information being misused, exploited, or otherwise getting out of our control.

Yet, as technology progresses, the power of information sharing, collaboration, and online access is endlessly enticing as it is useful, convenient, and entertaining. We love to go online and communicate with people near and far, conduct e-commence for any product near seamlessly, and work more and more productively and creatively.

The dichotomy between privacy and exhibitionism is strong and disturbing. How do we ensure privacy when we insist on openness?

First, let me say that I believe the issue here is greater than the somewhat simplistic answers that are currently out there. Obviously, we must rely on common sense + technology.

From a common sense perspective, we need to personally safeguard truly private information—social security numbers and mother’s maiden name are just the obvious. We need not only be concerned about distinct pieces of information, but information in the aggregate. In other words, individual pieces of information may not be easily exploitable, but when aggregated together with other publically available information—you may now be truly exposed.

In terms of technology, we need to invest more time, money, and effort into securing our systems and networks. Unfortunately, businesses are more concerned with quarterly revenue and profit targets than with securing our personal information. We have got to incentivize every business, organization, and government entity to put security and privacy first. Just like we teach our children, “safety first”, we need to change our adult priorities as well or risk serious harm to ourselves and our nation from cyber criminals, terrorisms, and hostile nation states.

But the real issue is, why do we continue to treat technology as if it is more secure and private than it truly is? In a sense, we shut our eyes to the dangers that we know are lurking, and tell ourselves “it only happens to somebody else.” How do we curb our enthusiasm for technological progress with a realism of recognizing the very real dangers that persist?


Share/Save/Bookmark

August 22, 2009

Technology, A Comfort to the Masses

Typically, as technologists, we like to point out the great things that technology is doing for us—making us more productive, facilitating more convenience, allowing us to perform feats that humans alone could not do, and enabling us to connect with others almost without regard to space and time. And truly, we are fortunate to live in a time in history with all these new unbelievable capabilities—our ancestors would be jealous in so many ways.

Yet, there is a flip side to technology—what some refer to as the 24x7 society—“always on”—that we are creating, in which life is a virtual non-stop deluge of emails, voicemails, videoconferencing, messaging, Friending, Linking-in, blogging, tweeting, YouTubing, and more.

We are becoming a society of people living in a Matrix-type virtual world, where we go around addicted to the online cyber world and yet in so many ways are unconscious to the real-world relationships that are suffering in neglect and silence.

A fascinating article in the Wall Street Journal, 22-23 August 2009 entitled, Not So Fast, by John Freeman states that “we need to protect the finite well of our attention if we care about our relationships.”

Certainly, online communications and connections are valuable, and in many ways are meaningful to us. They can create wonderful opportunities to bond with those near and far, including those who would be normally beyond our reach geographically and temporally. For me it’s been great reconnecting with old friends from schools, jobs, and communities. And yes, who would think that Sylvester Stallone and Arnold Schwarzenegger would be but a FaceBook message away for me?

Yet while all the online interaction is fulfilling for us in so many ways—filling voids of all sorts in our lives—in reality the connections we make in the virtual world are but a tiny fraction of the real world human-to-human relationships we have in terms of their significance and impact.

The Journal article puts it this way: “This is not a sustainable way to live. This lifestyle of being constantly on causes emotional and physical burnout, workplace meltdowns, and unhappiness. How many of our most joyful memories have been created in front of a screen?”

One of the biggest fears that people have is not their own mortality, but that of being left alone in the corporeal world—for each of us, while a world unto ourselves, are small in the vastness of all that is around us. Perhaps to feel less alone, people amass and encircle themselves with great amounts of familiar, comforting, and loving people and things. And while people have these, they are connected, grounded, loved, and they are comforted that they are not alone.

But the harsh reality is that no matter how much we have in our lives, people are beings onto themselves, and over time, unfortunately and extremely painfully, all worldly things are ultimately lost.

The Journal states: “We may rely heavily on the Internet , but we cannot touch it, taste it, or experience the indescribable feeling of togetherness that one gleans from face-to-face interaction.”

Connections are great. Virtual relationships can be satisfying and genuine. All the technology communication mechanisms are fast, efficient, and powerful in their ability to reach people anytime and anywhere. Yet, we must balance all these with the people we care about the most. We cannot sacrifice our deepest and most intimate relationships by sitting in front of a computer screen morning, noon, and night and walking around with the BlackBerry taking phone calls and emails at our kids' school play, on their graduation day, and during their wedding recital. We are missing the boat on what is really important. We have forgotten how to balance. We have gone to extremes. We are hurting the ones we truly love the most.

“We need to uncouple our idea of progress from speed, separate the idea of speed from efficiency, pause and step back enough to realize that efficiency may be good for business and governments, but does not always lead to mindfulness and sustainable, rewarding relationships.”

Finally, with all the technology, we are in a sense becoming less human and more mechanical—like the Borg, in Star Trek—with BlackBerrys and Netbooks as our implants. Let’s find some time to pull the plug on these technologies and rediscover the real from the virtual.


Share/Save/Bookmark

August 8, 2009

What China’s Bullet Trains Can Teach Us About Governance

One of the foundations of this great country is that we believe in respecting the rights of the individual. This belief is founded on the Judeo-Christian doctrine that every life is valuable and the loss of even one life is like the loss of an entire world.

The rights of the individuals are enshrined in the Bill of Rights that establishes what we consider our fundamental human rights, such as freedom of speech, press, religion, due process, eminent domain, and many others.

The flip side of the protection of individual rights—which is sacred to us—is that it may occasionally come at some “expense” to the collective. This can occur when those individuals who may be adversely affected by a decision, hinder overall societal progress. For example, one could argue that society benefits from the building of highways, clean energy nuclear plants, even prison facilities. Yet, we frequently hear the refrain of “not in my backyard” when these projects are under consideration.

In my neighborhood, where a new train line is proposed, there are signs up and down the street, of people adversely affected, opposing it—whether in the end it is good, bad or indifferent for the community as a whole.

So on one hand we have the rights and valid concerns of the individual, yet on the other hand, we have the progress of the collective. Sure, there are ways to compensate those individuals who are adversely affected by group decisions, but the sheer process of debate—however valuable and justified, indeed—may slow the overall speed of progress down.

Why is this an especially critical issue now?

In a high speed networked world with vast global competition—nation versus nation, corporation versus corporation—speed to market can make a great deal of difference. For example, the speed of the U.S. in the arms and space race with Soviet Union left just one global superpower standing. Similarly, many companies and in fact whole industries have been shut down because they have been overtaken, leapfrogged by the competition. So speed and innovation does matter.

For example, in the field of information technology, where Moore’s Law dictates a new generation of technology every two years of so, the balance of speed to modernization with a foundation of sound IT governance is critical to how we must do business.

Fortune Magazine has an article called “China’s Amazing New Bullet Train (it leaves America in the Dust!)”

China’s new ultra-modern rail system will be almost 16,000 miles of new track running train at up to 220 miles per hours by 2020. China is investing their economic stimulus package of $585 billion strategically with $50 billion going this year alone to the rail system. This compares with the U.S. allocating only $8 billion for high-speed trains over the next three years. Note: that the high speed Amtrak Acela train between Boston and Washington, DC goes a whopping average speed of 79 mph.

One of the reasons that China’s free market is credited with amazing economic progress—for example, GDP growth this year projected at 8.3% (in the global recession)—is their ability to retain some elements of what the military calls a “command and control” structure. This enables decisions to get made and executed more quickly than what others may consider endless rounds of discourse. The down side of course is that without adequate and proper discussion and debate, poor decisions can get made and executed, and individuals’ human rights can get overlooked and in fact sidelined. (Remember the shoddy school construction that resulted in almost 7000 classrooms getting destroyed and many children dying in the Earthquake in China in May 2008?)

So the question is how do we protect the individual and at the same time keep pace—and where possible, maintain or advance our societal strategic competitive advantage?

It seems that there is a cost to moving too slowly in terms of our ability to compete in a timely fashion. Yet, there is also a cost to moving too quickly and making poorly vetted decisions that do not take into account all the facts or all the people affected. Either extreme can hurt us.

What is important is that we govern with true openness, provide justice for all affected, and maintain a process that helps—and does not hinder—timely decisions action.

We cannot afford to make poor decisions—these are expensive—nor do we have the luxury of getting caught up in “analysis paralysis.”

Of course, there are many ways to approach this. One way is to continue to refine our governance processes so that they are just to the individual and agile for our society by continuing to simplify and streamline the decision process, while ensuring that everyone is heard and accounted for. Recently we have seen the use of new information sharing and collaboration technologies, like those provided through social media—wikis, blogs, social networks and more—that can help us to do exchange ideas and work together faster than ever before. Embracing these new technologies can help us to pick up the pace of the vetting process while at the same time enabling more people than ever to participate.

Perhaps social media is one of the only things faster than China’s new bullet trains in helping us to progress how we do business in the 21st century.


Share/Save/Bookmark