Starting a revolution with technology

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Mobile Computing, Social Computing, Social Networks, Uncategorized, Wireless.

Discussion:  In early 2011 civil unrest in Egypt and the middle east let to political demonstrations that the Egyptian government believed threatening enough to the well being of the country that they shut down the World Wide Web in hopes of diminishing lines of communication between groups of protesters.  OpenMesh, an ad hoc wireless mesh network of individual… Read more »

Cloud computing after Amazon and Sony: ready for primetime?

Posted by & filed under Cloud Computing, Cyber Security, IT Infrastructure, IT Planning, IT Security, IT Strategy, Privacy.

Discussion: On the heels of two IT disasters at Amazon and Sony, analysts caution businesses to rethink their cloud strategy.  While cloud computing offers the advantages of both cost savings and ease of integrating diverse systems, every cloud service requires a different risk assessment.  Parallel infrastructures, multiple cloud service providers, or a hybrid cloud where… Read more »

Social media and the security risks they pose for business

Posted by & filed under Business Analytics, Business Intelligence, Cyber Security, E-Business, Interview, IT Governance, IT Infrastructure, IT Security, IT Strategy, Social Computing, Social Networks.

Discussion: As more and more businesses see the value in social media applications like Twitter and Facebook, they face a big dilemma: allow these applications to go through their current network without the proper security infrastructure or block them altogether.  Nir Zuk, co-founder and CTO of Palo Alto Networks, says the next big thing in… Read more »

Amazon explains its cloud disaster

Posted by & filed under Business Analytics, Cloud Computing, Cyber Security, E-Business, E-Commerce, IT Governance, IT Infrastructure, IT Security, IT Strategy, Video.

Discussion: Amazon’s cloud services recently suffered a massive crash that left many of its East Coast customers without access to their data, including dozens of websites.  The company cited a mistake made by engineers that triggered a cascade of other bugs and glitches, overwhelming the master system and causing a “brown out.”  Amazon spun the… Read more »

Inside Google’s China misfortune

Posted by & filed under Business Analytics, Civil Liberties, Cyber Security, E-Business, E-Commerce, IT Security, IT Standards, IT Strategy, Privacy, Search Engine.

Discussion: On January 27, 2006, Google.cn went live in China, and within a few months, Google China’s headquarters was outfitted with the usual frills: foosball tables, a fully equipped gym, massage room, a huge cafeteria with free meals.  But signs of a distressed relationship soon followed: unexplained outages, Google’s operating license was suddenly no longer… Read more »

Online photos: Are they the new digital fingerprint?

Posted by & filed under Cyber Security, IT Security, IT Standards, Privacy, Social Computing, Social Networks.

Discussion: Digital photos on the Web may contain information revealing where and when the shot was taken and might even lead to the identification of the faces in the photo.  Coye Cheshire, A UC Berkeley professor, is researching people’s perceptions of the pictures they post online and he’s learning that people tend to perceive a… Read more »

How did Google lose, and find, all those e-mails?

Posted by & filed under Business Analytics, Business Intelligence, Cloud Computing, Cyber Security, IT Governance, IT Infrastructure, IT Security, IT Standards, IT Strategy, Search Engine, Social Computing, Social Networks.

Discussion: Due to a glitch in a software update, tens of thousands of Google e-mail users got a pretty big shock recently: All of their emails and contacts disappeared.  Fortunately, Google was able to recover all those lost emails and contacts, but the process took hours because the search giant backs up all e-mail data… Read more »

The Real Internet Censors: Unaccountable ISPs?

Posted by & filed under Civil Liberties, Cyber Security, Intellectual Property, IT Governance, IT Standards, IT Trends, Privacy.

Discussion: A recent report by the European Digital Rights (EDR) group warns that nations are slowly turning ISPs into “off-duty information cops.”  Eager to appease politicians in order to achieve their own goals, networks are cooperating with governments looking for easy, informal solutions to difficult problems like copyright infringement, dangerous speech, and child pornography.  But… Read more »

BYOC: Should employees buy their own computers?

Posted by & filed under Business Analytics, Business Intelligence, Cyber Security, E-Business, IT Infrastructure, IT Investment, IT Planning, IT Security, IT Strategy, IT Trends, Mobile Computing, Virtualization, Wireless.

Discussion: Struggling to keep up with ever-changing technology and the cost of IT provisioning, companies are adopting the “bring your own computer” (BYOC) policy.   Not only do employees have the freedom to choose their own devices, they also have the freedom to access their office desktop remotely.  Both Microsoft and Intel subsidize hardware, while Citrix… Read more »