The Business-Technology Weave


March 14, 2011  11:26 AM

Mobile Access: Make it selective and effective

David Scott David Scott Profile: David Scott

 

Security is always a delicate balance:  You need to provide efficient access, but only to those that are allowed that access.

 

Because there are a growing number of mobile devices, and more people utilizing them, there is more potential for breach – it’s just a numbers game, really.  Your networks require ever more attention:  In matters of security solutions and updates; watchfulness for any day-to-day breach; and investigation of any suspect activity.  At the same time, access has to be readily available to those authentic users, sustaining their productivity – and they must be be productive within a fully educated posture, based on well-communicated security policies.

 

First, before a user even authenticates, remember to have the device authenticate.  The network must recognize the device, allow it, and further – have your network survey it for currency in updates, patches and policy.  Now you’re swingin’.

 

Also, mobile devices use mobile-broadband, the same networks as mobile phones.  Here, it is basically essential to employ a virtual-private-network (VPN) – and also for any access coming through the public internet.  Generally, you want to encrypt any data/communications between devices which transmit through public broadband or internet.

 

The addition of firewalls is another layer of security.  They can be comprised of software, hardware, or both – and essentially emplace filters and authenticating standards before letting devices and/or data through. 

 

Remember that any security procedures and policies are only effective so long as the organization enforces them.  The organization must invest in security, in more ways than one.  More than monetary, it is the organization’s acknowledgement that security is paramount, and that people will be held accountable to security standards.  Regularized training and awareness sessions must be adhered to, and all modern and effective security measures must be undertaken in match to the accelerative nature of outside demands and threats.

 

Get on a schedule of regularized updates in all regards:  Organization, people, process, systems, data, communications, education…  Also, be certain to weave Business and IT leaders’ understandings and sanctions in creating and adhering to mutually defined and understood goals.

 

NP:  I Can’t Get Started, Cannonball Adderely, jazz24.org

March 12, 2011  1:49 PM

Mobile Security: On the go… it can be gone…

David Scott David Scott Profile: David Scott

 

No matter how tight your security policies, no matter how regularized your security training, no matter how careful your workforce – mobile devices are going to get lost.

 

Smartphones, laptops, tablets, cameras, flash drives, and anything that’s not nailed down is susceptible to being left at the airport, in the back seat of a cab, or on a table somewhere in a food court… as but a few examples.  And that’s just the possibilities involving loss through negligence – oversight, in leaving a locale without all of your possessions firmly in tow.

 

What of theft?  As difficult as it is to believe, people actually take things that don’t belong to them!  This is something you have to actively guard against – not just by maintaining your eyes on portable devices, particularly when you’re using them in public spaces, but in another important way.

 

It’s not so much the device itself that poses great risk – it’s merely any device’s potential manifest of harm, in the absence of appropriate controls when in the hands of an unauthorized person.

 

A device harbors content:  That is, the data any particular device contains.  Unauthorized physical access to the device cannot always be effected, as in the case of loss, so all other up-to-date methods of security must be employed.  The device must be password protected.  You might even consider fingerprint and card readers for total authentication and access.  Further, the data residing on the device should be encrypted.

 

Risk is also posed through the access that the device represents:  To your network, to your  central data repositories, to your business intelligence, to your client information, to your employee information, to sensitive and confidential data, to proprietary solutions and systems, and on and on and on…

 

Another security measure to consider, which would protect both data and the device’s potential for directing harm to whatever it logs into, is to enable a remote-erase (wiping) solution.  When a device goes missing, a trigger is pulled at the home office, sending a signal to the device to essentially destruct all data and mechanics of login.

 

March 12th:  On this day in 1912, the Girl Guides (Girl Scouts) was founded by Juliette Gordon Low

 


March 11, 2011  10:30 AM

SMB: Mobile Ready?

David Scott David Scott Profile: David Scott

 

Small and Medium Business (SMB) can really benefit from mobile readiness.  Beyond the obvious reasons (the idea of “readiness” and a paired security posture hardly needs to be sold), the SMB market can capture and leverage a whole population of assets that essentially have no overhead.  No TCO, no appreciable Time to Value (TtV); they’re here now, in that they’re often owned and maintained by people as personal assets:  Things such as smartphones and laptops.

 

Of course, often enough these devices are provided by SMB too, as tools of any particular job; but there does exist a ready population that can be exploited – and that must be protected.

 

Whatever devices (and associated users) desire to access your data, systems, and tools – you must take inventory and qualify access before you greenlight it.  Assess whether a particular user really needs remote access – is it going to be an efficient enhancement to work?  Will it be productive?  Does supervision agree that access is desirable?  Is a strong case being made?

 

Then the risks can be weighed against the benefits – and there are always risks.  Mobile devices will harbor sensitive data – and that data can easily be lost.  Also, mobile devices transmit updated data back into your central repositories – on your network:  filestores that represent the content feeding your mission critical applications.  Things such as the organization’s sensitive financial information; customer databases and records, sensitive correspondence – you name it.  You must ensure sourced mobile data is healthy, accurate, and whole.

 

Mobile devices also represent a portal through which malware may enter the organization.  Therefore, an entire regime of recurring user education is necessary, and a standard schedule for review of devices for compliances and updated protections for malware, etc., is absolutely essential.

 

When devices are lost, it is imperative that users alert IT – lost devices can allow unauthorized access to the network; IT must immediately bar a device’s ability to access upon loss.  And while on that subject, beware devices that have unsecured remote access – that is, no password or stored password, allowing the “greased entry” upon a simple switch-on of the device. 

 

Let’s keep rolling on this…

 

 

NP:  The “In” Crowd – The Ramsey Lewis Trio, jazz24.org.


March 10, 2011  12:17 PM

Mobile Readiness

David Scott David Scott Profile: David Scott

 

Once upon a time, all an IT manager had to do was to secure an infrastructure and allied systems and tools that existed inside the “four walls” of the organization.  That is, some measure of a computer room (speaking in a virtual sense; any of these elements could stripe through multiple buildings, offices, allied agencies, etc.), fileserver(s), a wiring closet or two, a computer workstation population, and so on…

 

A few forward individuals, either by power, station, or adventurousness, dialed-in to the network.  Wow!  I remember jokes in the workplace:  Who the heck wants to bring the office home?

 

Today, we’re approaching universal connectivity.  There are so many mobile devices, and associated mobile apps – paired with new data-densities, new bandwidth and processing power considerations – that business is everywhere.

 

The challenge to business and IT leaders alike is not just protection to organization assets and daily production, but the challenge includes spec’ing up to accommodate present and future demands for the mobile workforce.  It also includes more than that…

 

It goes well beyond:  You must document allowances, as far as which classes of users have mobile access, when, and how.  And you must consider the blended environment of personal vs. business assets.  Keep in mind that folks access your organization’s central computing and data assets from personal computers, laptops, phones, tablets, etc.  The avenues for breach are many, in that you do not have an exclusive measure of control over these devices, and their associated “wellness” in terms of virus protection, malware protections, etc., etc.

 

Security demands are high.  You must guard against spam, spyware, malware, viruses… denial-of-service attacks, whether directed or random.  In this environment, it is prudent to consider data encryption for mobile devices.  Today, you must safeguard sensitive organization data on mobile devices:  Information is always vulnerable to theft and loss, but never more so when it’s repository is mobile and susceptible to loss itself.

 

More on this in the coming days…

 

March 10th:  On this day in 1933, Nevada becomes the 1st state to regulate narcotics.


March 8, 2011  11:32 AM

A Mind Boggler: Social networking peril – again

David Scott David Scott Profile: David Scott

 

I’m not sure there are words to adequately express the true problem that this article illuminates:  Douglas County Students Disciplined Over Facebook Post. 

 

It is naturally disturbing that these students, in 2011, are not aware of social networking perils, the global wallop of the internet’s speed and comprehensibility, as well as aspects of damage to reputations.  That, plus legal liabilities involving defamation. 

 

But in a more basic and general sense – what of simple honesty, decency, and good character – how do 12-year-olds today think it is ok to label a teacher a pedophile; a rapist; as bipolar? 

 

Or perhaps a better question is:  What allows them to unthinkingly do this?  Answer:  The “realm of risk” allows them this latitude.  In the realm of risk, unmanaged possibilities become probabilities.  We can see how universal this important BTW warning is  - and how wide its applicability:  No one set proper expectations and limits on these kids’ online posts.

 

Kids say mean things; cruel things; stupid things.  I did when I was young, and likely you did too.  Today’s kids will do those things in the internet age’s equivalent of our neon lights – unless someone tells them not to, and spells out the consequences.

 

What of school policy?  The modern requirements for school policy mandate a section concerning defamation of teachers, administrators, etc., regardless of forum; whether occurring on school grounds with school resources, or elsewhere.  Today’s electronic enablements make this a no-brainer.

 

What of elementary education?  It has to include coverage of internet communications and general use.  If schools are in the business of teaching children the difference between “bad touches” and “good touches,” there sure is an appropriate need to be filled regarding electronic communication in 2011 – particularly given the parents’ reactions in the included article.

 

That is the most dismaying thing.  Kids do not possess wisdom and experience – caring parents and educators help that along.  But in this case, the parents are devoid of wisdom and experience – actually defending their kids within the most egregious defamations possible.

 

Indeed.

 

Go check your kids.  They’re kids.

 

 

On this day:  In 1959, Groucho, Chico and Harpo Marx make their final TV appearance together.


March 2, 2011  6:26 PM

Business Success – Technology must make CORRECT enablement of business in a quickening world

David Scott David Scott Profile: David Scott

 

“Business success” really means “profitable endeavors.”

 

Even a non/not-for-profit organization has to deliver products and services that generate value and revenue.  So, anything you do – your business – requires efficient work and deliveries.

 

Business goals have to meet marketplace demands.  You have to develop something that people want:  Otherwise it doesn’t matter how effectively you try to deliver.  Absent delivery of something meaningful to market, it won’t matter now efficiently you produce it; it doesn’t matter how carefully you try to pump ROI by shortening TtV and by driving down TCO.

 

These days there is very rapid technological change.  Customer expectations are very high – new, innovative, products are hitting the market all the time.  Further, existing products are improved quickly, and “last year’s model” becomes antiquated and unattractive rather fast.

 

Phones, computers, cars, the speed at which we self-check out of a grocery store – ever more comprehensive services, ever-quicker deliveries and payouts; moving on to the next area of life and business.

 

The same holds true for your place of employ. 

 

Vendors are shortening product lifecycles by, partly, simultaneously delivering new products to market.  Don’t be fooled into buying too far ahead, or into something you don’t particularly need.  Faster printers on the market?  Great.  But – are your present printers fast enough?  Has anyone complained?  Better to assess their remaining, anticipated, useful life.  Also, perhaps some areas can retain slower printers… some printing is rather leisurely – someone gets around to picking up the output eventually…

 

Make sure you’re procuring, and investing in, the right business assets – at the right time.  Make the basis for upgrades or new purchases in accordance with a holistic view of budgets and business objectives.  Something interesting I observed at a company recently:  When they upgrade their workstation and laptop populations, they do it as a complete, 100%, replacement of the old computers. 

 

However, I did things a bit differently:  I rolled existing computers down into positions that didn’t need the fastest, latest, greatest…  you can establish a heirarchy. 

 

I guess that goes against the grain of treating everyone “the same” – but, some people have offices, some have cubicles, and… in my world, some have faster computers than others.

 

You can project up to the maximum challenge of huge enterprise endeavors.   Manage projects according to this principle:  Look for the right timings, the right products, the right scale of rollout vs. limits, and above all – be certain the solution serves.  In other words, be certain you’re investing in the right stuff, and make better decisions on where to apply limited financial resources and that allied potential.

 

Serve business – serve successful business.

 

 

NP:  The Cannonball Adderly Quintet in San Francisco – original 1959 Riverside LP.


February 28, 2011  2:09 PM

Want a Promotion?

David Scott David Scott Profile: David Scott

 

You’ve been at your position for three years or more.  Things aren’t too bad:  You work in an office environment; perhaps you have your own office (if not, see below); your hands stay reasonably clean; no one has yelled at you or physically assaulted you in quite some time; coffee’s not too bad; and so on and so forth…

 

But… but something’s missing.  You want more challenge.  Maybe a little more prestige.  Some daylight to open ground – so that you have a reasonable chance for advancing your career.  You deserve more pay (how do I know this?  Because I deserve more pay, that gal over there deserves more pay, and you deserve more pay – ok?).    :^ )

 

Before I became an author – and a professional blogger, and an independent person with my own clients – I worked directly in the field of Information Technology.  Some of my early environments were pretty grim:  The dark days of the ‘80s, early ‘90s… when all too frequently governance and management were largely clueless. 

 

Well, that may be an exaggeration…

 

… but only in giving them too much credit:  They were often dumb.  (Of course, I’m using the word “dumb” in a neutral, academic, sense – not in a pejorative one:  They were ignorant).  Good people in all other regards, but here in the weave, we are nothing if not empirical.

 

Those early days of mine were ok, though, because that’s what taught me the absolute necessity for having a tight, mutually supporting, business-technology weave.

 

During those days, and in running up against significant ignorance, often overcoming it, and sometimes repeatedly smacking against it, I discovered something.  I could generally glean all I needed to know from a specific organization in about 3 years:  That is to say, general  knowledge about leadership, its enablements, its limits, my place in it or against it, politics, business-IT relationships, etc.

 

Also, 3 years is about the minimum to avoid too much “churn” on your resume.  If I wasn’t particularly happy – or just getting bored/stale – I simply changed jobs.  Sometimes it was four years, five…  The job market notwithstanding, you can simply go fishing… if something interesting comes up, take it. 

 

Now please recognize:  I always continued giving 100% when dissatisfied and looking.  In fact, most of my employers couldn’t imagine me leaving – and several tried to entice me to come back within months of going.  In spite of a few discussions, I never did go back– if you leave, recognize that you are leaving to be gone.

 

Every move was a step up; in responsibility and pay.  Bigger office.  Bigger environments, projects, challenges.  If you decide to climb a ladder, be certain of your “rungs” – that they’re solid, and leading ever upward.  Particularly for my more junior, SMB-oriented, readers:  If you’ve never had your own office, and you’re interviewing somewhere, particularly for a leadership position, do not be afraid to ask, “Does this position come with an office?”

 

Don’t let fear hold you back.  Most often, the only way “up” is “out.”  There’s not a thing wrong with that… 

 

Something missing in your career?  Gauge the strength of your legs, and start climbing…

 

Thought for the day:  “To be one’s self, and unafraid whether right or wrong, is more admirable than the easy cowardice of surrender to conformity.”   - Irving Wallace


February 28, 2011  12:36 PM

Content Awareness

David Scott David Scott Profile: David Scott

 

Any organization’s leaders (senior governance, management, board[s]) should have content awareness – but many don’t.  (Of course, the entire organization needs to have content awareness, but the emphasis in today’s post will be on leadership).

 

Content, from an information perspective, is data the organization harbors, or contains (hence, “content”).  Any data, electronic or hardcopy – irrespective of system or vessel – has to be managed for security, control, access, and use.  Whether that’s data contained in F&A systems, core application and database systems, word processing, presentation programs, on portable drives, in filing cabinets – anything and everything – it must be managed with a 360o awareness. 

 

We spoke of metadata the other day.  It may seem a burden to tag every piece of content in your organization with appropriate metadata – but recognize:  With a Content Management System (CMS), the assignation of metadata can be automated.  The CMS merely rakes through the content, looks for key information based on controls that the organization sets, and fills in a metadata template which is forever linked to that content.

 

Such metadata fields could include:

 

-        Source (Author, outside agency, etc.)

-        Format

-        Purpose of data

-        Key departments, contributors, stakeholders…

-        Authorizations (who is allowed to see/use; who is allowed to edit)

-        Disposition instructions:  Archive and/or destruct dates

-        Applicable regulations (internal, external, or both) for dispositions

-        Date and time of creation

-        Any file manipulations such as encryption, passwording, etc.

-       

 

Metadata can be anything the organization assigns for the control of data.  You determine your own handles and controls for data.

 

Increasingly, organizations of all sizes must not only protect data, they must have ready access to it.  They cannot afford to overlook any particular information-asset.  Further, they must know how to dispose of content, in avoiding a glut of information that becomes difficult to sort through – slowing systems, corrupting databases, delivering out-of-date data that no longer has meaning or relevancy.

 

Content awareness – weave it into your organization.

 

NP:   Sonny Rollins, Saxophone Colossus, on… CD.  I know, I know… when I get home, I’m going to cleanse by playing an original Charlie Parker LP on Dial…  maybe followed by Oscar Peterson at Carnegie Hall…   


February 27, 2011  12:38 PM

SSA Revisited (see prior post) – and – Content Management

David Scott David Scott Profile: David Scott

 

If you’ll bear with me, I may have a rather novel use for a Content Management System.

 

I had a question from someone recently:  “What is a Content Management System?” (CMS).  Great question –  further, what can a CMS become?

 

I was presenting a rather high-level view of The Business-Technology Weave, so I mentioned briefly that a Content Management System enables the efficient control and use of information in the organization:  setting triggers for archive, destruct, filing… sometimes just the removal of data from the “active environment” to preclude a glut of information.

 

It’s so much more of course:  It’s the assignation of metadata (simply:  data about data), tags, “handles,” for the ready “pull” of data into whatever reporting you need.  It sets classifications for data.   A CMS can cough up abstracts for larger information elements:  pointing to papers, reports, related volumes of information – independent of whether reinforcing-content is a document, spreadsheet, presentation, record in a database… info in your finance and accounting system – that is, independent of where content resides (system, building, desk… electronic or paper).  CMS manages the content contained within large, sophisticated, data repositories.  (CMS is a very large subject:  There’s an entire chapter on content and its management in I.T. Wars).

 

Therefore, CMS grants the ability to leverage dispersed and formerly hidden content, in bringing together scattered information assets that may be silo’d in diverse systems, repositories, departments, and so on.  A good CMS even documents the location of content that exists solely on physical paper assets.

 

In looking at the Social Security Administration (SSA), and related problems with their new data facilitiy and allied project, I wonder if CMS was being employed in any way? 

 

Most folks assume CMS is for the tracking, leveraging, reporting, and managing of information – for sole purpose of delivering to the “outside” mission.  That mission can be educating students, selling widgets to customers, providing legal services to clients, manufacturing cars, surveying labs for regulatory compliancies…  managing and dispensing payments to social security recipients…   the mission can be anything.  The “doing” of whatever it is you “do.”  Most folks employ CMS largely for what I’ve mentioned above.

 

But CMS can do something that may be a rather novel application:  You can register and track assets – an inventory (nothing new there), but one with “tethers” – the metadata to note any asset’s relationship, support to, and vulnerability within other supports, against all other inventoried assets – “CMS’d” assets.  I wonder if anyone is utilizing CMS in this manner?

 

Once all assets are “CMS’d”, keeping up-to-date is fairly easy:  Upon procurement of any resource, it is a fairly rapid and efficient task to create a record in a CMS for it.  Populated are key metadata fields with the date of procurement, purpose, class of employees supported, some history regarding the vendor (years in business, size, market presence…etc. – yielding anticipated longevity), and all associated assets and systems with dependencies and supports.  A general notes section adds to the metadata, all searchable within CMS, blooming any and all of the organization’s critical infrastructure and systems supports and dependencies; anticipated dates of major updates; anticipated dates of obsolescence, or consideration thereof.  As to that consideration, remember BIT anyone?  Ah… it all weaves together…

 

This does a couple things:  You don’t get surprised by antiquated, incompetently produced, cabling schemes that grew over the years as different people procured new systems, stuffed more cables under a raised computer room floor, cramming them in until it’s a snake pit.  A snake pit with no accompanying documentation or possibility of anything resembling this millennium’s best-practice-discipline of Wire/Cable Management.

 

Critical power sources are not located near water.  If they are, a plan for the relocation of power (or water) is at least considered.  It goes somewhere on the Five Year Plan (hopefully more near-term than far), and gets budgeted and scheduled according to the other priorities and initiatives in the organization.

 

It may seem a burden to administer this – but you have someone, or a whole department, inventorying already:  This is an inventory with relationships; the who, what, when, where and why for each asset, its intentions, and its relationships.  It can be done; with efficiency and accuracy.  Then turn the CMS wheel in updating, retiring, acquiring, and blending all assets for maximum gains vis-à-vis ROI, TtV, and TCO.

 

The Weave; it serves.

 

 

Thought for today:   

Few people are capable of expressing with equanimity opinions which differ from the prejudices of their social environment.  Most people are even incapable of forming such opinions.   - Albert Einstein


February 27, 2011  9:34 AM

Lessons: Social Security Administration Facing Data Center Failure

David Scott David Scott Profile: David Scott

 

As my father said:  From some, you learn what to do; from others, what not to do.

 

Oh oh – it seems someone is having trouble managing a project, and it’s a big one.

 

The Social Security Administration (SSA) is presently getting by in a 30-year old outdated facility, known as the National Computer Center (NCC) in Woodlawn, MD.  Some of its support infrastructure, such as the UPS, is so old that there are no longer replacement parts available for maintenance.

Nearly $500 million in stimulus funding has been dedicated to building a new data center.  As often happens, the project is a year behind schedule and the lag appears that it will get worse.  Meanwhile, the old facility is filled with problems.  This is no mundane “data center” – it is a facility that delivers annual payments of $700 billion to 56+ million Americans.

Fortunately, the General Services Administration (GSA) has found a location for the new home of a new state-of-the-art data center.  It’s rather interesting to note that a significant part of the delay in prepping this new site is a concern over cost of electric power:  government auditors “expressed concern” that not enough consideration was given to this cost. 

I’m a little confused:  Power is power (a kilowatt hour is empirical, no?), a data center is a data center (a proper project knows the size, scope, and power demands… no?  Um, well, I guess, “no”), and the project is supposed to manage according to schedule and reality – right?  That’s what a project does – that its whole purpose.  Otherwise we wouldn’t waste our time shuffling all these schedules, resources and people.

I’m kinda guessing that the new site might be a bit removed from ready-access to efficient, affordable, power:  Maybe they need relay stations, or boosters, or who knows what – but this would seem to be a failure of proper survey for where they are – what they really need, and where they’re going and thus resultant trouble in the middle:  Getting there.

Kelly Croft, Deputy Commissioner for Systems at the SSA, provided some telling Congressional testimony this past February 11th.  She cited the “dire need” for the new data center:  “Without a long-term replacement, the NCC will deteriorate to the point that a major failure to the building systems could jeopardize our ability to handle our increasing workloads without interruption.”  Further:  “Despite all of our best efforts to preserve the NCC for as long as necessary, there is always the potential that a critical facility infrastructure system could suddenly fail.”

Risks and incidents are further illuminated by Croft’s recent testimony:

-        There is No True Dedicated Power:  “Employee office spaces in other areas of the building share the same power lines and HVAC system as the data center. This design problem means that a potentially isolated issue in an area outside the data center, such as a minor receptacle overload at someone’s workstation, could temporarily shut down some power to the data center and HVAC system.”

 

-        There is an Aging Custom UPS System:  “The UPS is not an off-the-shelf product; it was designed specifically for the building. While we have extended our service contract with the UPS maintenance vendor over the years, the vendor recently advised us that it could not guarantee repairs in the near future. The necessary parts are simply no longer available. If the UPS failed, we would have to bypass the system and deliver unconditioned power to the data center equipment, which could quite potentially damage the equipment. Replacing the UPS would require significant downtime at the NCC.

 

-        Critical Cabling Problems: “Tangled cables can block the under-floor airflow that cools our servers, and we cannot work on the cables safely without shutting down the affected systems. Similarly, troubleshooting problems is difficult when we cannot isolate cable pairs easily to determine whether problems exist in the cables or in the IT equipment. There is also an elevated risk of data corruption, because electro-magnetic interference from the electrical wires that are located too close to the telecommunication wires can distort data transmission.”

 

-        Leaking Water in the Data Center:  “Last year, our facilities staff noticed water on the floor of one of the large battery rooms in the NCC. They quickly traced the source to a leaking water pipe in the room. Any water in close proximity to high-voltage batteries presents a serious hazard to the building and its personnel. In order to fix the leak, plumbers needed to expose the pipe and cut off the water supply. Unfortunately, without redundant systems, cutting off the water supply to the pipe also required cutting off the water supply to the large air handling equipment that is responsible for cooling our computing space. Since the air handling equipment had to be turned off, we had to actually shut down a portion of our national computing operations while making the repairs.”

Here in the Weave, I hope it’s obvious that there had to have been a failure in an ongoing survey of Where We Are (where they were) for the SSA.  Always understand where you are, thus knowing where you need to go, and thus knowing how to get theresanctioned and known projects, with assigned budget, resources, responsibilities, and sized expectations – all done on time, in time.

Knowing where you are – the status of systems, their longevity, their safety and security, their update, their schedule for replacement – is a critical factor in any organization’s surety.  You must lead change, not mount it in a burst when critical infrastructure is failing:  finding that water is not only near critical power sources, but leaking to boot; upon discovery that cables are tangled and unlabeled – what happened to “wire management” here?  And so on…

 

On this day:  On February 27th,1967 Pink Floyd released their 1st single “Arnold Layne”


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: