CIO Symmetry

May 23, 2011  3:06 PM

Should you be worried about Dropbox security? Our weekly news roundup

Wendy Schuchart Wendy Schuchart Profile: Wendy Schuchart

We’ve scoured the Web and compiled a crib sheet for the best and most interesting tidbits from around the IT blogosphere last week, including must-know information on Dropbox security, Android’s encryption woes and executive strategies being compromised by fear-based decisions. Here’s what you might have missed:

  • Your gut instinct in business might be misleading, suggests Tony Schwartz, CEO of The Energy Project. He suggests that our inherent flight-or-fight response is causing us to make poor decisions, similar to those that led to the recession. Entirely interesting points to consider the next time your CFO asks you to justify a huge purchase.
  • Your data center is cold enough to keep ice cream from melting, but data center airflow issues can mean the premature death of your pricey racks and lead to wasted energy, Rajesh Nair, CTO of Degree Controls, writes.
  • Your employees like to take matters into their own hands, so a breach in Dropbox security can mean disaster on your network. A new suit to the FTC alleges that Dropbox security might not be all that is promised.  Ouch.
  • A recent study found that when an Apple devotee is shown the Apple logo, the same part of the brain lights up as when religious people are shown religious imagery. Every CIO admits that Steve Jobs is something of a mastermind, and his recent advice to Nike CEO Mike Parker is brilliant in its simplicity. The key to Apple’s success, according to Jobs, is “get rid of the crappy stuff.” We couldn’t have said it better ourselves.

May 20, 2011  1:49 PM

15 overused IT phrases: Has cloud computing in IT become a cliche?

Wendy Schuchart Wendy Schuchart Profile: Wendy Schuchart

Cloud. It’s everywhere. You can’t ignore cloud computing in IT, but the word itself starts losing meaning after you hear it too many times. Cloud cloud cloud. There were entire sections of the conference hall at Interop last week devoted to cloud computing, and those companies that did not offer true cloud were even saying they were “cloud like.” Attendees were so sick of hearing the word cloud that one of the most coveted swag T-shirts said simply “Blah blah cloud” on the front — with a popular cloud provider’s logo on the back, of course.

It’s not the only overused term on the IT landscape. I am absolutely certain that vendors can come up with something more colorful to describe the special something inside your new gadget than secret sauce. First of all, everyone knows what’s in the secret sauce at most restaurants, right? It’s a mixture of mayonnaise, ketchup and pickle relish: three of the most banal food condiments in existence. Do you really want your super-cool, exciting new technology compared with something that drips on your shirt and leaves a stain that the dry cleaner can’t get out? Put a fork in it, it’s done! I’m calling it: Secret sauce is officially an endangered IT phrase. Similarly, how can there still be all that low-hanging fruit on the proverbial tree?

Let’s agree to put the term cloud on the endangered clichés list too, along with next generation, bleeding edge and paradigm shift. If I have to be convinced that something is a win-win scenario, is it really? How many more times can we hit the ground running? It’s time to smash that single pane of glass. Build a bridge over the value stream and throw away the key for the turnkey solutions. Silence the bells and whistles. How can we still be closing the loop after so many years?

What phrases are you sick of hearing and reading? Are you looking for the one throat to choke? What should be banned from the product releases, marketing spiels and our own headlines?

The comments are waiting for your perfect storm of pet peeves.

May 17, 2011  1:51 PM

Technology conferences can still deliver for IT pros

Scot Petersen Scot Petersen Profile: Scot Petersen

I attended the “last” Comdex show — the last great one, that is — in the year 2000, right before 9/11 and the dot-com bust turned it into a shell of its former self, along with a lot of other technology conferences.

At the time, many people thought virtual conferences would replace the in-person conference. Virtual has done well — will offer three virtual seminars this year — but it has not taken over. And, we’ll always have Vegas.

Tech shows are definitely slowing down. The resident giant, CES, saw two years of dwindling attendance before going back up this year. But traveling these days, you’d never know that there is still high unemployment and pockets of a sluggish economy all around the country. And there are still plenty of technology conferences out there for IT professionals to find out more about the latest products and get training and certifications.

So check out the new list of technology conferences on Site Editor Wendy Schuchart will provide updates as new ones get scheduled. We hope you find it useful.

May 13, 2011  1:44 PM

Email attachment risks highlight value of collaboration tools

Wendy Schuchart Wendy Schuchart Profile: Wendy Schuchart

This week at Interop Las Vegas, I met Dusan Vitek, vice president of worldwide marketing at Kerio Technologies Inc., who said, “I feel guilty whenever I send an email with an attachment.” I actually laughed out loud because I feel exactly the same way. Somehow, an attachment feels a bit like littering to me, but that might be because I, like Vitek, know that email attachment risk is a real threat to your company.

It’s been 16 years since the Multipurpose Internet Mail Extensions — or MIME — standard gave us the ability to attach documents within an email. It seemed like such a little life convenience back then — no more long lines at the fax machine!

But what we didn’t know then is that the email attachment changed everything. Email systems were never designed to handle binary attachments, and now a single file could be replicated internally hundreds of times just by the simple inclusion of another person on a copy of an email, forcing IT to invest in deduplication technology.

Every one of us knows the pain of a 10K limit on our inbox when we’re getting files that are half that size in a single email blast. We also had to start worrying about malware making its way on emails posing as “investment opportunities,” or even humorous videos from your maiden aunt, not to mention the concern about industrial espionage or proprietary information leaving your company without anyone ever realizing it. And of course, there’s the obvious annoyance of document version control that usually ends up with someone handing a mess of a document to an intern, along with 16 different versions of changes and hoping that the intern can make sense of the madness, which I only wish wasn’t a true experience that I’ve had or witnessed more times than I can count.

When it comes to your network’s health, the innocent little email attachments are death by a thousand cuts.

This month we’re looking at content management and project and portfolio management tools, and one thing that strikes me is that many midmarket companies consider collaboration tools “nice to have.” OK, everyone’s got shared drives, but how many people are actively using them for frequently changing documents? Just like water always runs downhill, teams are almost always going to go with the easiest solution when no one’s looking — they’re getting by with sharing documents in email and a few rogue project managers have admitted to me that they are turning to Google Docs in defiance of their company policies.

While benefits from collaboration tools are difficult to measure in bottom-line dollars, a reduction in email attachments is plucking low-hanging fruit. Innovation can be borne from constraint: Whether it is by using a widely adapted collaboration tool like SharePoint, Google Docs or Cisco Quad, or by inventing your own solution, as Vitek did with Kerio’s Workspace, I challenge you to make a serious procedural reduction in corporate email attachments or risk drowning your network in your own duplicated memos, PowerPoint decks and PDF files.

May 10, 2011  7:05 PM

The sky’s the limit for cloud-enabled applications

Scot Petersen Scot Petersen Profile: Scot Petersen

Back in the day, the must-have feature for technology products was “Internet-enabled.” (Remember when Windows became Internet-enabled? It meant sticking the browser in.) It got kind of sickening to hear it over and over. Now we take it for granted.

Now it’s “cloud-enabled,” and as much as I am already a little tired of hearing it, the fact is new cloud-enabled applications are rolling out every day, and pretty soon, we’ll take the cloud for granted. Microsoft bought Skype this week. Why? Because Facebook was bidding on it? Yes, but also because it’s all about the cloud.

For instance, this month we have written about cloud-enabled applications for content management and project management. Next week, it will be business intelligence in the cloud.

These are all natural extensions to existing applications. Making them cloud-like is a matter of virtualizing the resources they use and creating on-demand functionality.

What’s next? How about the cloud-enabled automobile? Sure. The cloud-enabled bicycle computer. The cloud-enabled refrigerator. The cloud-enabled fill-in-the-blank. The sky is the limit.

May 6, 2011  7:01 AM

How bin Laden’s capture demonstrates social media risks

Wendy Schuchart Wendy Schuchart Profile: Wendy Schuchart

It started with a tweet from Keith Urbahn, chief of staff for former Defense Secretary Donald Rumsfeld: “So I’m told by a reputable person they have killed Osama Bin Laden. Hot damn.” Then it picked up steam: People responded, retweeted and then, just like that, Twitter was experiencing a huge flow of traffic. The site reported a record data spike of 5,106 tweets PER SECOND in the moments before President Obama addressed the nation with the official news.

We didn’t know it for sure at the time, but even before confirmation, the hive mind of social media had certainly reached a huge landmark in information technology. Contrast that with Sept. 11, 2001, when most of us heard about the attacks in New York and Washington the old-fashioned way: over the cubicle wall or via breaking news on the television. But what is really striking is this — way before Urbahn’s tweet that launched a thousand retweets, evidence of the military action was being revealed by Twitter user Sohaib Athar in Abbottabad, who commented on the explosions and helicopters in a series of status updates and then tweeted later “Uh oh, now I’m the guy who liveblogged the Osama raid without knowing it.”

While I doubt that Athar’s tweeting had much affect on the outcome of Sunday’s raid, it should serve as an important lesson when it comes to social media risks and matters of your own information security. What might seem like innocent observations to your staff might actually tip off your competitors to new projects or a vulnerability in your system. When it comes to the almighty dollar, if knowing exactly what your employees are blasting on their Facebook pages and blogs can have competitive advantage, a prudent capitalist would be foolish to ignore the feeds. Who needs corporate espionage if people are just giving it away for free?

Of course we can’t reasonably prevent our teams from participating in Facebook and Twitter in their personal time, but it’s prudent to make everyone aware that our immediate access to the periphery of daily life has turned the global village into a very nosy little neighborhood, and there are certain topics that need to be kept off the social networks.

Last month, our experts Nelson and Danielle Ruest wrote about social media risks and crafting a social media policy and had great advice for the midmarket CIO: “Assigning active personnel with the responsibility of updating and maintaining a presence on the social network and ensuring that this personnel is aware of information that is ’Facebook-ready‘ — or verboten for the masses — is the only way to make sure your organization will take advantage of the benefits of these networks without risking its own internal secrets. Be careful how you use them, but use them to your advantage.”

While Athar is making jokes about staying alive, no one wants to be the guy who fed insider information to the other team. Just another reason why a rock-solid social media policy protects both you and your team.

May 3, 2011  3:36 PM

CIO innovation is about getting ahead of the problems

Scot Petersen Scot Petersen Profile: Scot Petersen

My colleagues and I in the CIO/IT Strategy Media Group have spent much of the first half of 2011 talking with CIOs about innovation. So much time that I think I might go crazy asking another question about CIO innovation. But happily, I’m always surprised by the answers we hear.

The latest sampling came from the CIOsynergy Chicago 2011 conference I attended last week.

One CIO, Paul Cottey of Accretive Health, talked about innovation not as something that has to be forced but something that will happen naturally, given the right environment. “Expect innovation to occur,” despite a bad economy or fewer people doing more work, he said. Not everybody can be an innovator, but it may be enough to enable others to be innovative. “I got out of the way,” he said.

Others said that innovation may simply be a matter of recognizing an opportunity and seizing when it comes along. “One person’s ceiling is another’s floor,” said Greg Goluska, CIO of DSC Logistics.

What keeps coming through for me is that to be truly innovative, solutions need to be put in place and be ready before the occurrence of the problem for which the solution was designed. In other words, IT innovation isn’t about keeping up with the business; it’s getting ahead of it. That does not have to be accomplished through some magic trick or guessing game. It comes from developing an understanding of the business as well as anyone else in the company.

April 28, 2011  1:33 PM

PlayStation Network breach is Sony’s shameful nadir

Scot Petersen Scot Petersen Profile: Scot Petersen

Another week, another major hack. It seems these things go in cycles. There was a major breach at email provider Epsilon earlier this month. But the recent attack on the PlayStation Network is unprecedented, in many ways. And most of it does not have to do with gamers.

First, with more than 70 million users affected, the PlayStation Network breach could potentially be the biggest identity theft event in history.

Second, and I think more egregious, is the incredibly slow response from Sony. As of this writing, the breach is a week old and the network is still down and could be for another week.

Third, Sony, a noted technology vendor, visionary and pioneer (and also perpetrator of the infamous CD digital rights management scandal a few years ago) should be ashamed of the scope of exposure to its network.

But there is a ray of hope. For the millions out there who are addicted to the PSN multiplayer versions of Call of Duty: Black Ops and the new craze, Portal2, as my two sons are, there is a rare opportunity for a respite from the virtual world and a chance to face reality.

Time for Sony to do the same.

April 22, 2011  10:00 AM

A bad experience with a Trojan virus drives home BYOD benefits

Wendy Schuchart Wendy Schuchart Profile: Wendy Schuchart

Mondays have a reputation for being the least favorite day of the week for many people. Normally I disagree with that feeling, but this Monday at 9 a.m., my laptop started acting a little hinky. I knew something was up, but then 10 minutes later, Windows warned me that it had blocked some strange ISP traffic. Yep, I’d been hit by a Trojan.

Because I’m remote and didn’t want to involve the help desk unless I had to, I spent a day running antivirus software, then another day playing phone tag with the help desk, all the while I was rebooting again and again and again. Whatever demon got hold of my machine was very, very good, because even after a clean scan and blessing from my antivirus software, the system would continue misbehaving. It was clearly time to hand the machine over to our tech support folks. Slight problem: I’m in Wisconsin and they’re in California.

While my machine is in the shop, I’m living the Bring Your Own Device dream. I’m an incognito Apple fan girl and while I always thought the BYOD ideal was preferable, I’m now seeing how difficult it is to manage while I try to re-create my work environment on my Mac. Some programs aren’t playing nice together– some processes won’t even speak to each other, which I’m still trying to figure out – but overall, I am adapting to this process a lot faster than I would a loaner machine simply because it feels like home.

In an ideal BYOD shop, I could have just plucked from a menu of apps and data governed by IT, installed them myself regardless of OS and gone on my merry way. Mick Hollison of Citrix Synergy advocates the BYOD model, calling it “people-centric computing.” He feels it drives employee satisfaction while enabling IT to have a more strategic focus, freeing the help desk from having to, say, support three-month-old laptops that are infected with mega Trojans like mine. Citrix doesn’t even have to deal with purchasing: They just give employees a stipend and say, “Go buy yourself a little something.”

The stereotypical response from Mac fans is that if my work laptop had been my choice of a MacBook Pro, I wouldn’t have gotten a Trojan because Macs aren’t targeted by these programs, but that is not entirely true. However, I have to admit that rather than playing phone tag with the help desk, I probably would have just gone down to the Apple store that’s less than a mile from my house.

Sure, same end result whether it’s a BYOD or not: Someone else has to fix my problem. And while I can’t say that it would have been resolved faster with a BYOD paradigm, I know for a fact that my laptop won’t even be in California until next week. If I had the power as a user to self-support my own device, it would have been in a tech’s hands on Monday by 10 a.m. From where I’m sitting, that’s a pretty huge argument for BYOD.

April 19, 2011  2:01 PM

Cisco killed the Flip camera and other surprises

Scot Petersen Scot Petersen Profile: Scot Petersen

The news last week that Cisco killed the Flip mini-camcorder — or, as Cisco put it, restructured its consumer products division — is full of surprises.

First, I have to admit, even as a Cisco Flip camera owner, I had no idea that Cisco owned the product, but it has since 2009. Guess I missed that one.

Second, everyone seems to understand that the death of the Cisco Flip camera is because of Apple Inc.’s iPhone and other HD video-ready smartphones. But, as New York Times technology columnist David Pogue points out, the actual number of multitasking smartphones out there is still relatively small compared to the number of phones that only offer voice services. So discontinuing the product (and, in the process, laying off more than 500 people) seems pretty premature.

Third, if Cisco really wanted to get some return on its investment, why not try to find a buyer for the Flip camera? Or give management an opportunity for a buyout? Crazy.

But given Cisco’s history in the consumer (small-business?) products space, it’s buyer beware the next time Cisco starts to take its eye off the enterprise

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: