Overheard: Word of the Day


February 18, 2009  1:29 PM

Overheard – Top 10 Internet Memes

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Here’s my list of the Top 10 Internet Memes.  Want to know how these people felt about becoming an Internet phenomenon? So did I.

1. Dancing Baby
OO-ga-chuka. OO-ga-chuka.  Michael Girard’s software demo creeped people out even as they wondered — how did he make that???

2. Cookie Recipe from Neiman Marcus
True or False: After a woman and her daughter are ripped off dining at the Neiman-Marcus Cafe in Dallas, they use the Internet to exact revenge.

3. Blair Witch Project
Before the film even opened, there were fan sites and Usenet Groups. BWP demonstrated the power of the Internet to create a buzz, no matter how bad your movie was.

4. LOLcats — I can has cheeseburger?
You can thank Eric Nakagawa for starting this digital photo craze.

5. Bad Day at the Office
We didn’t know his name back then, but Vinnie Licciardi did what a lot of us would have liked to.  He was the original Mad Man.

6. LonelyGirl15
Is Bree real or is she some new kind of TV program on the Internet? Over two million people tuned in to find out.

7. RickRoll
When you’re RickRolled, it’s like you open a door on the Internet and your whole family jumps out and yells “SURPRISE!”   Even the Macy’s Thanksgiving Parade got RickRolled.

8. Thriller Wedding Dance
If you’ve been to a wedding lately, you may have noticed the trend towards a choreographed first dance. No, it’s not because of Dancing with the Stars.

9. Miss South Carolina
Dumb blonde? Nope — just a fascinating look at panic.

10. Here It Goes Again
Tired of your band playing in the garage? Put that gym equipment to good use.

February 17, 2009  1:04 PM

Overheard – What’s holding up electronic health records?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
The $787 billion American Recovery and Reinvestment Act that passed Congress last week allocates $19 billion to establish centrally linked health data infrastructure to contain the health information of “each American” by 2014 and to set up the new office of the “National Coordinator for Health Information Technology.”

Fred Lucas, ‘Exceptions’ in Stimulus Bill Allow Sale of Health Records

The banking industry successfully moved to electronic records. What’s really so different about health care?

For the life of me, I can’t understand what the holdup is for electronic health records. It seems like a no-brainer with a lot of components, like HIPAA already in place. Yesterday’s article in the Washington Post attempts to explain some of the issues — but as I read it, I found myself shaking my head.

I don’t buy “privacy” or “security” or even “lack of standards.”  Like all things, it probably comes down to money and profit.  Let’s hope Obama’s $19 billion finally gets the ball rolling.


February 16, 2009  3:06 PM

Overheard – How to speak Windows Server 2008 R2

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
With the first public beta release of Windows Server 2008 R2 comes a new version of Remote Desktop Servers (RDS), formerly known as Terminal Services.

Douglas Brown, First Look at the Updated Remote Desktop Services Web Access Portal in Windows Server 2008 R2

Douglas Brown, over at DABCC, has put together an excellent chart for all of us who are trying to keep up with “what’s Microsoft calling it now?”

Old Names
New Names
Description
Terminal Services (TS)
Remote Desktop Services (RDS or RD)
This is a “Terminal Server”! It allows users to connect to applications and desktops via RDP connections
TS Licensing
RD Licensing
This component manages all the RD Client Access Licenses
TS CAL
Remote Desktop CAL
This is the license itself
TS RemoteApp
RD RemoteApp
This is the ability to publish a single application to a user seamlessly without a desktop.
TS Gateway
Remote Desktop Gateway
This allows for secure connection to RDS servers over the Internet
TS Web Access
RAD Web Access   (RemoteApp and Desktop Web Access)
This is the web page that users use to login to a RDS desktop and/or applications
TS Easy Print
RD Easy Print
This is the driver-less solution for printer redirection over a RD user session.
(new in R2)
RD Connection Broker (New)
This component manages the session load balancing and session reconnection in a load-balanced remote desktop server farm. This includes both RDS and Virtual Machine (VDI) connections
(new in R2)
RD Virtualization (New)
This component allows users to connect to a virtual machine vs. a RDS published desktop.


February 13, 2009  6:16 PM

Overheard – Raw data now!

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Raw data now! Raw data now! Raw data now!

Tim Berners-Lee, getting the crowd to chant at the 2009 TED conference

Founder of the web Tim Berners-Lee spoke of the next grassroots communication movement he wants to start: linked data. Much in the way his development of the web stemmed out of the frustrations of brilliant people working in silos, he is frustrated that the data of the world is shut apart in offline databases.


February 11, 2009  4:28 PM

Overheard – CIO as Chief Process Officer and Cheaper by the Dozen

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
A good rule of thumb—it’s not always doable—is try to implement new processes without technology, and afterward bring in technology to boost them rather than make them dependent on technology out of the box.

Mike Hammer, as quoted in CIO as Chief Process Officer, Not Strategic Leader

I was sad to see that Mike Hammer passed away. I’d just been reading through Peter Hinssen‘s new book IT/Fusion and had looked up Mike again to see how he pictured the role of the CIO changing. Not surprisingly, he and Peter seem to be in agreement.  Because the CIO runs IT and IT crosses all the business silos, the CIO is in the perfect position to see the big picture and improve business processes.

Now mind you, my whole perspective for thinking about business processes comes from listening to my grandmother read me “Cheaper by the Dozen” when I was a little kid.  (I’m talking about the original book, which believe me, has nothing to do with the Steve Martin movie.)  In the book, the father was a time management expert.  He practiced his profession at home too. For instance, while his children brushed their teeth, they listened to how-to-speak-a-foreign-language records so they were learning something useful while they brushed.  (I loved that part.)

It wasn’t until I was in college that I learned the father (and author of the book) was Frank B. Gilbreth! Gilbreth was an expert in what became known as Time Motion Study and he practiced exactly what Mike Hammer preached.  He looked at a business process that needed improvement, proposed how it could be improved and THEN looked at technology could help.  The technology that Gilbreth chose back in the early 1900′s was the brand new motion picture camera.

I think I’m going to back and read more about Frank and Lillian Gilbreth.  I bet there will be some interesting analogies for how to improve business processes in this century by looking at how Gilbreth approached improving manual work processes back in the early 1900′s.


February 10, 2009  2:54 PM

Overheard – FCC regulations for “Identity Theft Red Flags”

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
As institutions embrace automated services such as self-service password reset for purposes of reducing costs and boosting efficiency, these services are being targeted by attackers for the relative ease with which they can be used to gain access to registered accounts.

Thomas Varghese, Addressing Red Flags compliance

The Federal Trade Commission (FTC) has instituted new regulations known as “Identity Theft Red Flags” that promise to mitigate the havoc posed by identity theft to financial institutions and their customers. Effective May 1, 2009, these new regulations require financial institutions and creditors with covered accounts to implement programs that detect, prevent, and mitigate instances of identity theft.

Under the rules, entities must develop a written program that identifies and detects the relevant warning signs – or “red flags” – of identity theft. The FTC has issued guidelines that identify 26 different red flags to assist in designing identity theft prevention programs. These red flags are not a checklist, rather examples that financial institutions and creditors can model as a reference.


February 9, 2009  3:10 PM

Overheard – Improving iPhone reception in your house

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
AT&T may be working to improve its cellular network reception by building a femtocell, an in-home cell base station, directly into its fiber-optic U-Verse service’s modem.

Glenn Fleishman, AT&T might insert femtocell into fiber modem

Don’t tell my husband, but I’m about to write something…err…negative about his beloved iPhone. You see, in the house, it’s a brick. A lovely, sleek brick, but it’s still a brick. If he wants to make a call when it’s minus 10 degrees, he either has to put on his coat and go out on the deck or use an AT&T calling card.

When he first realized the iPhone wasn’t an indoor phone, he wanted to pick up VoIP from our cable company, but really — how can you justify the cost of iPhone service AND VoIP when our local phone company only charges $7.98 a month for local service? I couldn’t.

Bless you AT&T. A femtocell for ALL our AT&T cell phones is just what we need.


February 6, 2009  12:55 PM

Overheard – Avoiding common audit pitfalls

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“Make no mistake — auditors will find fault with your systems, your processes, and the people who operate them. They’re auditors. It’s their job.”

Kelly Jackson Higgins, Experts share tips on how to avoid the most common pitfalls in an audit

If you missed Kelly’s article when it first came out, take moment and read through it.  I bet you’ll learn something.

Key points I want to remember:

  • Two of their most common reasons for failing an audit are poor documentation and poor training programs.
  • It’s all about proving that data isn’t tampered with — from inside or out.

- Manage change in a consistent manner.
- Clearly define roles and permissions.
- Know who (and where) users are, what role they play and what permissions they have.
- Align physical security with IT security.
- Be ready to demonstrate how you monitor security.
- Be ready to demonstrate how you are able to detect and act on anomalies.
- Map security processes to business processes. A checklist isn’t enough.


February 5, 2009  4:14 PM

Overheard – How a windshield becomes an attack vector

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
An enterprising group of criminals has been using a real-world scam in an effort to spread malware. The attacks reportedly began with a series of phony parking tickets issued in Grand Rapids, North Dakota. Individuals had the tickets placed under their windshields along with instructions to visit a website.

Shaun Nichols, ‘Parking ticket’ scam brings malware infection

Of course, the website was a malware drop.  Lenny Zeltser (SANS Institute) explains how the scam worked. Later on, McAfee’s Avert Labs Blog identified the Trojan as Vundo.

Remember the good old days when phishing stayed on the Internet where it belonged?


February 4, 2009  4:11 PM

Overheard – The power of ping

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
posey Ping is probably the simplest TCP/IP diagnostic utility ever created, but the information that it can provide you with is invaluable. Simply put, ping tells you whether or not your workstation can communicate with another machine.

Brien M. Posey, Using ping command for troubleshooting Windows network connectivity


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: