Articles

Technology management insights and technical deep-dives

Google Data Integration: Could It Drive PIDM Adoption?

January 26, 2012 at 12:00 AM

Interesting article from Forbes on Google’s privacy announcement and how it will drive the Personal Identity Management industry.

http://www.forbes.com/sites/forrester/2012/01/26/google-data-integration-could-it-drive-pidm-adoption/

Personal Identity Management (PIDM), is heating up because of three factors:

  • The formation of large online networks that collect data about consumers (Google, Facebook, Zynga)
  • Web 2.0 technologies and trends to be open platforms creating access to that data
  • Increased consumer and government awareness of privacy issues

Picture a Personal Identity Management solution as a dashboard that shows you what these big networks know about you and enable you to update or edit it where the policies allow it.

Read More...

Permanent Link — Posted in Social Media , Technology Management , Entrepreneurial

Human Nature and Managing Technology Teams

September 9, 2011 at 12:00 AM

Managing technology groups can be especially challenging. I attribute this to the way that technology attracts personality types that aren’t as common in traditional business roles. Specifically I am talking about the type of people that founded and continue to support the stereotypes of the technologist - the introverted, over-calm, over-ego’ed nerds and geeks.

Darwin’s Theory of Human Behavior suggests that we are all motivated by four drives: to acquire, to defend what we have acquired, to understand/comprehend the world around us, and to bond socially.

Read More...

Permanent Link — Posted in Technology Management

Cloud Architecture Best Practices

August 31, 2011 at 12:00 AM

“Plan for failure” is not a new mantra when it comes to information technology. Evaluating the worst case scenario is part of defining system requirements in many organizations. The mistake that many are making when they start to implement cloud is that they don’t re-evaluate their existing architecture and the economics around redundancy.

All organizations make trade-offs between cost and risk. Having truly fully redundant architecture at all levels of the system is usually seen as unduly expensive. Big areas of exposure like databases and connectivity get addressed but some risk is usually accepted.

Read More...

Permanent Link — Posted in Cloud Computing

Disable Akonadi in KDE 4.7

August 22, 2011 at 12:00 AM

In recent KDE updates, the PIM suite (kmail, kontact) is …uh… not really working for me. I don’t know if it is truly broken or just requires a different approach and understanding.

This has me temporarily using Thunderbird for mail until I can get back to using my beloved kmail. Unfortunately, Akonadi, the engine behind the PIM suite, still insists on going out and fetching mail and doing other things.

Read More...

Permanent Link — Posted in Arch Linux

Understanding Cloud Computing Vulnerabilities

August 19, 2011 at 12:00 AM

Discussions about cloud computing security often fail to distinguish general issues from cloud-specific issues.

Here is a great overview from Security & Privacy IEEE magazine of common IT vulnerabilities and how they are impacted by the new cloud paradigm.

The article starts off defining vulnerability in general and then goes on to establish the vulnerabilities that are inherent in cloud computing models.

It really boils down to access:

Of all these IAAA vulnerabilities, in the experi­ence of cloud service providers, currently, authentica­tion issues are the primary vulnerability that puts user data in cloud services at risk

Read More...

Permanent Link — Posted in Cloud Computing , Security

How The Cloud Changes Disaster Recovery

July 26, 2011 at 12:00 AM

Chart of recovery time vs. cost

Data Center Knowledge has posted a great article illuminating the effect that cloud computing is having on the economics of disaster recovery (DR) for information technology. Having fast DR used to mean adding a large considerable expense to your IT budget in order to “duplicate” what you have.

Using cloud technologies not only is this less expensive, but is a great first step towards transitioning IT infrastructure into the cloud paradigm.

Read More...

Permanent Link — Posted in Cloud Computing