Are You Ready for the Global Mesh?

We are on the verge of a new world: a radically decentralized, more highly interconnected world. A global society that will fundamentally change your costs, efficiency, and reach, opening up a wealth of new opportunities for those who prepare for it; presenting a new set of challenges and pitfalls for those who don’t. Many institutions…

Read More

Disruptive Technology: What SEO can teach the CEO

How vulnerable is your business to disruptive technology? I will bet you a Betamax videotape that you aren’t paying enough attention to this. And what you don’t know can hurt you. Let’s look at an example from my backyard: search engine optimization. Here is what life looked like if you tried to forge a 20-year…

Read More

Disruptive Technology: Missing the Point

Here is a great article written by Bruce Schneier CTO, Resilient Systems, Inc. The content is intriguing but based upon what we’ve seen as past examples of how disruptive technology has emerged in the marketplace during the last 150 years, we know that his focus on the use of Government regulation managing privacy concerns is…

Read More

Reputation Management: The Decentralization of Trust

As the Rolling Stones once put in their song title, “You can’t always get what you want.” And this is true; especially when it comes to trusting what we see on social media. Consumers rely on business’ reputations and businesses in turn rely on reputation management. Reputation management has become the big buzzword in social…

Read More

Unfinished Projects: What’s a CEO to Do?

We all have the neighbor, friend, or relative who has their kitchen floor torn up, their bathroom halfway remodeled, and a project car in their yard. I used to wonder why they held onto so many unfinished projects. One thing I noticed is that it never seemed to be about money. It would have taken…

Read More

Risk and Fear of the Black Swan

If you are at the C-level in a business, you probably worry about the Black Swan event: an unforeseen catastrophe that changes everything. This is a risk that everyone is vulnerable to and very few have control over. I have seen this over the last few decades when working on business continuity plans (BCP) and disaster recovery…

Read More

How to Choose the Right IT Consulting Firm

Google the term “IT consulting firm” sometime and you will get a few hits… 222 million hits to be exact. Search more narrowly in most cities and you will uncover dozens to hundreds of players - everyone from lone wolves to divisions of the Big Four. The partner you choose will have a major impact…

Read More

Weak Password Security: The Assassin’s Bullet

There is no greater threat than the assassin’s bullet. It is the slayer of kings. It cares not about your legacy or fortune. It is the great equalizer. It can change the destiny of men and countries. In information technology speech, the assassin’s bullet is a perfect metaphor for your administrator passwords. Your login and…

Read More

You, Hillary Clinton, and Email Security

Is your email secure? Or, put another way, if you were Hillary Clinton, would you be comfortable defending your email security at a Congressional hearing? Of course, the first thing you would probably say is that you have a secure, encrypted email. Let’s say that you have a lock. You give a key to one…

Read More

Saving Private (Data) Ryan: Data Storage

Everyone has a friend or neighbor whose house is filled with countless items that are of unknown value, but are still of some vague importance to them. We are all guilty of keeping items that we’re not sure if they’ll ever be used…. But due to their unknown future value, we just can’t seem to…

Read More