Are You Ready for the Global Mesh?
We are on the verge of a new world: a radically decentralized, more highly interconnected world. A global society that will fundamentally change your costs, efficiency, and reach, opening up a wealth of new opportunities for those who prepare for it; presenting a new set of challenges and pitfalls for those who don’t. Many institutions…
Read MoreDisruptive Technology: What SEO can teach the CEO
How vulnerable is your business to disruptive technology? I will bet you a Betamax videotape that you aren’t paying enough attention to this. And what you don’t know can hurt you. Let’s look at an example from my backyard: search engine optimization. Here is what life looked like if you tried to forge a 20-year…
Read MoreDisruptive Technology: Missing the Point
Here is a great article written by Bruce Schneier CTO, Resilient Systems, Inc. The content is intriguing but based upon what we’ve seen as past examples of how disruptive technology has emerged in the marketplace during the last 150 years, we know that his focus on the use of Government regulation managing privacy concerns is…
Read MoreReputation Management: The Decentralization of Trust
As the Rolling Stones once put in their song title, “You can’t always get what you want.” And this is true; especially when it comes to trusting what we see on social media. Consumers rely on business’ reputations and businesses in turn rely on reputation management. Reputation management has become the big buzzword in social…
Read MoreUnfinished Projects: What’s a CEO to Do?
We all have the neighbor, friend, or relative who has their kitchen floor torn up, their bathroom halfway remodeled, and a project car in their yard. I used to wonder why they held onto so many unfinished projects. One thing I noticed is that it never seemed to be about money. It would have taken…
Read MoreRisk and Fear of the Black Swan
If you are at the C-level in a business, you probably worry about the Black Swan event: an unforeseen catastrophe that changes everything. This is a risk that everyone is vulnerable to and very few have control over. I have seen this over the last few decades when working on business continuity plans (BCP) and disaster recovery…
Read MoreHow to Choose the Right IT Consulting Firm
Google the term “IT consulting firm” sometime and you will get a few hits… 222 million hits to be exact. Search more narrowly in most cities and you will uncover dozens to hundreds of players - everyone from lone wolves to divisions of the Big Four. The partner you choose will have a major impact…
Read MoreWeak Password Security: The Assassin’s Bullet
There is no greater threat than the assassin’s bullet. It is the slayer of kings. It cares not about your legacy or fortune. It is the great equalizer. It can change the destiny of men and countries. In information technology speech, the assassin’s bullet is a perfect metaphor for your administrator passwords. Your login and…
Read MoreYou, Hillary Clinton, and Email Security
Is your email secure? Or, put another way, if you were Hillary Clinton, would you be comfortable defending your email security at a Congressional hearing? Of course, the first thing you would probably say is that you have a secure, encrypted email. Let’s say that you have a lock. You give a key to one…
Read MoreSaving Private (Data) Ryan: Data Storage
Everyone has a friend or neighbor whose house is filled with countless items that are of unknown value, but are still of some vague importance to them. We are all guilty of keeping items that we’re not sure if they’ll ever be used…. But due to their unknown future value, we just can’t seem to…
Read More