Saturday, June 28, 2008

My Brush with Greatness today.

Great morning in Kalamazoo, and perfect for playing tennis or getting a tennis lesson from one of the best. Les my neighbor has been a tennis player all his life, at 72 with both knees replaced, the mileage he has had on the courts show through clearly.

So it came to be that we set off in his Prius down Oakland Ave, to the K college campus where 50 odd years ago he had a part time job as the night watchman for these wonderful tennis courts and learned to play the game and kept playing all his life.



We first took a tour of the campus and then settled down to the far courts. Les walked me through the warm up routine, where you touch the intersection of all the white lines, running forward and backward along all the lines. We then settled down to holding the racket. I learned how to hold the racket for the forehand and backhand strokes and about the two types of follow through for the serve.

These courts have seen most of the great players, as you can see from the list of winners here . So needless to say, after two hours I came away with a feeling of having brushed with greatness.

Les my neighbor by the way played Rod Laver and beat him in an exhibition match back in the 50's. So I was one degree removed from greatness today


Friday, June 27, 2008

TEDS Top 10, I dont agree with quite a few, but does not mean these are not good.

I think there are lot better talks that should have shown up on the list, but we are people and we get wowed and when we get wowed, we flok and rackup pageviews. Hope we dont elect our president that way. If we do, it will be a 180 degree shift. The last guy we elected was on fear factor and this time?

Top 10 TEDTalks of all time

1. Jill Bolte Taylor: "My stroke of insight"
2. Jeff Han: "Touchscreen demo foreshadows the iPhone"
3. David Gallo: "Underwater astonishments"
4. Blaise Aguera y Arcas: "Jaw-dropping Photosynth demo"
5. Arthur Benjamin: "Lightning calculation and other 'Mathemagic'"
6. Sir Ken Robinson: "Do schools kill creativity?"
7. Hans Rosling: "The best stats you've ever seen"
8. Tony Robbins: "Why we do what we do, and how we can do it better"
9. Al Gore: "15 ways to avert a climate crisis"
10. Johnny Lee: "Creating tech marvels out of a $40 Wii Remote"

Tuesday, June 24, 2008

on George Carlin and Vuja De.

Full article here:

We all know déjà vu—looking at an unfamiliar situation and feeling
like you’ve been there before. But what's valuable to innovation is
vuja dé—looking at a familiar situation with fresh eyes, as if you’ve
never seen it before, and with those fresh eyes developing a new line
of sight into the future.



Let's face it: Most companies in most industries have a kind of
tunnel vision. They chase the same opportunities that everyone else is
chasing, they miss the same opportunities that everyone else is
missing. It’s the companies that see a different game that win big. The
most important question for innovators today is: What do you see that
the competition doesn't see?


Om Malik sent this link out on twitter which is truly priceless for the the video of Carlin's standup.

http://station.newteevee.com/show/george-carlin/


Monday, June 23, 2008

Are you fit to join the club.

I noticed that the DSouza cousins group on facebook the otherday and saw a few familiar faces and names. I requested permission to join the group (as it is a restricted group), and received an email with two questions this morning.

1) Are you related
2) Are you cool

Since the email arrived this morning there has been a lot of mental chatter going on on how best to answer this. The first question, is a slam dunk, but the one on coolness, has me thrown for a loopty loop. Am I Cool?. Have I ever been Cool?. It should be a simple Yes or No, but why am I struggling with an answer?.

My 12 year old son is into being cool these days, and it manifests in many different ways. During the winter when there is a lot of snow on the ground, he would rather not wear snow pants because it would make him look less cool. He does not really mind being cold and wet in sub-zero tempratures.

Who decides on how cool one is?. I think I know the answer. Coolness should be the STATE of being where one is comfortable in any situation.

I am not, there fore, I will have to forgo joining the club for now!! Till then.........


Sunday, June 15, 2008

To Blog or Not to Blog

For a while now there has been the rumbling of Social Media and Social Networking. Last year we saw VzConnect (internal to Verizon) and indication form the pundits out there, is that Social Media/Networks is one of the top 4 technologies for the coming years.

Rachel Happe is an analyst from IDG and wrote this article, excerpt below (http://www.thesocialorganization.com/2008/06/executive-blogs-dont-need-to-be-difficult.html )

When I meet with executives I often ask if they blog and the answer is often no - followed by a variety of reasons, some valid, some questionable. But one thing is often true: blogging can take a lot of time. Some executives get around this by having someone in their communications group write their blog posts. Not really ideal and probably less than authentic.

Jeff Schick - IBM's VP of Social Computing - has come up with an ingenious solution. He blogs internally to his team but his posts are simply his daily schedule (most of it anyway) followed by a couple of lines about his impression of the meetings or the outcomes. This gets him out of the endless cycle of "What am I going to write about today" and gives his team some interesting reading.

I like this approach for two reasons: One - what a great tacit training tool. Ambitious employees who want to move up have a great way of seeing what an executive really does all day and of understanding what they might want to start paying attention to within the company. Two - large teams often rarely see their executives and have no idea what they are doing until they show up, ask some questions, and go away again. That can lead to a lot of speculation and even resentment if employees feel like they can't get the attention they need to solve problems. Jeff admitted that since he started publishing his schedule publicly he actually now gets sympathy from many people on his team. That sympathy helps a lot when you've got to turn around and ask the team to do something hard.

Wednesday, June 11, 2008

Current Security Trends for the Enterprise.

Recently there was an article by the Chief Security officer from Cisco. He basically is telling us to stop with the "Patching" and approach things differently. I got an opportunity to review a few articles by Garter, Forrester and a few other sources, Here is how the industry sees it:

What are the Biggest risks for Windows - Worms, Viruses or Social Engineering?. What should be the recommended approach for Vulnerability management?.


Introduction

Information collated in this post comes from Gartner, Forrester, Internet Searches for "Enterprise threats" and personal observation. Here is a Short answer to the question: If vulnerability/patch management is Operationalized (automated anti-virus and patching), Worms and Viruses will be contained to a great extent, which leaves Social engineering and threats from Within as the biggest risk.

Gartner identified 3 Key Issues on Infrastructure protection in a publication by Mark Nicolete in March 2008 [1 ]. While the paper does not specifically speak in terms of worms, viruses and social engineering threats, it does provide insight into what Enterprises should focus on. Operationalizing Vulnerability/Patch management while linking the effort with Compliance Projects (configuration management) such as SOX, HIPPA and PCI appear to rise to the top in the TAG cloud for this context.

Nearly Every day, new vulnerabilities are reported, but Microsoft and partner vendors patch most security holes before an actual attack occurs (A few years ago, a worm would propagate faster than the information about the worm, Not so today). The biggest risk to enterprises comes from targeted attacks, many of which are from insiders. In addition, phishing and identity theft attacks have caused the rise of "credentialed" attacks. Loss of sensitive data owing to lack of encryption on laptop computers and from Tape backup vendors is another source as we have seen recently. As attackers increasingly move "up the stack" to applications and users, signature-based solutions become increasingly ineffective. [2 ].

Security purchases were once driven by fear, especially antivirus and intrusion detection systems. Individual solutions were bought to solve individual problems. Now, purchases are more focused on the fulfillment of policy (SOX, HIPPA, PCI) and have a more-holistic view of the organization's security issues [3 ] . The primary driver of the North American SIEM (Security Information and Event Management ) market continues to be regulatory compliance. European SIEM deployments have been focused primarily on external threat monitoring, but compliance has recently emerged as a strong driver in Europe as well. More than 80% of current SIEM deployment projects are funded to close a compliance gap. Security organizations typically have funding for the technology because there is an audit gap, but there is also the realization that the technology should be deployed to improve responsiveness to an external attack and to improve the ability to sense an internal breach. Initial deployments of SIEM technology are focused on user activity and resource access monitoring for host systems, but real-time event management for network security remains a common requirement. [4 ].

From a Forrester survey of 252 Enterprises on what was driving Network upgrades, Security and Business continuity profiled as Number 1 and Number 3 drivers. Sarbanes-Oxley, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Personal Information Protection and Electronic Documents Act (PIPEDA), and various European Union (EU) directives are just a handful of regulatory pressures that have network managers scrambling to deploy better access control and data protection. Moreover, companies also need to make sure the network is able to resist common threats from viruses, worms, and other malicious code. [5 ].

Conclusion:

Are there any Windows Specific threats and mitigations to watch for?

What are the "biggest Software risks that a windows platform faces and what are the recommendations to mitigate these threats": Outlook (mail), IE (Browser) and IIS (Webserver) - are the worst offenders from a historical perspective. [6 <http://windowsitpro.com/articles/print.cfm?articleid=9084> ] . Mitigation of these threats can be accomplished by robust monitoring tools, monitoring logs for suspicious activity, services for availability, file systems and Registry for integrity and unauthorized changes, and network packets for suspicious traffic. Threats to the enterprise are evolving and changing over time. Our security policies should be reviewed often to make sure we are keeping pace with the new drivers. Configuration management which encompasses automated Vulnerabiltiy and patch management should be operationalized as far as possible, to free up valuable resources to combat the ever changing threats to the enterprise. If vulnerability/patch management is Operationalized (automated anti-virus and patching), Worms and Viruses will be contained, which leaves Social engineering and threats from Within as the biggest risk to focus on.

Saturday, June 07, 2008

Social Media Interaction: Four Buckets

Four Buckets

Skill+Cycles Bucket = Skycles Bucket
  • members of the community advertise their skills and cycles available
Need+Cycles Bucket = Nycles Bucket
  • members of the community advertise their needs
Solution+Cycles Bucket = Soycles Bucket
  • algorithm matches Needs to Skills and dump it into the solutions bucket
Happiness+Cycles Bucket = Happycles Bucket
  • Solutions bucket, every one is happy
A community can improve sustenance through Four Buckets.

Thursday, June 05, 2008

Smart folks leveraging Social Media networks for Upscale Customer Service

There are some smart folks out there leveraging social networks to provide customer service of a unique kind. The example I came across is a gentleman at Dell, who appears to be watching the social networks for any dell related questions and then finds you an answer, He also maintains a blog, that is actually a corporate blog with a personal brand. http://richardatdell.blogspot.com/

The other end of the spectrum, I needed some Server power consumption data. Most of my research using google and similar search tools, generated a lot of noise, but nothing precise. I posted a request on Twitter. I got an answer in about 20 min. Sort of a global IRC. How cool is that?.

Here is a pull model for customer service: Search for all the complaints against your company's brand, and on various social networks, compile it and try to find the answer. You will make a lot of customers happy. Your Sr. Management will be happier.

Update to this Story:
I am starting to pay more attention to this trend. I noticed verizon on facebook, so is ATT and few others.
http://www.facebook.com/verizon
http://www.facebook.com/pages/ATT/6114253084?ref=s
http://www.facebook.com/pages/Intel/8602499645?ref=s

Interstingly Verizon has 18000 fans while ATT and Intel are in the hundreds.

Smart folks leveraging Social Media networks for Upscale Customer Service

There are some smart folks out there leveraging social networks to provide customer service of a unique kind. The example I came across is a gentleman at Dell, who appears to be watching the social networks for any dell related questions and then finds you an answer, He also maintains a blog, that is actually a corporate blog with a personal brand. http://richardatdell.blogspot.com/

The other end of the spectrum, I needed some Server power consumption data. Most of my research using google and similar search tools, generated a lot of noise, but nothing precise. I posted a request on Twitter. I got an answer in about 20 min. Sort of a global IRC. How cool is that?.

Here is a pull model for customer service: Search for all the complaints against your company's brand, and on various social networks, compile it and try to find the answer. You will make a lot of customers happy. Your Sr. Management will be happier.

Sunday, June 01, 2008

IS 456 Class IX and X, The End

This is the last blog posting for this KM class!!

We had two lectures combined into one this week, owing to some logistical issues. So this will be the last lecture. The theme for today covered: BPM, Barriers of implementation, Metrics for KM and Culture
1) Business process modelling
We defined what a process is and leveraged Swim lane diagrams to model activities to root out inefficiencies. Validation should be automated to eliminate inefficiencies where possible. hand offs is an area that can be scrutinized to improve the process. Duplication of effort is an area of inefficiency by people or by machines. Work that can be done by machines, being done by people, like validation, is a good source of unnecessary effort. Any time task is done by more than one person is a good place to analyze for improvement. Finally always make the modelling diagram easy to understand.

2) Barriers of implementation

Managers overlook four common issues that concern employees."

  • Being known as an expert
    • A mechanism for encouraging/motivating knowledge sharing behavior
      • Track usage, contributions by employees
      • Collect statistics on which documents are accessed, and whether the document was perceived as relevant or useful.
      • Reward those employees whose documents are rated as most valuable.
    • Problems:
      • Being touted as the expert means more work. (?)
      • Being touted as the expert stifles one's career. (?)
  • Requisite knowledge too hard to capture and categorize
    • We've seen this before...
    • Problems/Raising the level of abstraction/The bottom line:
      • Does the cost of capturing insight outweigh the perceived benefits?
      • Can the contextual factors influencing the knowledge be captured?
      • Is a telephone or email address a better solution?
  • Lack of adequate communication and action
    • Are employees, by and large, leaders or followers?
    • Whom do they follow?
    • Problems:
      • Confusion about what the behavior is supposed to be
      • Negativity surrounding "appropriate" behavior
        • Again, what motivates people?
  • Forcing it
    • Now, imagine you are the senior manager.
    • The last point just said to lead, lead, lead.
    • This one says "Do not overmanage or micromanage".
    • What are you supposed to do, exactly?
    • Problems:
      • Is it as simple as 'hire good people, and get out of their way'?
      • Employees prefer their peers telling them to do something rather than a senior executive.

3) Metrics

4) Culture

Culture and Climate fall in the same category but are different. Climate is short term, like before a layoff or during a merger. Culture is long term and require multiple CEO's tenure to see a change.

Parting Shot: Dont waste your time trying to Change the Culture, it is a waste time!!!

No final parting shot is complete without the audience knowing what was learned int he 11 week process, so here goes:

Most of what I have learned in class falls under the following themes
  • Collaboration
    Knowledge management systems
    Personal Knowledge Management
    Problem solving and decision making in in organizations
    KM Technologies
    Knowledge elicitation - Organizational learning and knowledge transfer
The class also provided me better insight into social networking, blogging and microblogging, Problem solving, decision making, organizational learning and knowledge transfer.

The blogging exercise in class has the potential to help me hone my writing skills that will come in handy as I work on my PhD dissertation.

The Wiki collaboration tool, while cumbersome (sharepoint versus media wiki) provides insight into collaborative writing skills.

The best bang for the buck, I got from class is my exposure to twitter and related tools that let you follow conversations of selected genre. I have been able to gain a lot of insight into KM and related technologies by following conversations in twitter and friendfeed and Google Reader. I highly recommend, a feed based approach in augmenting ones reading on specific subjects and microblogging to follow current trends through conversations.

Adieu!! So long!! Farewell!!

TAGS