Category: Information Technology

Technology, the Good the Bad and the Ugly

Image

As someone who makes a living either by designing systems or complete data centers or managing or servicing same, I probably am more in tune with technology than the normal folk.  That is not bragging, it is simply stating facts.

The other day while I was in the super market, upon checking out there was two long lines, waiting to check out.  Employees could be seen wandering by, looking at the lines and then continuing on their way.  This was a major chain grocery store.

The longest line was for the automated kiosk.  As there were long lines of folks with overflowing carts at the one “regular” cashier I opted for the kiosk.

While I could go on about how we are loosing touch with our customers using things like kiosk, and lets face it the internet; kiosk in a grocery store are a mistake.  While waiting my turn to “check out” , there was one middle aged lady wondering around from kiosk to kiosk, as the red light on top of each one blinked on a few second apart.  That is not fair to the customer and certainly a terrible job for the lady.  I personally vote with my feet.

There are too many different items and some are not even in the system.  When the normal cashier has to obtain help, “price check” what do they expect us to do?  “They” don’t care.  They are saving the salaries of 4 employees, while getting you to do their work.

Other technology which is problematic is automated machines that call you.  It is bad enough to call a company and have to “listen closely to our menu as our menu items have changed.”  Weaving my way through automated machines or IVR’s, when I need customer service, just adds gasoline to the fire; and I install this stuff!

Now we have a constant stream of calls on a daily basis from an automated outgoing IVR trying to sell us something or “hold on for an important message!”  The only positive to this is; I don’t really feel so bad hanging up on a machine.  The problem with hanging up is that it simply puts your number back into the queue and calls you another time.

Technology replaces people, workers.  There is a glut of un-employed people in this country and there is a plethora of new technology taking their place.  While no businessman starts a business because he wants to employ people; employees are a necessary “evil,” or are they?

Technology also strips away our rights as citizens to expect some modicum of privacy.  From backscatter radiation machines at the airport removing your clothes, to the “no warrant needed” to be wire tapped by just about anyone that wants to.

Some graduating high school kids ask me what I thought they should major in.  I pointed them towards the medical field as I don’t see a kiosk doing this.  There are of course in the works ways to contact a doctor over “Skype” or other such network.  There is no telling what part of the world the call will go and as far as privacy, who knows.  How does a doctor from 3000 miles away palpate your abdomen?

Lastly, I want to touch briefly on Drones. I find it inconceivable that we can be watched in more places than ever before.  Cameras at every street corner with facial biometric ability to track whoever “they” want to is a little spooky.  Law enforcement with remote control drones that they can fly over any place that they deem of interest and “look” down as to the goings on, possibly in your back yard or through your window.

It is not just law enforcement that has these but private citizens have them as well.  Currently they are a bit pricey but as the technology becomes more accessible, the prices will come down enough so eventually the pimple faced kid next door will have the ability to fly a camera outside your window, or over your pool.

There are cameras on these drones that have such a high rate of magnification, they can see into your open window from blocks away and tell how many freckles you have on your bottom.  There are also FLIR “infrared” cameras that can see heat signatures so you are not even safe to skinny dip in the dark of night!

Google has already proven that you really have no right to expect privacy in your own back yard as the satellite views of neighborhoods and so forth have been littered with people nude sunbathing.

Military drones are equipped with technology that from 17,500 feet can tell what kind, and color of the clothes that you are wearing.  The drones for “use over the US,” are to be equipped with technology to tell if you are armed or, electronic surveillance of your cell phone.

If one wanted to get “off the grid” as it were, one would have to live like a caveman with no technology what so ever.  Maybe we should find the Sasquatch and find out how they do it.

We are an overly litigious society and perhaps this is one law suite that needs to be fought, if for no other reason than to shine the spot light on a situation that is quickly coming upon us and will get out of hand in no time.    I happen to believe that you do have a right to privacy in your home, your back yard, and if you own a lot of land, there too.  Law abiding citizens should not have to worry about this sort of thing.  I also happen to believe that any branch of law enforcement should be required to obtain a warrant before any type of wire tap, or flying some sort of camera over or around your property. We live in a new age and Orwell may have just missed it by thirty years.

-Best to you and those that you care about.

Big Red Button or Time to Panic!

Image

Nothing says “push me” like a big red button.  One of the office supply stores even created a big red button that says “EASY” on it, to advertise how they can simplify your work life.

One of the data centers that I was responsible for had such a button.  It was covered with a little plastic rectangular box that said “emergency shut off” on it.

I have been in many data centers during my career.  There were several that had a big red button by the door with it sole purpose to release the magnetic latch on the door, to open it.

Like any other location, security in a data center is paramount.  Not only are network security firewalls and such important but physical security as well.  Only those who needed access to the data center, could access it with their security card.  Not even the CEO had access as he did not need it.  Their entrance was logged and in fact throughout the building one could forensically track any employee’s movements as this card was necessary to gain access to just about anywhere.  With the technology available today, I could design such a better system, but that is beyond the scope of this document.

One day, a vendor was visiting with a proposed solution to a problem.  Like any other vendor, if access to the data center is required, they are escorted at all times by one of, if not more of my staff or me.  The data center was in the middle of a retrofit and redesign while keeping the company running in parallel.  (This is much like changing the tires on a race car while it is moving down the track.)  On their way out of the data center, just as quickly as anything, the sales guy in front reaches up to the left of the door pops the cover open and pushes the big red button!  By the time that the sound of “NO” had left my lips, there was an eerie quite in the room.

The chain of events that this action triggered, were phenomenal.  Lights went off, the air handling unit went off, the Battery back-ups clicked on and for the moment; it looked as though the carefully engineered back-up power supplies were working.  I should mention that the look on this guys face was priceless, and I am just about certain that he had to change his shorts afterwards.  It dawned on me that no one had tested this button, and nobody knew where all of the circuit breakers were; well almost no one.  As I was the one that specified the power requirements for this data center and oversaw the installation of the new transformer, I knew where the main breaker was.  Within moments I had most of the power back on however; there was one legacy system that was still not on main power.

In another closet in another part of the building were still more circuits for this room.  I did not have a key to this and getting building maintenance involved was time consuming as they typically think like union employees; (don’t care if the place is on fire, when it is time for a break, they take it.)  Before the UPS was totally drained for that system I had gained access to that closet and found one tripped breaker.

I had inherited a mess of a data center that was put together on a shoestring budget.  Not because the company could not afford to do it right, their boss was cheap beyond reason.  They had cut corners at every place they could, including splicing old type 3 wires to cat 5 wires and running 16mg token ring over it.  They could not understand why 5250 and 3270 traffic would constantly be garbled and why connections to the server would be dropped frequently.  When I say spliced, I literally mean wires twisted together and a wad of electrical tape stuffed in the wall and or ceiling.  (Another story)

It did not take me long to get that circuit changed over and documented with everything else.  I also got to check off the list “test emergency shut down.”

Moral of the story; if you have a big red button, find a time to test it.  Secondly make certain that the button is labeled in big white letters on a red sign etc EMERGENCY SHUT OFF!

I am a stickler for documentation, which IT personnel are loath to do.  A living document should exist within each and every company that explains the ins and outs of everything, so if need be, someone else can take over.  It is part of the audit process for a disaster recovery plan and is one of the deliverable s.

-Best to you and all those that you care about!

Scam of The Day!

Scam of the day!

Every day someone somewhere tries to embezzle money from someone.  If not some Nigerian trying to get your bank account number so they can give you free money, than someone somewhere through e-mail tries to get the unsuspecting, to click on a link that is not what they think it is.

Through the years I have received e-mails from all sorts of alleged government agencies telling me that I need to click here to resolve some complaint.

If you have a business like I do, and you have a website, you are more vulnerably because you are more visible.

As I have explained to people for years, the government would not contact you via e-mail.  Still I get computers in here that have been infected by someone clicking before thinking.

Today I got a rather unique e-mail from PayPal or so it would seem.

Looking at the e-mail notification one thing pops out at me immediately in that, it is flagged urgent.  PayPal does not flag things as urgent.  The perpetrator of this hoax wants to get my attention.  Secondly I have set up rules which automatically move certain e-mails from certain people. Upon receipt they are put into a specified folder arranged by who they are and where the e-mail is from.  This was my second clue that something was amiss, as this was in my Inbox, not in the folder where it should be.  So why didn’t the rule work, it was not from PayPal.

Looking at the e-mail itself, it looks fairly normal at first glance.  Notice it says that I sent $149 dollars for a watch to someone on eBay and that the shipping address is somewhere in New York.

I do purchase things on eBay, as do a lot of people, and it would not be unlike me to buy a watch for a $149.  Firstly, I did not buy a watch so now I am looking at this e-mail a little more closely and see that it is to be shipped to someone in New York!

Someone not paying too much attention to this would quickly see the link that offers you “dispute resolution” and then click upon it.  That is the gotcha and most likely the intent of this ruse. They want you to click on the link. Hovering over the link you will quickly notice that it does not go to PayPal or eBay.

Looking at the link, I really have no idea where it would take me or what it would do to my computer, if anything.  The trick here is not to be a victim of some nefarious person or people.  It may very well be a link to some website that tries to sell you something and they are driving traffic to it by disreputable means.  It could however be a link to some site which will infect your computer with some type of Trojan or malware or both.

One other trick that I will share with you is this.  As well as having good anti-virus software running and updated at all times, have a user account set up that does not allow administrative privileges on your machine.  Use that account for your normal daily computer use and only use the administrative account when adding or changing hardware and or software on your computer.  The virus and or malware may very well be limited to whatever rights that the user that got it, has.  If the user has no rights to modify the way a program behaves, the virus might be limited to those rights as well.

Remember that not all anti-virus software will protect you from all attempts to hijack your computer.   Not all viruses are created equally. The more sophisticated the virus, the more intelligence or (computer smarts) on the part of the user is necessary.

-Best to you and those that you care about!

Image

Which Anti Virus Software is the Best?

Selecting an anti virus software today is like trying to look at a watermelon in the store and telling how it is going to taste without opening it up. This is also the question that I get asked most frequently.

Not all software is the same and that holds true with the virus itself.

When I evaluate anti virus software I look for several things. Firstly what can I find in the way of reviews on the internet? Try to find independent reviews vs. going to their website.

Amazon frequently has reviews of products.

From a technical stand point I want to know what size footprint it has. When I say footprint I want to know how much of my available memory is it going to chew up and I want to know how much CPU is it going to use. There are several anti virus software’s out there that literally will stop you from using your machine while they scan, update etc. Ideally this type of software should run at a lower priority when you need the resources of your machine. To me there is nothing more frustrating than needing to check your e-mail and the anti virus software among other software takes over your machine for the first 30 minutes doing updates, scans and what have you.

Here is the biggie, will it catch everything?

Sadly there is no silver bullet. Some software makers have a lot of resources to pour into updates and research as well as the ability to quickly push out updates to their customers on an as needed basis. Software like Trend Micro has an easy way to upload suspicious files for them to analyze.

Another thing to look at with software is technical support. How much will you need, what do people say about their support and how much will it cost?

I have been in IT since before there were viruses. I fought the first virus which got out onto our network of several hundred employees through a shared file brought in by an employee on a floppy disk. I say that to set the stage for the different iterations of anti virus software out there. The first company on the scene was McAfee. PcTools was picked up by Symantic and over the last few years there have been many players enter into the game.

My personal favorite as of this moment is EsetNode32. That could change tomorrow as they may rest on their laurels or have a policy change of some sort which would affect the quality of their product. That is the same for all companies.

I see a lot of computers that have been infiltrated. While they all have some sort of protection, free software seems the most susceptible to attacks, MailWare and other forms of infections.

While free is better than none, I would certainly budget anti virus software into my computer needs.

TIP: Go to the store and purchase it in the box vs. getting it online. Do this even for the renewal. One can almost always find it on sale going to the office supply store or even Wal-Mart. Purchasing it online usually involves a third party which makes money off of the sale as well. You pay a price for convenience and it could be as much as 100% more than you would pay in the store. In the below URL’s you can gain quick access to the different brands that I am personally familiar with. Several ranking sites will rank these differently so do your research and roll the dice.

This blog in no way constitutes any type or warrantee or guarantee of usability or protection against the hackers either expressed or implied. While I have had good fortune with Eset, your mileage may vary and I will be held harmless, in the event that your results are not what mine have been.

What you do on the internet and who sends you e-mail may put your computer in less risk or more risk than me. There are independent labs out there that evaluate different software so you might search them out as well. The trick is make sure that they are independent and do not have any dog in the fight. The problem there however is obvious; if they don’t have a dog in the fight, why do the work and give it away? Do your own research. Consumer reports frequently look at this topic as well.

http://www.eset.com/us/

http://shop.trendmicro.com/brand/SB/?cm_mmc=Paid+Search:US-_-Consumer:Brand-_-Google:TrendMicroExact-_-KW=trend+micro&SQ=trend+micro

http://www.bitdefender.com

http://norton.symantec.com/norton/ps/3up_us_en_navnis360_sym_ent.html?om_sem_cid=hho_sem_sy:us:ggs:sy:e|kw0000006084|10257754940&country=US

http://promos.mcafee.com/offer.aspx?id=469920&affid=792&eid=covmcaggl89400000194617s&adid=17846076983&s_kwcid=TC|16933|mcafee||S|e|17846076983

http://usa.kaspersky.com/?domain=kaspersky.com

http://free.avg.com/us-en/homepage

http://www.avast.com/en-us/index

-Best and Happy Computing

Information Technology then and now

Information Technology then and now.

Having started in this industry when IBM Selectrics were the only game in town, I have seen many things come to pass.  I have witnessed the end of Greg Shorthand to dictating equipment to word processors and finally executives typing out their own letters and e-mails.

Back not so long ago an executive would dictate a letter to a secretary who would go type it up and return it to his inbox for his approval.  During this process he would change something and she would once again type it up and return it to his inbox.  This process could take the entire day to generate one letter.

The dictation machine came about; and the secretary with Greg shorthand know how, turned into a secretarial pool where somewhere in a smoke-filled room several typists, typed letters and submitted them in similar fashion.  The letter would be accompanied by the tape or in the early days a “dictabelt” or even a wax cylinder.

In the late 70s the word processor came about in the form of a typewriter that could save the keystrokes to a magnetic card.  When the letter came back for revisions the card would be placed into the slot on this huge box that sat on the floor next to the typewriter and the typist would hit “play” and the typewriter would come to life regurgitating the keystrokes until she got to the part that needed to be changed.

It wasn’t too long after that the true word processor was born in that there was a green screen and one typed much like I am doing now.  Editing was not near as simple as this, but it was a huge step up from the manual typewriter.

Before Bill Gates and Steve Job were household names, Xerox, IBM, and Burroughs, not to forget Unisys, Pitney Bows, and Wang, were the big boys.

No one expected that college kids in a garage with a rudimentary understanding of business would revolutionize the world with what we have today.

I met Steve Jobs while working for a company that had one of his creations for computers.  The NEXT computer which was a UNIX based computer that had a GUI that was semi user-friendly. The cases to these computers for whatever reason were crafted from magnesium and shaped like a pizza box or a Borg Cube however; the wiring of them regarding the keyboard and mouse are very similar to what apple is today.  Little did I appreciate at the time the man who started out his career as a techno-criminal by phone freaking, would be responsible for my Smartphone and my beloved iPad. For this alone I am eternally grateful.

As technology is an ever changing target the personnel also have to be malleable and willing to learn, grow and in some cases leave.

After I placed a pc on one secretaries desk and after she had been to training I walked by her one day to see her making a spreadsheet with a ruler and paper.  The PC and Lotus and the secretary were not working well together.

Technology is one part of the equation when it comes to business.  Finding and keeping the proper people is a challenge that can make any CEO’s head spin.

Through the years a niche market evolved from the early days of Novell.  Novell was one of the leading networking companies long before Bill Gates came up with a server OS.  I have worked with their products since ver 1.X.

Novell made a good name for itself early on.  They came up with the idea to “certify” hardware for their product.  The manufacturers of hardware would submit their hardware to Novell and pay them to evaluate their hardware and then put the “Novell stamp of approval” on it, which of course drove the price of their equipment up and made their equipment more in demand.

It wasn’t long after that, they came up with the idea of “certifying” people.  This certification process begat a whole new industry across the entire technological spectrum; the training and testing and certifying of people.

The problems with this are many, and the industry is fraught with deception.  Many people can take a test but cannot physically do the job.  Technology is forever changing which requires ongoing certification classes or CEC.  The cost is very high and the certification may be short-lived.

It did not take me long as I started making my way through the classes and certification process to figure out that this was simply a way for Novell and others to make yet more money.  In fact today there are certifications for damned near anything and everything.  The industry standard as a whole is some sort of certification.

While this may give a hiring manager some quantitative measuring stick to know if John Doe is who he wants to hire as a technologist; myself as a hiring manager, I can tell you that certifications were the last thing that I looked at.  As I worked my way up from the lowly support person to Director Level, I could and can speak intelligently about technology and I can tell if someone is full of….well crap.

The classes and certifications are so expensive that very few people will invest their own money to get them.  That means that some company paid for them.  Again as technology changes the weight of their certification looses validity much like a new car looses value, once you drive it off the showroom floor or in the case of technology, the next day.

Years ago I interviewed for company for a project management position.  I could talk about projects and milestones and task and deliverables all day long; without that certification this guy was not interested. My guess is that he had no idea what a project manager was and the certification was the thing that would do his job for him.  Keep in mind that I had been doing this before there was a class and the PMP certification did not exists.  I could in fact write a book on it.  I was doing this before Microsoft ever thought of MS Project.

When I hired project managers I would ask them to tell me about a project that they had done and I would look for certain details.  The certification was superfluous to me.  Can they do the job? Can they tell me how they can tell  the health of their project. Can they articulate themselves well, verbally as well as in writing? Do they work well with others?

Personnel can make or break a company.  As a troubleshooter not only do I have to determine if the technology is the right fit for the business but, I often have to figure out if this person is the best fit for this position at that company. The problems are indicative of the industry.  As the technology increases or evolves the personnel must change with it, and in fact embrace change because that is what this industry is, “change”.   Information technology is a very fluid dynamic field.  Unlike history or geology, computer science changes with the next program or hardware modification.

One of the issues that I see often is that the higher up the food chain, the more the person in that position does not fit.  When one gets up into the management area where titles are involved, the duties and responsibilities seem blurred.  When there is a failure, the high up individual always seems to have a way to have a subordinate fall on their sword rather than owning up to the fact the he or she is at fault and may need training, be repositioned within the organization or retire.  I knew this as the “Peter Principle.” Simply stated, as one stays within a company long enough he or she is promoted to a place where they can no longer function, as their skill set or intelligence is lacking.

One way to flesh this out is to insist on a root cause analysis of the failure.  Truthfully this should be done every time that there is a failure so future failures can be avoided.  Obtaining clients is an uphill battle, loosing them over an unnecessary screw up is simply not acceptable.

Too seldom will one ever see a CIO take responsibility for his lack of knowledge or forethought as his own ego will not permit him or her admit that, they may be the problem.

Teaching people to own their mess ups is something that we have lost with this new generation of kids coming fresh out of college and expecting a corner office.

I have worked for many CIO’s that were more interested in the bottom line than their job.  My guess is that their boss had incented them to save money so their actions were predicated on not what is best for the company necessarily but what do I have to do to meet my budget or come in under; so I get my bonus.  This is often done at the expense of the company and or personnel.  So in that light, I have decided to define what a CIO is.  See how closely this matches how you define your CIO or if you are one, does this fit?

One of the CIO’s that I know about did not even have a computer at home and when PDA’s were making the scene and everyone had one, he still used a pocket notebook.  This man was the very personification of Scrooge and had no business in that position, but like his boss they were both cheap to a fault and would look for ways to save a dime while costing the company thousands of dollars in lost productivity.  Why, lost productivity is not quantifiable if they never recognized it in the first place.  If on the other hand they had it and one removed it, than they would understand; much like cutting the internet off after they had incorporated it into their business model. This is a serious lack of vision.

So here is my definition of what a CIO is.

A Chief Information Officer (CIO) is responsible for providing the leadership, management and strategic technological direction that will enable the company to achieve its business objectives in a competitive environment. The CIO drives technology enabled innovation to improve the company’s performance and competitive advantage. The CIO champions innovation initiatives through a demonstrated ability to creatively apply emerging technologies to mature business processes in order to improve business performance. The CIO must strengthen the company’s core enterprise technological capabilities and leverage the expertise of third party suppliers and partners. The CIO should work closely with customers, partners, colleagues and other stakeholders to identify and maximize innovative opportunities to use technology to improve business processes and optimize performance.

While having a keen understanding of the business, the CIO should be able to sell his or her ideas to the board of directors, CEO and CFO explaining what the ROI is as well as the TCO.

In short the CIO must be a well-informed technologist with a good understanding of the business model as well as others in that industry and must be plugged into what is current and emerging in the market place to know when and what to explore.

In 30 years of Information Technology I have known one such person.  The rest were neither capable nor qualified to be where they were, they simply had good people around them or they were there because they knew someone.  While there is something to be said for surrounding yourself with people smarter than you are, the sad truth is if they are doing your job, than they are not doing theirs.

We live in an ever evolving world where technology is involved.  There is a term called LOAR.  LOAR stands for Law of Accelerated Returns.  Technology does not evolve linearly; in fact it evolves logarithmically meaning that it builds upon itself.  In the early 80’s we had a CPU that ran at 4.7 MHz and now 33 short years later we have laptops with multiple core CPU’s running 3 or more Gigahertz or GHz!  The technology in our smart phone is far superior to all of the technology that went to the moon in the 60’s!  In a few years your computer or smart phone may guess what you want to look up or what you want to do and start the process before you tell it to.  Advances in the next few years will be amazing and frightening at the same time; there is no going back.  Much like Pandora, once the box is opened we deal with what comes out.

One of the things that I happen to be very good at is going into a company which is having some sort of issues and fixing it.

As a troubleshooter, I often have to go into a company and look at how they are doing business.  What is their infrastructure like?  Were best practice standards followed then and now?  Is there a living document that defines all that is? Has someone like a programmer, been promoted into some management role when they have little or no management expertise?  (That is a common one)  What does your disaster recovery plan look like?  When was it last tested?

This is a very small example of the things that I look for.  When my deliverable (report) is examined by the principles of the company there is often to borrow a term from Bush II “shock and aw”.

Few CEO’s have any idea how tenuous a foundation that their data center is built on. Why, because they trust their CIO and ignorance is bliss.  Even the most astute CIO should have his data center, processes and procedures, looked over by an outside entity that has no dog in the fight.  An outside firm simply looks at what you are doing, how and why and balances that against best practice techniques.  These things often turn up in disaster recovery exercises which turn out to be a lot of ad-hoc work.  The company is better for it and it gives them some metric to measure their staff against.

While the word “Audit” dredges up some scary moments and thoughts the CEO should demand it!

The odds are good that the CEO and above consider information technology a necessary evil.  While it is most likely a cost center, the principles of the company would be wise to understand that without it for three days, the company may very well cease to exist! The marriage of technology and business is here to stay.  While the romanticized idea of a young pretty secretary taking short hand has some appeal, those days like the typewriter are gone.  With the evolution of sexual harassment rules and the overly litigious nature of things today, this is probably not a bad thing.   CEO’s should look at technology and those who maintain it as partners, because they are.

-Best