Tuesday, December 26, 2006

The Ghost of Christmas Future

NEWS: Mark Hurd, CEO of Hewlett Packard, appeared in the NY Times as the ghost of Christmas future. He predicted that “managed home” products, which blur the line between PCs and consumer electronics, will be the coming thing. HP is currently number one in PC sales, so Mr. Hurd's vision of the future must be taken seriously.

HP has three new products that, according to HP, are designed to capitalize on Mr. Hurd's vision.
  1. The Media Smart TV is an LCD TV that “pulls in” content stored on networked devices. It is priced at a $1,000 premium over comparable HP LCD TVs. See the CNET review.
  2. The Media Vault is a network attached storage device positioned/marketed to store music, movies, photos and more. (It is comparable technically to the $200 Western Digital device I recently recommended here). See the CNET review.
  3. The iPaq Travel Companion is a Windows Mobile PDA. It has a 3.5-inch, QVGA touch screen with 240x320 pixel resolution. It also has onboard WiFi for internet access and GPS for navigation. It is designed to provide information and entertainment to travelers. See the CNET review.

ANALYSIS: According to Mr. Hurd, “Consumers keep telling us they want something that is insanely simple.” He believes the new Media Smart TV to be “insanely simple.”

IMHO, smart and simple are a contradiction in terms. Besides, I certainly don’t expect to pay $1,000 more for an insanely simple TV. Since most of the TV I watch comes through the signal decoder box, the DVR or the DVD player, all I really need is a monitor. That is my definition of an insanely simple TV.

Network attached storage devices have been around for years. Price per unit of storage has plunged to the point where homeowners can afford to have them and should have them for a host of reasons. Prices will continue to fall dramatically over the foreseeable future. It is hard for me to imagine that the Media Vault will be a big deal for HP.

The idea of combining entertainment and navigation in one device for travelers is the “inspiration” for the iPaq Travel Companion. This might be attractive to people who have to drive a lot. But the communications capabilities of this device are limited. Business travelers will want to be sure to pack a Blackberry and cell phone in addition to this device. Or a Blackberry, cell phone and an iPod instead.

HP is right that managed home products are the coming thing (see this). However, these three products are non-starters. As the NY Times says, “The problem for Hewlett-Packard is that to keep pace with market changes, the company that Mr. Hurd describes as “the world’s leading I.T. infrastructure company” may have to recast the PC part of itself as a consumer electronics company like Sony, Samsung or that other computer maker that has made the shift, Apple. And that will not be easy.”

Tuesday, December 19, 2006

IT Best Practices

This is the text of a speech I delivered at the National Intitutes of Health in Bethesda, Maryland.

Ladies and gentlemen, today I speak to you in your capacity as employees of different branches of NIH, doing a wide variety of different jobs. As such, you are collectively responsible for hundreds of millions of dollars of information technology expenditures each year.

In the course of your work, you help directly and indirectly to shape the IT landscape in this country and in the world. For instance, this place is ground zero for bioinformatics. Tell that to your kids next time they mock your efforts to do something on your home computer or navigate the web.

It is a little scary, isn’t it? What if people find out? Remember the flak that George Bush Sr. got for never having seen a supermarket scanner?

The truth is you don’t have to be an expert in IT to fulfill your role as a gatekeeper in Information Technology. Follow my advice and you’ll do it right every time, and “Best Practices” are the key. That is the term for the body of knowledge, developed through trial and error, that represents the current consensus on the best way to do specific things. Your job, then is not to know IT, it is to identify the best practices that apply and implement them. If you do so, things are likely to go right, and it will be difficult to fault you if they go wrong.

For example, the best practice for adding RAM to your home computer is to ask your teenager to do it.

Generally speaking, best practices should always begin with one particular step, and that is “Plan Carefully.” Information technologies can be very complex and involve many people with varying needs. Decision making is very complex. At the outset of any project remember the words of Aristotle, “Well begun is half done.”

In addition to planning, accountability is also essential. You cannot manage what you cannot measure. You don’t want the hardware guy to be able to say it’s a software problem, and the software guy to be able to say it’s a hardware problem. Then you are left holding the bag.

Another rule is don’t cut corners on quality assurance and testing. It will cost you $10 to fix a problem after it has been deployed for every $1 to catch it and fix it in development and testing.

Best Practices are all you need to know to succeed. Then, if you are smart, you will get somebody to help you. Somebody like me who knows and believes in Best Practices.

The first thing I will do for you is a SCAN. That is a Standardized, Collaborative Assessment of Needs. It is a systematic, needs based approach to planning. Build to the state of the need, not the state of the art. Too often people build to the state of the art and find themselves on the “bleeding edge,” struggling with expensive and buggy software.

We survey people and interview executives across the enterprise to identify users and assess their needs. We tabulate our findings, identify solutions, formulate recommendations that embody best practices, build a working prototype, and present our findings, recommendations and prototype. Along the way, we facilitate communication across the enterprise and build consensus around the proposed solutions.

We recently were hired by a client to do a SCAN for them. We recommended that they reengineer one of their core business processes, taking it from a manual, ad hoc, poor quality, labor intensive, expensive system to an electronic database with a browser interface for data entry and reporting over the internet. They were very happy with the report. And they contracted with us to do the development and implementation of the system.

Like it or not, you are leaders in IT, gatekeepers on the Information Super-highway. Make best practices your guiding star, and you will succeed. If I can be of further assistance to any of you, please let me know.

I Recommend a $200 Computer!?

I was skeptical. I’ve been burned before buying cheap hardware. Either it ends up being a piece of crap or the vendor is planning to make its money on supplies (think ink jet printers). Sometimes a really low price is just the lure in a bait-and-switch operation.

I’ve learned the hard way not to go cheap on computers. The cost of a system failure is MUCH higher than the premium you’ll pay for a good machine that is reliable. Quality pays!

Western Digital, a leading manufacturer of disk drives known for quality, has introduced a line of low-cost computers called network attached storage (NAS) servers. The line offers internal disk capacities of 160 GB, 250 GB, 320 GB or 500 GB. Prices range from about $170 to $300 (prices vary widely across retailers).

These are specialized computers, designed to function only as file servers. They are promoted as “an excellent solution for data backup or general storage in small networks.” These computers run Linux, not Microsoft Windows. They do not come with a keyboard, mouse and monitor. Customers set up and administered these devices from a networked PC using a web browser.

With knowledge of Linux, it is possible to hack these devices and repurpose them. If you knew what you were doing, you could make one into an MP3 player, or you could link a bunch of them together and make a super computer. But don’t bother. Data backup and general storage are important, necessary and valuable purposes for most small networks. With these devices, there is NO EXCUSE for not having automated online backups of your valuable data. There is no reason not to store disk images of your PC hard drives to help you recover to the “base configuration” quickly and easily from PC failures. No more having to spend hours reloading the base applications (where are those disks?)!

In short, if you have a small network at home or at work, this should be your next computer. It will be a little bit of money well spent. BTW, to do backups and disk images of your network Windows PCs, you’ll need a copy of Norton Ghost too for about $50.

Friday, December 15, 2006

Five Ways to Avoid SPAM

What has happened to email? The sea of messages that is email has become badly polluted! According to TechNewsWorld, “nearly every e-mail consumers receive -- some 86 percent -- is considered SPAM.”
What can we do about the problem? Email is too important to surrender it to the usurers, the pornographers, the drug pushers, and other assorted moneygrubbers.

In its broadest definition, SPAM is unwanted email. But SPAM, like ugly, is in the eye of the beholder. If I get a message titled, “Check out these naked pictures of me,” unless I look, I won’t know if the pictures are ugly. And what I find ugly, my neighbor may think is the prettiest thing he’s ever seen.

SPAM filters are at work in some places. They scan incoming emails for certain words, and they trash the messages that contain those words. The trouble is that SPAMers are creative. You’ve seen a lot of creative ways to spell Viagra, haven’t you? That’s because the SPAMers have figured out one way to get past your spam filter for the time being. With each new spelling of Viagra, Vicodin, and assorted male and female body parts; highly educated, highly paid computer professionals across the country have to type creative misspellings of narcotics and vulgar words into their SPAM filters. That’s not why I went to graduate school.

Filtering is an imperfect solution at best - witness Poor Dick French and his associates at the Chicken Council. Chickens have breasts, eggs are laid and cockfighting is an issue on their agenda. Words like these are their stock-in-trade. How many emails do they send out that get trapped by SPAM filters and never reach their intended destinations? Dick’s friends all think he’s putting on airs because he’s started signing his messages Richard.

I know how to fix the problem of SPAM. I can help you lose weight, quit smoking, and cure baldness, too. Just kidding. All I really have is five suggestions to alleviate the problem.
  1. Don’t give out your email address. Disguise it in the return address field of the messages you send.
  2. Change your email address regularly.
  3. If you have to give someone your email address, make one up.
  4. Never try to “opt-out” if you have somehow gotten on to a SPAM mailing list. SPAMers know that 99.9% of people don’t want their messages. If you opt out, that tells them that yours is a valid email address and you are stupid enough to read their messages, and you are gullible enough to think they are going to take you off their list. You just won a lifetime supply of SPAM!
  5. Whenever you purchase something online, they usually ask for your email address and they have one or more boxes that you have to select or deselect to avoid receiving “special messages of special interest to you” from them and “specially selected partners.” If you want to exercise a small measure of justice, find an email contact posted on the web site, and list that as your address. Go wild, opt-in to receive those special messages. That way your special messages will be theirs.

Follow these suggestions and not only will you never get SPAM, you’ll get hardly any email. This is what the SPAMers themselves do. Problems afflicting email today are not a laughing matter. We’ll talk again when you are ready to be serious.

Wednesday, December 13, 2006

Geek Cancer Spreads

Abstract: An ironic and hypocritical analysis of the popularization (bastardization) of the term geek. Marketing people are blamed for the erosion in status of IT professionals to the level of pizza deliverymen.

Note to readers: The hypocrisy is intentional. It's not anybody's fault that marketing works, so, in the words of blogger ABB, "If you can't beat them, rip off their hustle..."


Washington, DC: I am sick of the term geek. It used to have one meaning, then it had another, then another... Nowadays, geek is chic.
  • Googling geek, you get 63.4 million results. Googling tech support you get only 26.1 million results. nerd garners 20.1 million, and dork gets 8.2 million results on Google.
  • More than 25,000 geek domains names have been registered. For example, there is 1-800-Rent-a-Geek.com. But that's not their phone number; their phone number is 1-888-542-GEEK.

Somewhere along the line, geek was embraced by marketing people. Rapid growth and uncontrolled usage of the term in the media ensued. Thanks to the marketing geeks (turnabout is fair play), the term became malignant nonsense through endless repetition; the very definition of a cancer.

  • This holiday season, you can find the word geek used to sell almost anything and everything. There are geek t-shirts that were "designed by experts." There is a web site that pushes a geekly and geekily erotic newsletter. "Geek My Ride" was a book published last year. Search Yahoo Shopping for geek and you find clothes, food, golf clubs, tools, musical instruments, cars, etc.
  • Information technology professionals are routinely called geeks and portrayed as akward and unfashionable. On the job, they are made to wear retro (silly) uniforms and drive retro cars (e.g., New Beetle). In advertising, IT geeks have the look and status of pizza deliverymen.

Yet, there are early signs that this cancer is abating.

  • According to Yahoo's overture.com, in October 2006, searches for the term geek lagged behind searches for the term nerd and for tech support. And the high keyword bid for geek is currently only half what it is for tech support. (Curiously, there are currently no bids for nerd.)
    • FYI: When you see Google or Yahoo ads on a web page, Google or Yahoo has scanned the page and identified key words and phrases. Google and Yahoo each has a massive storehouse of advertisements. Each advertisement is associated with some number of keywords and phrases selected by the advertisers. For each keyword selected, advertisers bid, that is, they indicate how much they're willing to pay for each click-thru resulting from that ad being displayed. Your bid, relative to others for the same keyword will determine the frequency and placement of your ad. Thus, the high keyword bid is a measure of the current economic value a key word of phrase.
  • Circuit City recently launched a new tech support service along the lines of Best Buy's Geek Squad. Circuit City has chosen to brand this service "Firedog."

Disclosure: I am not a geek, nerd, dork, doofus, techno-whore or other variation on this theme. I don't dress ridiculously, carry a badge and drive a themed car. I am a consultant that does tech support and tech strategy with Keystone Computer Group (an excellent company) in Metro DC. BTW, my brother-in-law owns and operates an excellent business in Omaha, NE called GetYourGeek.com.

For more information or for questions, call John Redmond at 240-486-6370 or email him at jredmond@keystoneisit.com. Keystone Computer Group is located at 4615 Lee Highway, Arlington, VA 22207.

Monday, December 04, 2006

Friends Don't Let Friends Print

Many of us are addicted to printing things off our computers, especially older folks. Who cares what it costs to have a hard copy of something rather than merely looking at it on a computer screen? So what if 99% of these printouts end up in the trash?

In some companies, the boss’ email is screened by his/her assistant, printed out and placed in the In box on the boss’ desk. A doctor often will dictate a letter, print it, sign it and fax or mail it to a patient or colleague. For many of us, an essential element of photos is handing them around to friends and family, putting them in albums or hanging them on the wall.

We prefer to read things printed on a piece of paper. We can make ourselves more comfortable; we don’t have to strain our eyes or neck to read it on the computer. We can underline and write comments in the margins. We can walk down the hall and show this thing we’ve printed out to a coworker. We can take a document into the toilet to read it.

Printing options and costs vary all over the map. There is the cost of the machine, the service contract and the costs of supplies to consider. Do you want to print in color? Do you want to share printers or let everyone have their own or both? Do you want to print photos and text or just text? Do you want laser or inkjet technology? Do you want to collate and staple? Do you want a printer that is also a scanner and fax? How big or small do you want the printer to be? How fast?

I don’t know what it costs you to print in your situation. I bet you don’t know either. Nobody I know tracks their costs, including the time costs of people dealing with supplies, printer problems, paper handling, etc., and calculates a fully loaded cost of printing. People would be amazed if they did.

How does $0.50 per page sound? If you have inexpensive color ink-jet printers, that’s not an unreasonable number. If you have a large, networked laser printer (B&W), your printing costs per page will be substantially lower, if you print a lot of pages.

Reducing your printing will not only improve your bottom line. Reducing paper will make your operation more efficient. You will no longer have to file reams of paper, and it will be much easier to find things when you need to. Business processes can move much more quickly, moving electrons instead of sheets of paper.

Because printing is a largely uncalculated and unmanaged cost in most organizations, it has become a cash cow for many in the computer business. Hewlett Packard, the market leader in printers and number 2 in PCs has a 15% profit margin on their printer business and a 3% margin in the PC business. HP’s sales of supplies such as ink and toner accounted for 59 percent of printer business sales. (See: http://www.ndpta.com/files/PCsBringProfitToHPBloomberg.htm ).

So remember, the next time a "friend" is bragging on you about the wonderful new printer they got, tell them to go away. Friends don't let friends print.

Thursday, November 30, 2006

Computer Literacy

Many people are lagging in computer literacy -- the knowledge and skills needed to use computers effectively -- in the workplace.

Different jobs require different degrees of computer literacy. Virtually everybody needs to know how to keyboard nowadays. Speed and accuracy are more important issues for some jobs than others. Virtually everybody needs to understand the company’s IT policies and procedures related to privacy, security and appropriate use.

To some extent, advances in information technology (hardware and software) have made computers more user-friendly. The interfaces with machines have become more intuitive for people. For example, here are some computer tasks that almost everyone can do and that don’t even require keyboarding skills.
  • Get cash from an ATM
  • Take digital photos
  • Use a self-checkout lane at the supermarket
  • Pump self-service gasoline
  • Operate a cash register at McDonalds
  • Make calls on a cell phone
  • TiVo your favorite TV shows

WARNING: The pace of change in information technology is so rapid as to render anyone’s computer skills and capabilities obsolete unless they receive on-the-job training or learn on their own to keep up.

Many employers will not spend the time and money to educate/train employees in information technology, figuring that they can get the right mix of skills they need by hiring and firing people. So in many cases, the burden is on the individual to keep his or her skills up. Fall behind, and catching up is very hard. Fall behind and your career options diminish.

QUESTION: Who is keeping an eye on business leaders to make sure they are maintaining their computer literacy? It’s not like they are going to hire and fire themselves. While the CEO may not need to do much keyboarding, he or she does need to understand Moore’s Law, business process reengineering, data warehousing, the Internet, etc.

Ultimately, the market will do the job, and a lot of innocent people in the company may suffer. Directors, if there are any, can do the job if they are strong. Rank and file employees can promote technological change in a company through political means. They may not teach the CEO how to keyboard and do ad hoc database queries, but they can try to protect their jobs by trying to keep the company from falling behind technologically and subsequently failing in the marketplace. Having the inmates run the asylum is not a good IT strategy, however!


RECOMMENDATIONS:
  • Every employee, including senior executives, should have a job description, including a description of the level of computer literacy he or she is expected to maintain.
  • Every employee should have a regular performance evaluation which includes computer literacy in the goal setting and performance evaluation process.
  • Companies should provide employees the time they need and/or pay for training to achieve each person’s computer literacy goals.

Keystone Computer Group has the expertise and capabilities that organizations in the Washington, DC area need to develop and implement these recommendations. We can help you improve computer literacy in your organization.

Friday, November 24, 2006

Christmas Wish List

Happy Thanksgiving!

As Thanksgiving is the traditional start of the Christmas gift-buying season, I am pleased to share with you my "wish list" for the coming holiday season... These ideas are for the inventive among you. The rest will have to wait a while before these items are available, i.e., send cash.

  • Voice recognition software. This will fundamentally change the way we interact with machines. "Computers" will be embedded in every device so that we can tell them what to do. N.b., the current state of the art of computer voice recognition is not satisfactory for my purposes. First, it does not do a good enough job recognizing words correctly (even with "training"), and second, it does not understand the meaning of words well enough to take proper actions.

  • Home automation hardware and software. Let me monitor and control things in my house using TCP/IP and a browser-based application. I want to be comfortable and minimize energy consumption. I want to feel safe and secure. I want to know when things are not working right. I want to contain the dogs on my property.

  • Networked home entertainment. Let each person in my family listen to their choice of recorded music, play video games, watch videos, go online, listen to the radio, watch TV, wake to music, etc. anywhere in my home. And let it be simple, using one monitor/screen per room, one set of speakers per room, one keyboard per room, one set of game controllers per room and one universal remote per person.

  • Universal headset. I'll wear it all the time; at work, in the car, on the subway, and at home. I'll wear it to listen to recorded music or the radio, talk on the phone, or to converse with someone standing in front of me. I will be able to select my "focus" wearing the headset quickly and easily, without confusing or annoying the people around me. A good universal headset will be help make voice recognition a reality by reducing the effects of background noise.

In case you are wondering, Microsoft's long-awaited upgrade of their Windows operating system, called Vista, which is scheduled for release shortly after Christmas, is not on my wish list. I have been using a Beta copy of Vista at work. It is supposed to be more reliable and more secure than its predecessors. It is supposed to do a better job of interoperating with new devices and technologies. Unfortunately, however, the only changes I can see are cosmetic and not real, requiring me to learn new menus and new click-sequences to accomplish things I used to know how to do. I'm not convinced I need/want Vista yet. Of course, if you want to give me a new computer with Vista preloaded, I suppose I'd take it.

Tuesday, November 14, 2006

The Case for Notebook Computers?

It seems that everybody has a notebook computer nowadays. Why is that? How do people justify paying 50% more for the “benefits and features” of a notebook? It is a mystery.

What are the benefits and features that are unique to notebook computers? There is just one. It is mobility potential. With a notebook computer you have the potential to use your computer whenever and wherever you like. Potential is seduction. Reality is disappointment and regret.

The barriers to real mobile computing are significant. Buying a notebook is only the first step. It is the easy part. More difficult is integrating a notebook into the way you work and live so that you have your notebook at hand, charged and ready with the files you need, when the time arrives to use it “on the road.” A notebook cannot serve as a mobile computer if you leave it at the office or if it is not charged when you want to use it unplugged.

Taking a notebook computer into the real world introduces it to a wide array of factors that limit its usefulness. For example, try using a full-size notebook on an airplane. You’ll find that when the person in the seat in front of you reclines his/her seat, you cannot open your notebook far enough to use it. Try using a notebook outdoors or in a brightly lighted environment. You’ll find that you cannot see the screen. Excessive heat and humidity can slow a notebook to a crawl and/or damage it. Connecting a notebook to the Internet while on the go can be highly problematic. Trying to get your notebook to synchronize with someone else’s projector for a presentation can involve embarrassing delays, if not a complete failure.

Often unappreciated by buyers are the sacrifices that go with owning a notebook computer. Ergonomically, notebooks are a disaster. You have to learn to keep your thumbs up when you type to avoid tapping the touch pad, making the cursor jump around the screen, garbling what you are typing. Few people can use a notebook all day without an external keyboard and monitor. Poor ergonomics translates into discomfort, reduced productivity and higher rates of repetitive stress injuries for notebook owners.

To realize the potential of mobile computing, you have to carry your notebook with you everywhere you go. Depending upon how much and how far you have to carry your notebook, it will frequently seem heavy and bulky. In addition, your notebook will weigh on your mind as you travel about. Knowing that you are carrying an expensive piece of equipment which contains valuable information means that you have to be attentive to it and vigilant against any threats to it. God forbid it gets lost, stolen or damaged. Then what? That depends on what you have on the machine and whether you have it backed up. If you have your tax return and/or valuable business information stored on the laptop and it has not been backed up, you could be in big trouble.

Let’s assume that you’ve done the math, and it turns out that a notebook computer is right for you. Perhaps you are a student who can touch-type 80 words a minute, and you are going to use it to take notes in classes. Here are a few valuable suggestions:

  • Require a user name and password to boot the notebook so that if the machine is lost or stolen, it cannot be easily operated.
  • You have valuable and/or confidential information on the hard disk, so encrypt the disk. Otherwise, if the notebook falls into the wrong hands, it will not be hard to read the disk and steal your identity.
  • Set up automated online/network backups of your data files to minimize costs and disruptions when something bad happens to your notebook.

For most people, the decision to buy a notebook computer is a mistake. But people have the ability to rationalize almost anything. And denial is a common trap that people fall into. So, it is likely that people will continue to buy notebooks in spite of reason and experience.

Friday, November 03, 2006

Biggest Threats to Data and Info Systems

Sometimes people think that their data and information systems are “safe” because they’ve got anti-virus software, firewalls, pop-up blockers and spam filters. “Unfortunately, these people are operating under a false sense of security,” says John Redmond, an information technology (IT) strategist and business security expert with Keystone Computer Group.


According to Redmond, “People don’t understand the risks involved, either. Asked ‘What’s the worst that could happen?’ people just shrug. They don’t appreciate the apocalyptic possibilities.” And those are…

  • You get fired from your job.
  • Your organization fails.
  • Your identity is stolen and your bank account is drained.
  • You are arrested and put in jail.
  • Your name is splashed in the newspapers.
  • You are sued by clients/customers claiming losses and damages.
  • All of the above.

What are the biggest threats? They may not be what you think they are! These are the top-4 threats, according to Keystone Computer Group which has been serving the IT needs of small and mid-sized organizations in metropolitan Washington, DC since 1982.

  1. The biggest threat is your employees. For example:
    • Mistakes happen, (how else will employees learn if you don’t provide guidance and continuing education?) like one person clicking a seductive-looking yet malicious link on an email or web site. And because yours is a networked, teamwork environment, the mistakes of one can become the problems of many.
    • Your employees embody valuable data. So, when you lose a key person to a competitor, retirement, disability, death, etc. you are losing valuable data.
    • Disgruntled employees do malicious things. “Hopefully they’ll quit rather than act out,” you say? Or, maybe you want them to do something and give you cause to fire them?
    • After you fire a disgruntled employee, they may be willing to “cut off their nose to spite their face,” spreading embarrassing truths and despicable lies about you. Thus it has always been; only with the Internet, they have a MUCH BIGGER audience.

  2. Portable devices are the next biggest threat. This includes laptop/notebook computers, PDAs/Blackberries, cell phones, portable storage devices, and similar devices. Why?
    • Portable devices break easily, and if they have not been backed-up, data gets lost when they break.
      • Performing and managing back-ups on portable devices are often complex tasks, and often they do not happen properly.
    • Portable devices get stolen, and they get lost.
      • In May 2006, the Department of Veterans Affairs (VA) learned that an employee took home a laptop computer and external hard drive containing Social Security numbers of millions of veterans. They were stolen from his home.
      • In June 2006, a laptop containing Social Security numbers 13,000 DC government workers and retirees was stolen Monday from the home of an employee of the company which administers the District's retirement plan.
    • Because they are not properly secured.
      • Often times no user name/password login is required to operate the device. The hard disk is not encrypted. So, if it is lost or stolen, it takes no special skill to access everything on the machine.
      • Say you’ve got some time to kill in O’Hare between flights. You can pull out your laptop to use one of the available open WiFi networks. If you have file sharing enabled on your laptop, and many laptops do, anybody else on that WiFi network can surf your hard drive while you are checking your email.
      • You are walking down the street with your Blackberry on your belt. A fellow is walking behind you with a laptop in his briefcase. His laptop has synchronized via Bluetooth with your Blackberry and is copying your contact list, calendar and emails. It takes about 15 seconds, and you never know what happened.


  3. Wireless networks are a threat because they can sprout without being properly authorized and properly secured.
    • It doesn’t take an IT expert to buy, plug in a wireless access point and create a wireless network. The devices are inexpensive, and out of the box, many such devices are completely unsecured. It does take some technical sophistication to properly secure the wireless network once it is up, so many such networks are completely unsecured. Anybody in the vicinity of the access point can get on the network.


  4. Power is the Achilles heel of the Information Age.
    • Everything comes to a halt when the power goes off. Backup power, if you’ve got it, only helps with minor, brief power interruptions. A power outage over a wide area lasting for days, and you are not going to be able to transact business.
    • The power generation and transmission grid is a complicated, antiquated, patchwork affair, which allows some sharing of power and on-line capacity to meet peak needs. It is not a fail-safe system. In many areas, the power system is not reliable. Fortunately, in most central business districts, the power is more reliable than it is in tree-lined residential areas.

For more information or for questions, call John Redmond at 240-486-6370. Keystone Computer Group is located at 4615 Lee Highway, Arlington, VA 22207.