August 18th, 2015 | Published in Uncategorized
July 30th, 2015 | Published in Uncategorized
The driving force behind outsourcing and offshoring is to find the cheapest IT talent on the planet. The people hired to do this work usually do not have a college education. They are young and have no experience. They are paid $7 to $15 an hour. The background and qualification checks are superficial at best. They have some IT training, but most of what they know is taught on the job. Now imagine how easy it would be for a cyber criminal to insert himself (or herself) into an outsourcing firm. Imagine how easy it would be to bribe and compromise a worker for an outsourcing firm. Since no one at the outsourcing firm works for your business it is very easy for cyber criminals to operate unnoticed. Edward Snowden used other people’s ID’s to access and copy data. Most cyber criminals these days are smart enough to cover their tracks. Given the weak management at many outsourcing firms, if they detected a problem they’d probably fire the innocent and completely miss what was really going on.
The outsourcing and offshoring of IT makes cyber crime a lot easier.
At least some of these concerns also apply to “cloud” vendors.
June 1st, 2015 | Published in Uncategorized
I was reading Jeffrey Zeldman’s 20th-anniversary post and realized that sometime this month (I don’t remember the exact day; I think it was near the end of the month) will be the 20th anniversary of when I started on webAgent 1.
As a side note, one of the things he said was:
Because folks don’t bookmark and return to personal sites as they once did. And they don’t follow their favorite personal sites via RSS, as they once did.
I still follow favorite personal sites via RSS. That’s how I saw his post. Maybe because I’m a total nerd myself, but I’ve never understood why RSS didn’t catch on more. For me it’s by far the best way to keep up.
May 26th, 2015 | Published in Uncategorized
Vintage hardware enthusiast Ken Shirriff has shown that a model 1401 mainframe, which IBM announced in 1959, can mine Bitcoin. If, that is, your definition of mining includes “chugging away at the problem until pretty close to the heat-death of the universe.”
May 13th, 2015 | Published in Uncategorized
If you thought running a mainframe was old-fashioned:
(via the IBM-MAIN mailing list.)
April 22nd, 2015 | Published in Uncategorized
Mac-oriented tech site TidBITS has been publishing on the internet for 25 years. I don’t remember exactly when I started reading TidBITS, but it was probably before the end of 1996.
March 23rd, 2015 | Published in Uncategorized
The article calls the output device a “dot matrix printer”, but it looks more like output from a 1403 impact printer, which as you can tell from the number was designed to work with IBM’s 1401 processor. The 1403 was adapted to work with System/360 computers, and we still had one in use through the mid 1990’s.
Our capability to measure and record data is rapidly improving, at a time when more and more leaders are trying to protect their status and image by walking the middle ground, pre-calculating every decision and spoken word. The result is that the world increasingly uses and relies on data-driven decisions, from the smallest trivial matters, to policies in large corporations and entire countries. Sometimes it works. Sometimes it’s critical. But sometimes it fails, or results in unintended consequences that we may not notice for years.
March 10th, 2015 | Published in Uncategorized
December 26th, 2014 | Published in Uncategorized
As corporate romances go, IBM and Apple’s must rank among the most unexpected. …
The recent apps release showed just how transformative this relationship could be. We were witnesses to apps which appeared to be designed for users[!] They were not designed for committees that prepare checklists of requirements.
We must applaud IBM for having the courage to resist the featuritis which plagues enterprise software design. This resistance requires saying No to those who specify and are thus authorized to purchase software and hardware. IBM has had to essentially say no to those who buy and yes to those who are paid to use. The quality of the experience is evident at first sight. The number of user actions, the number of screens to wade through have been ruthlessly culled. These are concepts and ideas which now permeate app design best practices. Yet they are practices which still elude the spec-driven enterprise software wastelands.
“Spec-driven enterprise software wastelands.” I wonder how he could have got that idea?
(via Daring Fireball)