Am I the only one shocked, mouth agape at the valuation that music streaming companies are receiving? Isn’t that called a radio station, and weren’t they meant to be dead by now? The sheer madness of it forced me to pause and ponder it all for at least a moment or two. And, if you think about it enough, it all sort of makes sense … sort of. The epiphany came with the realization that business models, especially in the music business, have become very dependent on the average bandwidth consumers have access to. The iPod revolution was really about being able to buy just the song you want, when you want, and having the ability to build your own customized library of tunes to take with you anywhere. Finally, after decades of being a slave to the whims of record labels, the average consumer was back in the driver’s seat ...
Read the full post
If you read Carl Weinschenk’s recent blog post on network security, I suspect that you may have already cancelled all your online accounts, unplugged your computer and abandoned modern life. I was tempted to do the same. It was an alarming article. One that left little hope of building a safe and secure Internet. While I was reading it, I was reminded of a Marc Benioff interview I saw on Bloomberg. During the Q&A, Benioff stated that cybersecurity is an oxymoron and that the Internet is inherently insecure ...
Read the full post
Global headlines were made last month when hackers broke into U.S. government databases.  Personal records of as many as 4 million employees were stolen from the Office of Personnel Management and the Interior Department. Although no clear suspects have been identified, many are pointing fingers at China. However, this is just the tip of the iceberg. Consider this story from The Atlantic: “In October alone, Russian government hackers breached unclassified computer networks in the White House ...
Read the full post

At a time when companies are spending more and more on IT security, why is it the breaches seem to be getting worse? Throwing more and more money at the problem doesn’t seem to be helping. The threat has changed and our preventive measures need to adapt. What is needed is a whole new mindset when it comes to IT security. Rather than trying to keep hackers out with higher and higher (fire)walls, companies need to assume open access to their networks and ...

Read the full post
When I was in middle school, if you or a group of your friends forgot to study for an important test (or just more time was needed), you pulled the fire alarm just before the class, thus delaying the inevitable for one more day, in the hopes that one day would actually make a difference (which it usually did not). When I was in High School, the preferred method of reprieve was to claim to spot a funnel cloud. (My hometown and most schools were destroyed by a tornado a few years earlier) ...
Read the full post