Parody by Tripp and Tyler of the everyday business conference call.
Dog’s barking, barista’s taking coffee orders, employees showing up late and unprepared. Ring a bell?
Parody by Tripp and Tyler of the everyday business conference call.
Dog’s barking, barista’s taking coffee orders, employees showing up late and unprepared. Ring a bell?
The report, filed by KRON’s Steve Newman back in 1981, details the birth of Internet news as it chronicles an experiment being conducted by the San Francisco Examiner where editors programmed a copy of each day’s paper into a computer and made it available via the Internet. To connect to the Web and access the S.F. Examiner’s paper, by the way, a reader had to place the receiver of his or her telephone on a dock and then manually dial into a service provider’s network.
“This is only the first step in newspapers by computers,” Newman said in the report. ”Engineers now predict the day will come when we get all our newspapers and magazines by home computer, but that’s a few years off.”
Psh, it’ll never happen.
The video made the rounds five or so years ago, but a recent email from a reader refreshed our memory and it’s too good to not share. It’s an absolute gem and it’s embedded below.
Do yourself a favor and watch it right now.
Scary news out of Alberta. Another failure of personal information being compromised. This is why we are encouraging our customers to use a terminal or cloud server. No data is left to chance on a hard drive! If all the data had been stored properly on a terminal server, 620,000 people would not have been compromised. This begs us to ask a further question, with the technology available why wasn’t this IT professional at fault using it?
We stress these issues to our clients everyday, protect yourself. Hire a professional consultant with a great track record. Insure that they understand your demands of data security. And do not leave anything to chance.
Below is the article just released by CBC
A laptop with the unencrypted personal health information of 620,000 Albertans was stolen last September, Health Minister Fred Horne announced Wednesday.
The laptop contained the names, dates of birth, provincial health card numbers, billing codes and diagnostic codes of the individuals seen at Medicentres between May 2, 2011, and Sept. 10, 2013. The computer was stolen on Sept. 26.
Horne said that he was informed of the theft on Tuesday, when he received a letter from the vice-president of Medicentres Family Health Care Clinics.
He has asked the privacy commissioner for an official investigation under the Health Information Act to find out why health officials have only just been told about the theft.
“On behalf of the citizens of this province, I am quite frankly, outraged that this would not have been reported to myself or my department sooner,” Horne told reporters.
“The theft of personal health information of 620,000 fellow citizens is unacceptable in Alberta’s health-care system in any circumstance.”
Edmonton Police, the Alberta College of Physicians and Surgeons and the Alberta Medical Association have also been notified.
In a news release, Medicentres says they were told on Oct. 1 that the laptop belonging to an information technology consultant was stolen.
The release further states that police and the privacy commissioner were notified immediately. However, Edmonton police said the theft was reported four days later on Oct. 5.
“To date, Medicentres has no information to suggest that any of the personal information on the laptop has been accessed or misused,” the news release states.
“Medicentres has already implemented a number of additional security measures and we are further auditing our security policies and procedures and are implementing further measures to ensure that personal information is further safeguarded.”
The chief medical officer for Medicentres, Dr. Arif Bhimji, said the laptop was stolen in Edmonton.
The consultant had access to so much information because he was working on a database needed to submit claims to the Alberta government.
There was a delay in notifying the public because Medicentres was trying to figure out how to best do it, he said.
“We kept the privacy commissioner involved and advised of our progress over this period of time,” Bhimji said.
“I wish we could have done it sooner, but this was the first time ever having to deal with this sort of situation and it took a lot longer than we would have liked it to take.”
He is advising anyone who thinks that their information was stolen to check their credit card statements to make sure nothing is out of the ordinary.
Bhimji said Medicentres is now seeking answers on why the stolen laptop’s data wasn’t encrypted.
“We have certainly asked for a response to that question from our IT consultant, who we would have hoped would have understood that this would be an important privacy matter to be concerned,” he said.
Bhimji declined to name the firm where the consultant works.
“We are terribly sorry that this has occurred. We regret that it has taken much longer than we would have liked to inform Albertans with respect to this and we truly do apologize for the inconvenience that some of these people are going to face and the concern that this is going to cause them.”
Alberta privacy commissioner Jill Clayton is en route to Edmonton and will decide tomorrow whether to commence an investigation, her spokesman Brian Hamilton said.
Hamilton said the information contained on the laptop isn’t complete enough to commit identity fraud. However, he said that his office had been urging Medicentres to make the theft public since October.
Horne said anyone who might be affected can lodge a complaint with the privacy commissioner.
“When first asked for my reaction about this I was speechless. I find it incredibly hard to believe that in a province such as Alberta that such an incident could occur,” he said.
Opposition leader Danielle Smith of the Wildrose Party said it was inconceivable that it had taken so long for the breach to be made public and that the health minister wasn’t notified sooner.
“Why did all of this information exist in a single file on a computer in the first place?” Smith asked.
“The requirement of the Health Information Act is that vendors are only supposed to access the amount of information that they need to provide the service and no more.”
This interesting research document (see below) was brought to the attention of our very own Eric Hunter. Although meant to be amusing it brings up the ever present question, that the old sneakernet might still be faster than transferring large documents remotely. With on-going trouble with big data servers such as dropbox, (see our KSP Blog Post) this method of technology is improving but it still has its limitations. According to Tien Anh Nguyen of OpenView Research:
“I am quite convinced though, that Big Data will continue to grow and may become a mainstream technology market by the end of 2014. More of the startups of today will likely emerge as scaled businesses offering a range of verticalized and segmented Big Data tools and services. Moreover, I’m betting additional standards and best practices will emerge that will allow customers to compare these products and adopt the ones that are most appropriate for their needs.”
In a world where time equals money, we are still not at a stage where file transfer technology is as quick as downloading to a USB hard drive and transporting it by foot, car or in this case carrier pidgeon.
Network Working Group D. Waitzman Request for Comments: 1149 BBN STC 1 April 1990 A Standard for the Transmission of IP Datagrams on Avian Carriers Status of this Memo This memo describes an experimental method for the encapsulation of IP datagrams in avian carriers. This specification is primarily useful in Metropolitan Area Networks. This is an experimental, not recommended standard. Distribution of this memo is unlimited. Overview and Rational Avian carriers can provide high delay, low throughput, and low altitude service. The connection topology is limited to a single point-to-point path for each carrier, used with standard carriers, but many carriers can be used without significant interference with each other, outside of early spring. This is because of the 3D ether space available to the carriers, in contrast to the 1D ether used by IEEE802.3. The carriers have an intrinsic collision avoidance system, which increases availability. Unlike some network technologies, such as packet radio, communication is not limited to line-of-sight distance. Connection oriented service is available in some cities, usually based upon a central hub topology. Frame Format The IP datagram is printed, on a small scroll of paper, in hexadecimal, with each octet separated by whitestuff and blackstuff. The scroll of paper is wrapped around one leg of the avian carrier. A band of duct tape is used to secure the datagram's edges. The bandwidth is limited to the leg length. The MTU is variable, and paradoxically, generally increases with increased carrier age. A typical MTU is 256 milligrams. Some datagram padding may be needed. Upon receipt, the duct tape is removed and the paper copy of the datagram is optically scanned into a electronically transmittable form. Discussion Multiple types of service can be provided with a prioritized pecking order. An additional property is built-in worm detection and eradication. Because IP only guarantees best effort delivery, loss of a carrier can be tolerated. With time, the carriers are self- Waitzman [Page 1] RFC 1149 IP Datagrams on Avian Carriers 1 April 1990 regenerating. While broadcasting is not specified, storms can cause data loss. There is persistent delivery retry, until the carrier drops. Audit trails are automatically generated, and can often be found on logs and cable trays. Security Considerations Security is not generally a problem in normal operation, but special measures must be taken (such as data encryption) when avian carriers are used in a tactical environment. Author's Address David Waitzman BBN Systems and Technologies Corporation BBN Labs Division 10 Moulton Street Cambridge, MA 02238 Phone: (617) 873-4323 EMail: dwaitzman@BBN.COM
While cleaning up our company drives recently, we came across this old radio ad we commissioned from 2006. What struck us as interesting is that in the 8 years since this advertisement was aired, technology has developed rapidly. Since this time we have seen the smartphone and tablet, cloud is becoming the “it” word in IT, and 3D printers and wearable devices are all the rage this year at the 2014 CES. But the basic issues of the business customer have stayed the same.
Our customers want technology to work. And as simple as that sounds, we walk into IT disasters everyday. Technology is a necessity in today’s business environment, and companies need to keep up or be lost in the abyss of antiquity. But the principles stay the same. Business owners want their data stored, they want to be able to access it when needed and they need to have the piece of mind that they’re being looked after. As long as we support these efforts, technological growth is endless.
During an interview with CNBC, retailer’s CEO defends four-day delay in notifying customers of security breach as necessary for the investigation and preparation for consumer reaction.
Hackers infected Target’s point-of-sale terminals with malware to steal the payment card information from millions of customers, the retailer’s chief executive has confirmed.
The security breach, which yielded the personal information of as many as 110 million customers, was first identified on December 15, four days before the breach was publicly revealed, CEO Gregg Steinhafel told CNBC during an interview. Target revealed Friday that the security breach it suffered between November 27 and December 15 was larger than originally believed, yielding the names, mailing addresses, phone numbers, and e-mail addresses for near three times its original estimate of 40 million customers.
“Sunday [December 15] was really Day 1. That was the day we confirmed we had an issue and so our number one priority was … making our environment safe and secure,” Steinhafel said in the interview. “By six o’clock at night, our environment was safe and secure. We eliminated the malware in the access point, we were very confident that coming into Monday guests could come to Target and shop with confidence and no risk.”
Steinhafel defended the four-day delay in its notification process as necessary for investigators and consumer preparation.
“Day 2 was really about initiating the investigation work and the forensic work … that has been ongoing. Day 3 was about preparation. We wanted to make sure our stores and our call centers could be as prepared as possible, and Day 4 was about notification,” he told CNBC in an interview scheduled to air Monday.
Target was not the only US retailer to suffer a security breach during the holiday shopping season. Upscale department store Neiman Marcus confirmed on Friday that its database of customer information was hacked last month around the same time as the attack on Target. Additionally, Reuters reports that at least three other well-known but unidentified retailers experienced smaller breaches that have yet to be publicly revealed.
The practice of payment card skimming at point-of-sale terminals has become more frequent in recent years, often victimizing customers of well-known retailers. Bookseller Barnes & Noble discovered in fall 2012 that hackers had broken into keypads at more than 60 locations around the United States and made off with customers’ credit card information. That same month, two Romanian men pled guilty to hacking point-of-sale terminals at hundreds of Subway sandwich stores in the US to steal credit card data from more than 146,000 accounts.
We hope you weren’t planning a big Dropbox sync this evening. The cloud storage service reports that it’s having problems with its site following an issue with “routine internal maintenance.” Just what that means isn’t yet clear, although it’s not believed to be an intrusion attempt. While Anonymous Korea and 1775 Sec claim to have hacked Dropbox, the company tells Engadget that the outage isn’t the result of “external factors.” That news won’t be much consolation to those who still can’t reach their online data, but it at least suggests that users won’t have to worry about changing their passwords.
Update: Dropbox says that its site is back — as expected, it adds that claims of a leak are a “hoax.”
Another reason why you should secure your data with a trusted source.
As businesses depend on technology to get more and more work done, the rate at which that technology is failing them is on the rise, new research shows.
A study by technology-performance firm Compuware Corp. revealed that businesses of all sizes face pervasive technology failures, with more than half registering a significant technology failure within the past year and 81% indicating they had the same fiasco occur multiple times. Overall, nearly half of the companies surveyed said they experience tech-performance issues daily, while more than 25% reported that the frequency of failures is increasing.
Compuware CEO Bob Paul said that, at a time when technology permeates the operational fabric of every business, technology performance becomes a key competitive differentiator.
“Properly functioning technology can lead to expanded market shares, improved margins and increased revenues,” Paul said. “Corporate leaders must understand the impact of technology on their businesses and take technology performance as seriously as they take other business-critical areas of their operations.”
However, the study found that most businesses don’t know the true impact of a tech breakdown: Only one-third of the businesses surveyed regularly collect data and quantify the impact of failures.
“You need to be able to identify, measure and understand performance issues before you can truly fix them,” said Bharath Gowda, Compuware’s director of technology-performance services.
The research identified three primary reasons for the general lack of performance measurement and impact analysis:
In addition, the study discovered that many IT performance issues are “fixed” with short-term patches, such as through increased IT training, an increase in IT staff or the hiring of an IT consultant.
Gowda said reactive measures such as software patches, hardware upgrades and supplemented staffing are little more than Band-Aids
“Over the long run, they prove to be extremely costly and largely ineffectual,” Gowda said.
The study was based on surveys of 304 corporate executives and senior managers from companies in the United States, Europe, Asia and Australia