Clouds are not Tangible
If you can’t hold something in your hand, it doesn’t exist
At first, this statement might seem to deny digital media…
In reality, you can store anything digital on physical media, and “hold it in your hand”.
Why is this important?
Today, digital rights and cloud-delivered services often determine what you “own”.
What if the provider goes out of business? You simply lose all of your rights (and thus all of your purchases).
What if your account gets corrupted? You lose everything associated with your account.
What if your local content fails to sync with the cloud? You lose your local content.
Here is what does work:
BACK UP YOUR DATA TO PHYSICAL MEDIA.
Thus, if you can’t hold the physical media in your hand, then your cloud-based digital rights don’t exist.
If you have a backup that’s encrypted using Digital Rights Management (DRM), then you don’t really have a backup.
Any physical backup should either NOT be encrypted, or should have a permanent decryption key that never expires, and can be used even if the DRM server is offline.
Unless you can DECRYPT your backups, they are useless.
How to Not Screw Up Your Product
From time to time, manufacturers and developers make unilateral design decisions that affect the way a product functions.
This isn’t always a good thing.
Here are some examples of why major product design changes should always include feedback from the user community.
So, you’ve been thinking about “going green” by purchasing and driving an electric car — you think you’ll be helping to save the environment. I have news for you – you’ll still produce carbon emissions and other waste, and you’ll tax the already-overburdened power grid.
We’ll compare electric to conventional gas and diesel engines, and examine some truly environmentally-friendly alternatives.
Note: This post was written PRIOR to Android 6.0 “Marshmallow” – please see the updates below for more details. “Marshmallow”, by and large CORRECTLY handles app permissions.
When you download an Android app, you are presented with a list of permissions that the application requires in order to run.
You can either accept all of the permissions as stated, or cancel the installation – there is no middle ground.
This approach makes Android generally untrustworthy, but there is a simple way to fix it.
Regardless of your job, if you work in an office, you should have these basic computer skills.
In 2007, I bought a Nintendo Wii, that finally died earlier this year. When I attempted to replace it, what I found was a Wii bit surprising.
Windows 10 rolls out with a feature called “WiFi Sense”, the ability to cache WiFi passwords, and share them with your contacts.
There are arguments in both directions, but I feel that Microsoft has crossed the line. Here is why….
We added a Sony Playstation 4 (PS4) to the house in May, 2014. After a little over a year, here is a long term perspective as a Sony customer and PS4 user.
When an employee or contractor leaves the company, it’s best practice to immediately disable their access to company resources.
In the digital and online world, it’s easy to miss some forms of access, and remember off-hand every single system where the employee’s access should be revoked.
The level of risk increases when the employee separation occurs involuntarily, which might create a situation where the former employee is disgruntled, and increases exponentially if the employee has administrative privileges to sensitive systems.
In this article, I will attempt to outline best practices for a policies and processes around identity and access management, enumerate specific forms of access, many of which might be overlooked, and share some anecdotes resulting from the failure to properly revoke a terminated employee’s privileges.
The Customer Value Chain is Only As Strong as its Weakest Link
This is an epic tale about my electric broom, but more importantly, it’s story about:
- How your company can do everything right, and still fail to deliver on the promise of customer value
- How a lack of aligned priority and perception between you and your vendor can break the value chain
- How a failure to recognize opportunities for creating value, creates opportunities for failure.