Tales from the Technoverse

Commentary on social networking, technology, movies, society, and random musings

Tales from the Technoverse header image 1

How I Survived the Great Washington Quake of 2011

August 23rd, 2011 · earthquakes, technology

Earlier this afternoon I had a meeting in my office with one of my staff to go over a number of difficult issues.

We went back and  forth over a number of topics. I, of course was up at my whiteboard drawing things on it and proving key points with insight and wit, or I suppose using the fact that I was the senior person in the office to dominate some of the conversation.

Suddenly my office, on the second floor of our four floor office building, started to move up and down and shift seemingly back and forth. I  had no idea as to what was going on.

If I might digress for a bit, the human mind, or at least mine, tries to interpret completely unexpected events by relating them to something familiar. Many years ago at our previous house in a neighborhood that backed on a small park. I was reading and happened to look out the window. “Funny”, I thought, “when did my wife buy a deer statue to decorate our back yard with.”  It seemed so large for something Ellen would get. Of course then the head of the deer statue leaned down and munched on a plant in our yard.

Back in my office, the only thought that occurred to me was that the floor felt like it would suddenly collapse, but then among the longest 20-25 seconds of my life stopped when the floor stopped shifting.

My staff person and I looked at each other, he said “What was that?”. We opened the door and looked in the hallway to see everyone else in the office milling around. Showing the executive decision making ability that I was hired to demonstrate as the COO at Powertek, I walked out the office door and down the one flight of stairs to the outside, moving away from anything that might fall on me.

After about fifteen minutes of milling about aimlessly, we all decided to go back in the building.

A friend of mine told me a story about when he was in San Francisco when one of the major earthquakes happened. He remembers putting his hands on the wall next to him and pushing as hard as he could to make sure the wall didn’t fall down. When the quake stopped he realized that this was one of the stupidest thoughts he ever had. When he walked outside, it was night, it was eerie since there were no lights anywhere in San Francisco.

During the time I was walking out and milling about, I checked in with my wife who was at home and confirmed that we had suffered an actual earthquake and my younger daughter who texted my wife that she had run down eleven flights of stairs and was safely protected by coffee at Starbucks.

By the time we went back in to the office and accessed the source of all current knowledge, Wikipedia, we were amazed (though we shouldn’t have been) that there already was a full story about the earthquake. Our CTO mentioned that he would have been more impressed if the entry had been made before the earthquake. It occurs to me that quantum computers could have that side benefit if designed correctly.

Comments Off on How I Survived the Great Washington Quake of 2011Tags:

Bloody Crimes, A Book About Abraham Lincoln and Jefferson Davis at the end of the Civil War

July 11th, 2011 · history

Finished Bloody Crimes, http://www.amazon.com/Bloody-Crimes-Jefferson-Pageant-Lincolns/dp/0061233781/ref=sr_1_1?ie=UTF8&qid=1310434681&sr=8-1, by James Swanson, who has written a number of books related to Lincoln’s assassination.

This book tells parallel stories about what happened to Lincoln’s body after his assassination as it was taken on a train ride back to Springfield Illinois and what happened to Jefferson Davis during his escape from Richmond to his capture and then to the end of his life. It is well written and for those interested in the general subject area, a fairly short read with a lot of information that at least I was unaware of.

One of the events that was described toward the end of the book stayed with me after I finished. The Lincoln Memorial was dedicated in 1922, with among others, Robert Lincoln, Lincoln’s surviving son attending. The crowd listening to the dedication was in large part segregated.

It took many years before the serious beginnings of the promises made at the end of the Civil War to penetrate American society in a meaningful way.

→ 1 CommentTags: ·····

July 4th & American Exceptionalism, Reposted

July 4th, 2011 · General, history

In December 2009, I was asked by the Inter-American Development Bank to participate in a project to look at eGovernment for the Brazilian Government.

During the time I worked on that effort, I got to know a number of the IADB staff. One of them who was born in  Spain, married an American wife, and now lives in the US, told me that in his opinion there was one particular thing that made America unique. It was that unlike any other country America was founded on the principal that all Governmental power was derived from the people. In most countries, he said, the opposite was the case. In other countries, rights were conferred by the Government.

I am not enough a student of International Political Science to know how accurate that conversation was. But I do believe in the first part, that is that the premise of the American experiment was that Governmental power was “derived from” not “established for”.

Quoting from the Declaration of Independence, a document which will be often quoted today, July 4th, but not paid enough attention to:

“”We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty, and the pursuit of Happiness.—That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed.”

As a second generation American, all of my grandparents were born in Europe, I remain thankful that I am able to be a small part of this continuing attempt to expand the barriers to freedom that America has and continues to represent. I continue to believe that freedom is at its most basic not “freedom from” but “freedom to”.

While I worry that currently we are losing our way a bit, like most American’s for these over 200 years, I remain optimistic that the experiment will continue unabated.

Happy July 4th to all friends of liberty.

 

Comments Off on July 4th & American Exceptionalism, RepostedTags: ·····

Dave Wennergren – Solving Problems vs Managing Dualities

June 28th, 2011 · leadership, technology

I recently had the pleasure of listening to Dave Wennergren, one of the more thoughtful Government IT and Management leaders, discuss the areas he was focuse on in his current job as the Assistant Deputy Chief Management Officer for DoD.

There was one particular anecdote that Dave told that I thought was in particular worth repeating – just so I am not misinterpreted, this was just one of many.

He noted that most people that are successful became that way by being very good at problem solving. Thus most issues that come up are looked at as problems to be dealt with and the right answer discovered and acted upon.

In reality, however, much of the challenges we face are in fact dualities that need management.

For example, Dave pointed out, consider inhaling and exhaling, functions of the body that serve to a large extent different purposes. It would be unwise to only optimize one of them to the exclusion of the other. The result would not be positive.

Comments Off on Dave Wennergren – Solving Problems vs Managing DualitiesTags: ····

My GWU Discussion – Part 3 – What to do About Cybersecurity

May 30th, 2011 · cyber-security, presentations, scada, social networking

This is my third (and thankfully to most readers, last) post about a class at I gave at George Washington University earlier this year. The professor, Dr. Robert McCreight, invites me to be a guest lecturer on cyber-security from time to time. I posted a copy of my slides in the previous two posts and do so again here:

George Washington University Slides on Cyber-Security

In the last post I returned as I often do to the question “How to be secure when each component of your solution is itself insecure?”. I find that most practitioners, and in particular their management, are in denial on this issue. While my first suggested step which is to practice security hygiene is useful it does not help against a determined attacker.

While I am not sure if anything short of not connecting to anyone will work all the time, two possible approaches seem promising.

[Read more →]

→ 2 CommentsTags: ······

My GWU Discussion – Part 2 – What to do About Cybersecurity

May 13th, 2011 · CIO, cyber-security, education, government business, presentations, technology

Previously, I had written about a class at George Washington University to which the professor, Dr. Robert McCreight, invites me to be a guest lecturer on cyber-security from time to time. I posted a copy of my slides then and do so again here:

George Washington University Slides on Cyber-Security

I wanted in this entry to talk about my thoughts on what organizations should consider when dealing with cyber-security issues. My discussion here is based on slide 18 – Thoughts On What To Do (duh). I will cover the final slides in a following entry.

I believe a lot of people start with the wrong premise. They assume that the goal of cyber-security implementation is to end-up with a secure systems architecture. In fact, at least in my opinion, that goal is unrealistic and planning with that objective in mind can lead to negative results.

Money is wasted playing what I refer to as whack-a-mole security, chasing after incidents that have already happened, and spending too much of an organization’s limited resources defending everywhere when the bad guys only need to find one vulnerability.

As I write “The fundamental question is how to be secure when every component is insecure.” I suggest two parts to the response, the first of which I discuss here.

As step one, practice security hygiene. Make sure that you have not made it easy for your systems to be penetrated. The reason we put locks on the doors of houses is not because this makes it impossible to break in, but at least we make it hard for the casual intruder and we slow them down to increase the chance of apprehension.

Much of what I talked about while I was at the Department of Transportation is in fact being accomplished, better than I did for that matter, currently in the Federal Government. There is an increasing movement away from the static oversight of FISMA report creation to the dynamic oversight of real-time situational awareness.

You cannot defend something when you do not know what is happening. Integrating sensors into your network or even better developing systems that themselves provide situation status are a big plus.

Second, it is important to build security into the budget process. My not well-formed thoughts at DOT were that depending on the categorization of software projects, low/medium/high, from a criticality (or some other kind of measurement) there should be a percentage range of the total budget that was required to be associated with security explicitly with a separate plan as to how the money would be spent. I found that when I went back and looked at systems that had been developed at DOT before I joined, the security investments were often not documented and when documented, the percentage of the total expense varied very dramatically.

The key point here is that security dealt with after development generally has little value and even then costs much more than when designed into the system development process.

Third, it is important to be as transparent as possible. There is a tendency to try and hide security status with the excuse that this makes a system more vulnerable by exposing weaknesses that would otherwise not be known.

This premise is generally wrong for at least two reasons. Bad guys will eventually find all of these weaknesses anyway; they spend more focused time doing so then most of us have in protecting. Most important, it is only with transparent exposure of status that we are likely to focus on fixing problems.

It is just as likely that resistance to transparent exposure of status is fear of oversight more than security protection. Management visibility is the biggest cure for problems.

This last issue is representative of the broad issue of information sharing versus information protection, a topic I have discussed many times. I remain convinced that while both have to be paid attention to, organizations that want to be successful in accomplishing their mission need to lean to the information sharing side of the argument.

Next will be my wrap-up of the presentation continuing the conversation about what to do about security while having inherently insecure systems.

 

Comments Off on My GWU Discussion – Part 2 – What to do About CybersecurityTags: ······

My Guest Lecture at George Washington University on Cybersecurity

April 29th, 2011 · cyber-security, government business, presentations, scada, technology

Every year or so I am lucky to be invited by Dr. Robert McCreight who teaches a graduate class on National Security and Technology to be a guest lecturer on Cybersecurity.

Since the classes I teach at the University of Maryland and Syracuse University are on-line distance learning, it is always a treat for me to have actual live students in the same classroom as I am to interact with. This year the exchange of information was really great, Dr. McCreight has a wonderful class. For all of these activities, I deal with what I call the “avoidance of appearing like an idiot in front of people syndrome”, which forces me to at least to scan and keep up with the literature before the class is held.

While I am one of those people who learn best by doing, being able to talk to and/or discuss with bright students is still very helpful and fun to do.

I have posted my presentation below and during the next few weeks hope to write a few columns based on the later slides, of course I have still not written my last two posts I promised on cloud computing, as as usual what I plan to do with this blog and what actually happens continues to diverge.

[Read more →]

Comments Off on My Guest Lecture at George Washington University on CybersecurityTags: ·······

Our Passover Seder – Quotes

April 11th, 2011 · bible, judaism

As I mentioned in my entry yesterday, each year at our Passover Seder we put together a series of readings and activities focused on a theme (or set of themes).

We pull the readings from an Haggadah named A Different Night.

In addition to going around the table asking people to read selections from the Haggadah we also pass around 3 x 5 cards with quotes on them that I have selected and Ellen has approved which each person reads and is encouraged to comment on.

The themes this year start with the broad issue of freedom from slavery which is the foundational message associated with Passover. We include some thoughts on the revolutionary activities going on in the Middle-East. We also will touch on the issue of how the Bible and the Exodus story deals with how Jews were dealt with as strangers in a strange land and the general issue of the ‘other’ in society. Finally we will talk a bit about the issue of the role of women in society. It remains my contention that how women are treated is a societal “canary in the coal mine”. That is, how well societies deal with women tell one a lot about the society in general.

The quotes we will be using follow:

[Read more →]

Comments Off on Our Passover Seder – QuotesTags: ··

Our Annual Passover Seder

April 10th, 2011 · bible, history, judaism

For a number of years now we have a Passover Seder at our house on the first night of Passover.

We have between 15 and 25 people (I recognize that is a bit of a range) including family, friends, guests from various sources, Jews and non-Jews.

Each year we try and focus on a few themes to focus the more general topic of the Exodus and its implications to us today.

The following is what we are sending out to the participants this year. In addition to the readings we do, we put quotes that at least loosely tie to the themes we are focusing on, on 3 x 5 cards. During the course of the Seder we ask participants to read the quotes and comment on them. Tomorrow, if I remember, I’ll post the quotes we are using.

[Read more →]

→ 2 CommentsTags: ··········

Leadership: Winning versus Avoiding Losing

April 3rd, 2011 · leadership

I have written before about Leadership, most recently here, https://www.ourownlittlecorner.com/2011/01/24/on-leadership/, though it is often on my mind these days in my role as the COO of a small, but mighty company, Powertek Corporation, www.powertekcorporation.com.

A few days ago I was talking to one of the employees about working with others and they mentioned how they felt a person had to earn trust and I realized that I took a slightly different perspective and at least to some extent this difference in approach reflected different leadership styles.

One way I differentiate leaders is between those who want to avoid losing and those who want to win.

The former tend to micromanage people, usually find someone to blame (other than themselves), are able to be successful though often as individuals which may or may not build an organization, and are not fun, at least for me, to work for.

The latter tend to tolerate failure, are more fun to work for, and I believe are more able to grow organizations.

Each brings their own price to the table. The losing-avoider finds it more and more difficult over time to find out accurate information since people are reluctant to provide information on problems only to get blamed. The same goes for risk takers who will always fail at least part of the time as their work ‘outside-of-the-box’.

The winning-desirer often will over-trust and often will not invest enough time in oversight activities, which is doubly important for someone who delegates a great deal of authority.

Both can be successful and if successful enough that alone will attract people to work for them. However in the long run it is those leaders who want to win that are most likely to create large and thriving organizations, because the resulting culture is larger than them. Losing-avoiders end up with organizations that are only about themselves as individuals.

Coming back to the conversation I mentioned at the beginning, it occurred to me that this was just one aspect of the same overall theme. Leaders who want to avoid losing lean toward having people earn their trust. Leaders who want to win lean toward trusting people unless that trust is lost.

Smart leaders who want to win remember to “trust, but verify” and I continue to strive to do both.

→ 2 CommentsTags: ···