Unaccountable? Check. Pointlessly bureaucratic? Check. Blocking reform? Check
It’s March again so it must be time for an annual checkup on the Internet Governance Forum – the United Nations body that is tasked with working through the complex social, technological and economic issues associated with a global communications network, and runs an annual conference to that end.
Around this time every year, the IGF’s organizing group the Multistakeholder Advisory Group (MAG) meets in Geneva to decide how the annual conference will be structured and what topics it will cover, and to set the rules for how sessions and the conference itself will be run.
And we are pleased to announce for another year, the IGF remains a circus, an unaccountable and pointlessly bureaucratic organization that goes to great lengths to pretend it is open to everyone’s input and even greater lengths to make sure it isn’t.
At the two-day meeting, the IGF’s three core issues again took pride of place at the event:
- Fantasy of democratic representation
- Opaque decision-making and finances
- Bureaucratic blocking of any efforts at reform
Let’s take a look at each:
More of The Register article from Kieren McCarthy
U.S. pollsters got quite a surprise in the early morning hours of November 9, 2016.
That’s when it became apparent that their sophisticated voter research had completely failed to predict the outcome of the U.S. Presidential election. Longtime Republican political strategist Mike Murphy went so far as to assert that “data died” that night.
Yes, the 2016 U.S. Presidential election was a highly visible casualty for data-driven research, but far from the only one.
In 1985, Coca-Cola announced the rollout of “New Coke,” an updated formulation of the venerable soft drink, designed to appeal to changing consumer tastes.
More of the Customer Think article from Jon Picoult
Recovering from a ransomware attack doesn’t have to take days
It’s one thing for a user’s files to get infected with ransomware, it’s quite another to have a production database or mission-critical application infected. But, restoring these databases and apps from a traditional backup solution (appliance, cloud or tape) will take hours or even days which can cost a business tens or hundreds of thousands of dollars. Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.
Quickly pinpointing the time of infection
With a cloud backup, it takes a while to determine if your application has been corrupted. Admins must download the application files from the cloud (based on your most recent backup), rebuild, and then compile the database or application.
More of the ITWorld post from Ryan Francis
Replicating the production security infrastructure at a disaster recovery site can be a problem: Professor Avishai Wool looks at how organizations should approach security policy management in their disaster recovery planning.
When it comes to downtime and cybersecurity attacks, despite many high profile incidents in the past year many businesses are still stuck in the mind-set of ‘it won’t happen to me’ and are ill-prepared for IT failures. And with IT teams facing a broad range of unpredictable challenges while maintaining ‘business as usual’ operations, this mind-set places organizations at serious risk of a damaging, costly outage. Therefore, it’s more important than ever to have plans for responding and recovering as quickly as possible when a serious incident strikes. As the author Franz Kafka put it, it’s better to have and not need, than to need and not have. In short, effective disaster recovery is a critical component of a business’ overall cybersecurity posture.
Most large organizations do have a contingency plan in place in case its primary site is hit by a catastrophic outage – which, remember, could just as easily be a physical or environmental problem like a fire or flood, as well as a cyberattack. This involves having a disaster recovery site in another city or even another country, which replicates all the infrastructure that is used at the primary site. However, a key piece of this infrastructure is often overlooked – network security – which must also be replicated on the disaster recovery site in order for the applications to function yet remain secure when the disaster recovery site is activated.
More of the Continuity Central postCon
We’re reaching a point of maturity when it comes to cloud computing. Organizations are solidifying their cloud use-cases, understanding how cloud impacts their business, and are building entire IT models around the capabilities of cloud.
Cloud growth will only continue; Gartner recently said that more than $1 trillion in IT spending will, directly or indirectly, be affected by the shift to cloud during the next five years.
“Cloud-first strategies are the foundation for staying relevant in a fast-paced world,” said Ed Anderson, research vice president at Gartner. “The market for cloud services has grown to such an extent that it is now a notable percentage of total IT spending, helping to create a new generation of start-ups and ‘born in the cloud’ providers.”
More of TheWHIR post from Bill Kleyman
On a day when a blizzard was pasting Maine and Northern California faced a dire flooding threat, several of the National Weather Service’s primary systems for sending out alerts to the public failed for nearly three hours.
Between 1:08 p.m. and 3:44 p.m. Eastern time Monday, products from the Weather Service stopped disseminating over the Internet, including forecasts, warnings, radar and satellite imagery, and current conditions.
Updates to the Weather Service’s public-facing website, Weather.gov, ceased publishing.
In an email to staff on Tuesday, David Michaud, the director of the Weather Service’s Office of Central Processing, said a power outage had triggered the outage and characterized the impacts as “significant”. The cause of the outage was under review, a Weather Service spokesperson said.
“[I] want to ensure you that everyone involved is working hard to avoid these outages in the future and find ways to better communicate to employees across the agency in real time when outages occur,” Michaud’s email said.
More of the Washington post article from Jason Samenow
At the 8th Annual Cloud Security Alliance (CSA) Summit at RSA in San Francisco, Skyhigh Networks unveiled its ‘Custom Applications and IaaS Report 2017’ report.
Conducted in partnership with the CSA, the report is based on a broad survey of software development, IT administration, IT security, operations and devops professionals across the Americas, EMEA and Asa Pacific, involved in developing, deploying and securing custom applications. While respondents forecast rapid IaaS adoption, they at the same time expressed numerous unresolved concerns about the security and compliance of their custom applications in IaaS platforms.
“Custom applications are a core part of how our business operates, and moving these to the cloud provide IT an opportunity to ‘start fresh’ with the right visibility, controls and overall security, without getting in the way of business operations,” said Stephen Ward, CISO, TIAA. “Meeting our security requirements for our applications, as well as our IaaS environment, is absolutely critical to accomplishing our business goals for cloud and overall software programs.”
Some of the key findings from the survey include:
Every company is a software company. Every company has developers writing custom code to improve engagement with employees, partners and customers.
More of the Continuity Central post
Rachel Botsman has spent over a decade thinking about the “sharing economy.” As an an author and a visiting academic at the University of Oxford, Saïd Business School, who researches how technology is transforming trust, she’s an authority on the subject. She’s also one of Fast Company’s Most Creative People. She is currently writing a book, due out next fall, about the new decentralized economies and how that has changed trust.
I recently chatted with her about what this means for the future of leadership. What follows is a transcript of our conversation. It has been edited for space and clarity.
Can you talk a bit about your current project and its background?
In 2009, I wrote What’s Mine Is Yours about the so-called sharing economy.
More of the Fast Company article from Cale Guthrie Weissman
You are probably already familiar with the Net Promoter Score (NPS), a metric used to gauge the health of the customer relationship. Although it is widely used by companies, most people don’t know that it actually has three serious problems. First, the “research” behind the NPS claims is flawed. Second, the calculation of the metric (a difference score) results in an ambiguous score that is difficult to interpret. Third, the NPS is insufficient in measuring the multidimensional nature of customer loyalty.
In 2003, the Net Promoter Score (NPS) was formally introduced by Fred Reichheld, and, today, it is used by many of today’s top businesses to monitor and manage customer relationships. Fred Reichheld and his co-developers of the NPS say that a single survey question, “How likely are you to recommend Company Name to a friend or colleague?”, is the only loyalty metric companies need to grow their company.
More of the Customer Think post from Bob Hayes
Another week, another major airline is crippled by some kind of software glitch.
If you feel as if you’re hearing about these incidents more often, you are—but not necessarily because they’re happening more frequently.
Delta Air Lines Inc. suffered an IT outage that led to widespread delays and 280 flight cancellations on Jan. 29 and 30, a problem the carrier said was caused by an electrical malfunction. A week earlier, United Continental Holdings Inc. issued a 2 1/2-hour ground stop for all its domestic flights following troubles with a communication system pilots use to receive data.
These two shutdowns were the latest in what’s been a series of computer crack-ups over the past few years, including major system blackouts that hobbled Southwest Airlines Co. as well as Delta for several days last summer—affecting tens of thousands of passengers.
More of the WHIR post from Bloomberg