Tag Archives: IT

A Terabyte of Storage Space: How Much is Too Much?

Over stuffed suburban garageI read an article a couple of weeks ago about Microsoft raising the Office 365 storage limit to one terabyte. Office 365 is a solution where the end user pays a monthly fee for the MS Office suite along with hosted storage on OneDrive. I really wonder how much storage is enough? Can I really generate and save enough Word, PowerPoint, or Excel files to fill one terabyte? I decided to dig into it further to see just what will fill 1,000 gigabytes.

Office Documents

It is estimated that 85,899,345 pages of Word documents would fill one terabyte. Now, if you can truly generate that much content, you have a serious archiving task on your hands. I am currently reading the book “John Adams” by David McCullough; it is approximately 650 pages long which means I could archive about 132,152 books of similar size. It has taken me nearly two months to read this book so it would take 66,076 months or 5,506 years to read my entire library. I cannot read that fast, nor do I have that much life left in me.

Music Files

Assuming that an average song takes up five megabytes, one terabyte could fit approximately 200,000 songs or 17,000 hours of music. How many songs do you have on your iTunes right now?

Movies

You could fit approximately 500 hours worth of movies on one terabyte. Assuming each movie is roughly 120 minutes long, that would be about 250 movies. I do know people who have that many movies in their library, so it is possible that they could build a database of movies to fill that space.

Pictures

You could fit approximately 310,000 photos in one terabyte. You could fit even more if you used a compression algorithm. How would you even catalog that many photos? By time, by subject, by category? Suddenly, we are facing big data issues in our personal lives, and we are going to need similar tools to be able to make sense of all of our potential data stores. With digital photography, it is possible to take a lot of photos without ever having to worry about development costs, so maybe 300,000 pictures is not out of the question.

Thoughts

With advances in technology, we have a lot of potential storage space available to us. Microsoft struck the opening salvo, but I expect Google Drive, Dropbox, Box, and others to follow suit. One terabyte hard drives are not uncommon right now and even though we have the potential filespace, can we fill it responsibly? If we can fill it, do we have the skills and tools necessary to keep track of our digital belongings? Perhaps there is a new IT job category—personal archivist—created for those individuals drowning in their digital “stuff.” My point is that we need to take a step back and assess the data that we are keeping and ask ourselves: “Just because I can keep it all, do I need to? Do I have the skills and tools necessary to ever find what I am looking for?”

If we don’t need it and we can’t manage it, maybe it is time to clean out the digital garage. Do you need to clean out your digital garage? Let me know your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

WANTED: More Cybercrime Sleuths

Internet theft - a gloved hand reaching through a laptop screen Last week, a report released by the Center for Strategic and International Studies and McAfee suggested that “… likely annual cost to global economy from cybercrime is more than $400 billion. A conservative estimate would be $375 billion in losses, while the maximum could be as much as $575 billion.” This amount includes hard figures such as money stolen from a bank account or charged to a credit card. It also includes soft figures such as the loss of intellectual property, which is much harder to estimate. In any case, the estimated loss is more that the gross domestic product (GDP) of most countries. The good news is that IT solutions exist that will help reduce this figure.

How IT Is Battling Cyber Crime

IT is battling cybercrime in two ways. One is education of the public on safe computing and the other is through better IT security applications both for server and mobile platforms. Law enforcement agencies around the globe are starting to add more IT security specialists to their organizations. They realize that cybercrime is not a physical crime but a virtual one, although real money or property is lost. They often are not equipped to detect or enforce this type of crime so they are turning to IT specialists to provide that expertise. Credit card companies and banks are also working to devise new IT solutions to detect cybercrime before it happens. I have been issued a new credit card twice in the last few years because of activities that I did not initiate. The first was caught because there was activity at online stores that I do not or would not frequent and the security filters flagged that and notified me. The second time, it appeared that my physical card had been used within twenty minutes in Oregon and Texas. Again, that was flagged as an impossibility, so I was notified. These are examples of how IT can and does play a significant role in stopping cybercrime.

Career Opportunities as a Cyber Crime Fighter

As mentioned above, law enforcement such as the FBI and local agencies are increasing their force dedicated to cybercrime. They are looking for IT specialists in the area of IT security. They are looking for those individuals that have a degree in IT security such as Carnegie Mellon’s master’s degree in Information Security and Technology Management or certifications such as the CISSP or Certified Information Systems Security Professional. This additional training prepares you to take on the challenge of fighting cybercrime. There are growing opportunities for those who have skills in the IT security field. If your current skillset is becoming obsolete, this would be an emerging field that you should definitely consider.

Thoughts

Have you ever been a victim of cybercrime? Did you lose anything or was it detected before a loss occurred? Do you have people in your organization that are dedicated to monitoring and fighting cybercrime? Let me know your story. 

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

 

Jobs of the Future

I have been thinking lately about the jobs of the future and what kind of education and training will be required to perform them. A recent article about the need of a tech hero in the trucking industry caused me to wonder what other new skills will be in demand.

Tech Hero

In the article above, the authors lament the fact that trucking relies on an increasing array of digital devices, both mobile and stationary, within the vehicles. GPS tracking and mobile communication are now the standard. The fleet owner or truck driver, however, just needs to get the load from point A to point B in the most efficient manner possible. The technology helps them do that, but it is a double-edged sword because of the overhead and education it requires to keep all of the devices up and running on the latest revisions. There are other industries that could also take advantage of a tech hero, and it will be necessary to have someone to smooth the digital connection.

Home Systems Integrator

I never thought that I would see the day when home network hubs are a reality, but they are becoming more widespread. With the growing popularity of devices like the Nest home thermostat and smoke detector, and other connected appliances and entertainment systems, the home is becoming a sophisticated network. Already, it can be difficult to set up a new home entertainment system and make sure that it connects and stays connected with the other entertainment devices such as game consoles, movie streaming devices, and the home wireless system. Someone who knows the difference between HDMI and a DVI port could be in high demand because there will be a need to integrate all of these systems.

Personal Digital Assistant

I am not talking about an old Palm Pilot but an individual that would consult with other individuals to make their digital devices work better and connect with each other. As an example, there are thousands of apps available and some interact with other apps and other devices. While we have come a long way in developing a better user experience, certain devices, apps, and programs are not for the faint of heart. We already have the Geek Squad from Best Buy, but I think that people are going to want a more personal experience from someone who understands their unique situation and needs. This will become a growing opportunity for people with the right skills.

Education

The person prepared to take on these new jobs will need to possess a combination of technical, communication, and entrepreneurial skills. Such specialists will have to be well grounded in various aspects of networking, connectivity, and consumer devices. More importantly, they will need to keep up on developments and changes related to this field. Excellent communication skills will be paramount to communicate with individuals—some of whom will require a lot of assistance and others very little. These professionals will need to be skilled at working with people from different backgrounds and of different generations. The entrepreneurial skills will be necessary to start and develop a personalized business niche of such services to individuals and small businesses. I believe that these jobs will be in demand but it will take a special individual to cultivate all of these skills.

Thoughts

Can you think of other new jobs that will develop in the near future? Are you preparing yourself now to tackle those jobs? Let me know your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

Learning Styles, or How I Learned to Put On Chains

Recently I was thinking about the way we learn after being forcefully reminded about my own inclinations and limitations. There are four identified preferential learning styles: visual, auditory, kinesthetic, and tactile. It is believed that most people favor one or two of these learning styles when tackling a new subject or even performing day-to-day tasks.

Several weeks ago, Oregon experienced unusually heavy snowfall, which meant that I had to put chains on my vehicle to get in and out of the neighborhood. Usually a need to chain-up comes up only once a year and I was out of practice. As a result, I got the chains hopelessly tangled and was reminded once again that I am not a tactile giant. No amount of writing or lecturing could get it undone. The only saving grace to my ego was the fact that I spotted a young man in the exact same boat as myself. At least there are two of us in this world!

How do we learn?

The question I pondered was this: do we know our preferred learning style and do we work from that strength? How do we compensate for our weakest inclinations? A visual learner prefers demonstrations and graphic descriptions of a problem. An auditory learner understands best through verbal instructions and listening. A kinesthetic learner grasps the concepts through motion, particularly when he/she can participate. A tactile type learns by feel and manipulation. Most people can learn through all four methods but they prefer one or two. My style is mostly auditory and visual, whereas my son is the complete opposite of me and prefers anything tactile or kinesthetic. This has been reflected even in our chosen vocations.

Teaching

We all have the opportunity to be teachers, even though it may not be our chosen or current occupation. We have formal and informal moments each day where we can teach those around us; it is important that we understand what their preferential learning style is and try to cater to that style. I believe that such an approach is the key to effective teaching, because if the students can learn using their preferential style it will increase understanding. I challenge you to take a moment and reflect on your own learning style and then observe and reflect on the learning style of those you teach. Mix up your teaching style to try and reach all types of learners.

Thoughts

My question is this: can understanding your own preferred learning style help you be more successful in your career and life? Can you find alternative ways to learn a concept so that you learn it faster and more thoroughly?

What is your learning style and how does it present itself in your daily activities? Do you apply your personal preferred learning style to your teaching or do you explore different methods for reaching all learners in your group? Let me know your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

Managing E-mail Overload

My e-mail is officially out of control. To be more specific, my multiple e-mail accounts are out of control. I have all the right accounts and all of the right devices, but the combination of the two are making e-mail management overwhelming. I have a personal account on my local ISP, a work account, a Gmail account so that I can stay connected to all of the cool Google tools, and two different accounts that I use for services that I think might generate spam.

How many devices?

In a recent Capstone paper by AIM graduate Jon Dolan titled “Enterprise-Wide
Techniques to Remediate or Avoid Email Overload”, he defines “e-mail overload” as “e-mail users’ perceptions that their own use of e-mail has gotten out of control because they receive and send more e-mail than they can handle, find, or process effectively”. I was able to manage e-mail when I viewed them only on one device, but I now have two laptops, two tablets, a desktop, and a smartphone. It is very easy and convenient to check multiple accounts on each device but it also raises the possibility of reading the same e-mail—or at least subject—multiple times; that is not at all efficient. Fortunately, there are account settings that will help with this problem, but it really comes down to the question as to how often to check e-mail.

How often to check e-mail?

How often do you check your e-mail accounts? I think I check mine too frequently. I usually have many balls in the air and I try to keep up on the progress of each of those balls or projects. More often than not though, it tends to disrupt my workflow and break up my day. In other words, this pattern actually makes me less productive, just when it is supposed to improve my effectiveness. One thing that I do in an attempt to consolidate e-mail is to sign up for the daily digest version from several Google or Yahoo groups that I belong to. This means that I get one e-mail from the daily activities. The only problem with this approach is that not everyone else follows my style and I miss entire conversations that go on during the day. I am forced to choose between efficiency and inclusion.

Thoughts

I already use filters in my e-mail accounts, but I need to work even smarter to stay ahead of the load. I need to sort out which account to assign to which device so that I am not reading the same e-mail twice. In other words, I need a better strategy for managing my accounts AND my devices!

Do you have a method for dealing with e-mail overload? When you receive an e-mail, do you feel obligated to respond? What if the e-mail is to you only and not a larger group? How do you distinguish between an informational e-mail and one that requires action? Let me know your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

Virtual Currency: One Coin To Bring Them All

There has been a wild fluctuation lately in the value of a Bitcoin, which made me take a second look. What is Bitcoin and what is all the fuss? Why the gyrations now? In short, Bitcoin is a virtual currency that is stored and transferred digitally through an electronic wallet. There is strong encryption surrounding the wallet to ensure that only the owner can transfer or trade Bitcoins for goods, services, or other currencies.

History

Bitcoin was developed in 2009 and there are two ways that you can secure a Bitcoin (or block of Bitcoins). You can mine Bitcoins by setting your computer to the task of solving increasingly difficult math problems that assist in Bitcoin transactions. You can also buy and sell Bitcoins on currency exchanges such as MTGox. The number of Bitcoins is mathematically capped at 21 million and it is estimated that the last Bitcoin will be issued in 2140.

Currency value

What fascinates me is the potential of a new currency that is not tied to a country or state and is not regulated by a central bank, yet is tradeable and can be used for commercial transactions. There are several establishments that are beginning to accept Bitcoins for products ranging from a foot-long sandwich to college tuition to attorney services—even a future space journey aboard Richard Branson’s Virgin Galactic! The value of a Bitcoin in the United States has jumped from $13 in January of this year to currently $1,067. Part of the rise in the last two weeks can be attributed to U.S. Senate hearings around virtual currencies, which lent legitimacy to Bitcoin and others.

Competitors

There are competitors such as Peercoin, Litecoin, and Anoncoin, the latter guaranteeing anonymity by operating in the dark corners of the Internet. All of these competitors hope to cash in on the same speculation that has driven Bitcoin to its current heights. Whether people hoard virtual currencies or spend them for goods and services will be the ultimate test as to how history views them. Will virtual currencies be seen as a speculative bubble, similar to the Dutch “tulipmania,” or, if they become legitimate, a means of trading?

Thoughts

At the end of the day, a currency—virtual or fiat—is really just a medium for exchanging unlike goods and services. The lure of Bitcoin is that it is not yet regulated, it can be traded globally without international constraints, and it does not carry the 2-4 percent transaction fees of credit cards. It relies on the collective power of individual computers on the Internet to process transactions. These are the very same computers hoping to mine new Bitcoins by solving the algorithms necessary to process those transactions. In other words, a very symbiotic relationship as long as there is a lure of potential gain. It is a well thought out system and time will tell whether it becomes a new legitimate currency or succumbs to speculation. Be it Bitcoin or a competitor, I believe that this is the new norm in currency.

Do you own any Bitcoins? Would you invest in Bitcoins or use them as currency? What do you find most attractive about virtual currency? What scares you? Let me know.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

 

Proximity Services: Cool or Creepy?

I have been thinking about technologies that have not yet been fully realized. One that comes to mind is proximity services which has been talked about for at least ten years but is still in its infancy. The idea is that a beacon could send a signal to your phone through the Near Field Communications (NFC) and offer you coupons as you walk by a coffee shop or as you enter a certain neighborhood. In the same vein, if you signed up for a service, you could get notifications when other people on the same service are in your proximity—a high-tech introduction service, if you will. Also, there is the notion that you could use your phone as contactless currency, tickets, boarding passes, and metro fare. Privacy issues aside, some of these services are in place and working now, but we still have a long way to go to fully use the technology available.

Proximity Services

There are phones in Japan now on the FeliCa network that have an embedded chip that allows them to be used as currency or tickets or coupons. Such phones need only come into proximity of a beacon to complete the transaction and do not need to be turned on or have an app engaged. This could make queuing up for a large event quicker and more efficient.

High-tech meetup

Highlight is an app that lets you enter a profile, then will share it with others and let you see their Highlight profile. The caveat is that you have to be in the same proximity. This is like Match.com except if the signal is good you can actually see the other person before approaching them. Remember, however, that they can also see you, and I don’t know if it matches people by profile before it shares, or if it allows you to see everyone in the vicinity. This could be a great way to introduce each other at a party or a reception or conference. Google Glass will make this even better.

Taxi

Another novel use of proximity service is the Zabcab app that uses a smartphone’s GPS sensor. A passenger activates the Zabcab app and a driver in the area that is also using Zabcab can see the request and respond. To make it effective, a sufficient number of cab drivers have to use the app, and perhaps this could be a differentiator for the drivers that are early adopters. If effective, this could replace the dispatch call or the competitive hand waving that goes on in large cities.

Thoughts

I think the reason why these services are not more widespread is that we are not yet comfortable with the privacy issues surrounding proximity services. Many of us are not crazy about having ads pushed at us as well. We could always turn off our phone but I think that there is a middle ground that allows us to make use of this technology to improve our lives while protecting our personal information.

Do you use other apps that employ near range proximity sensing? How do you reconcile the privacy issues? Let me know your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

Who’s minding the store?

I continue to reflect on the ongoing saga of healthcare.gov and the myriad of problems that plague the site. I would like to address some of the best practices in vendor management that will help any IT manager. According to an article in Tech Republic, there are at least fifty-five different contractors working on this project. With so many contractors working on one project, I ask the question: who’s minding the store, and do they have strong project and vendor management practices in place?

Systems Integration

There are 112 different systems under healthcare.gov that all need to work correctly on their own and in conjunction with each other. It is difficult enough when the same group is developing and managing all of the applications, but when there are multiple contractors involved, the task becomes monumental. It takes a very strong and organized project leader who is well-versed not only in project management, but also in vendor management. Such a person is worth their weight in gold.

Vendor Management

More and more work gets done through other people and those people are often outside of your organization and outside of your supervisory control. Many people have honed their skills around project management but less so around vendor or contract management, and traditionally, we have left these tasks up to the procurement side of the organization. They can indeed manage the initial contract and talent acquisition but someone in the home organization, IT in this example, needs to be well-versed in day-to-day management of the outside resources. Are they living up to expectations? Are they playing well with the other players? Are they adhering to the standards that have been set for a particular project? A big part of vendor management is to set service level agreements.

Service Level Agreements

A very important part of successful project management is establishing clear service level agreements (SLAs) with each partner or vendor. A good SLA sets forth specific expectations for the vendor and also specific penalties, should the vendor not meet those expectations. SLAs must include periodic project milestones so that you don’t get to the end of the project and realize that vendor X is nowhere near complete. In short, the service level agreement is a measuring stick to mark progress and a guideline on how to deal with non-performance or less than adequate performance.

Thoughts

We may all be put in a situation some day where we are managing a large project that includes outside players and we have to juggle all of the balls at once. It is a skill beyond just project management and it is worth the investment to learn how to manage contracts and vendors. We may never have to deal with something as complex as the federal health exchange website, but it is a worthwhile skill to have.

Have you ever had to manage contracts and/or vendors for a project or ongoing service? What worked well for you? Share your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

Clean Slate, Fresh Start: Letting Go of Legacy Systems

I write this blog from beautiful Dubai. As I expand my understanding of this region, I marvel at the lack of legacy infrastructure, both computing and community. The United Arab Emirates were only formed in 1971 and Dubai was a founding member. The region obviously existed before 1971 but only as a loose band of tribes. It was another ten years or so before Dubai took off and took advantage of their lucrative port position and the discovery of oil. In effect, the infrastructure shared by two million people and countless visitors is only thirty years old.

What would you do?

Dubai is a very modern city and now attracts ten million visitors a year and expects to increase that to twenty million by 2020. The second airport was just opened this week as the first airport has reached capacity. There is constant construction to keep up with the demand of commerce and residential growth. There are also new roads constantly under construction to meet demand.

The emergence of this region seems unencumbered by legacy infrastructure and it brings me to the question: what would my computing environment look like if I could start fresh and not be held back by legacy systems and legacy networking? What if I could deploy the newest servers, newest applications, and fastest networking? Am I being held back by the structure I already have in place?

Examples

In Dubai, they control automobile speeding by a series of cameras. If you are unfortunate enough to be caught speeding (I know this secondhand only, thank goodness), you will see a flash and then receive a text message with instructions on how to pay your fine. So many systems have to work together to make this succeed. First of all, the camera infrastructure has to be in place. Second, the motor vehicle database has to have complete information tied to each automobile registration. Third, the driver has to have the capability to receive the message and the ability to comply with the instructions. Because they were able to start with a clean slate, they were able to develop this system.

Thoughts

Think about your own situation and ask yourself what is holding you back. Not everyone gets the chance to do a Greenfield project and start everything from scratch. Do you have legacy systems and applications in your business that cost you more than the value they provide? Would it be a prudent investment to finally retire those apps or that hardware and migrate? Would you save money and headaches in the long run? It is something to consider.

Now, I take this metaphor of legacy systems one step further and ask myself: are there beliefs, ideas, processes, and activities in my personal life that are legacy and holding me back? The answer for me is a resounding yes. Is there something that I can do to move off this personal legacy platform and move on to 2.0? Yes. Would my life be more efficient if I were able to move beyond these legacy activities and on to fresh thinking? That is my challenge and I want to make it your challenge this week as well. What can you do to start moving towards 2.0?

Let me know how you are progressing in your journey.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

Ready, Set, Go! The Value of Testing Before a Web Launch

IT has been in the news lately with the less-than-successful launch of the government healthcare exchange website, healthcare.gov. For some, it is an indictment of technology gone wild and for others it is clear evidence of political ineptitude. I am not used to seeing political cartoons about information professionals, but it is becoming the new norm. The reasons behind the failure are complex, but I would like to focus on one this week that I think will help all of us to avoid missteps such as this in the future. One thing that is imperative at a new launch is load testing.

Definition

Load testing is defined as executing the largest number of tasks, under test, that the system can handle. It also means understanding the behavior of the system under that maximum load. Is it just slow or is it completely unavailable? One may be acceptable and the other unacceptable. Load testing is most successful when the maximum number of users or concurrent processes is known in advance. In the case of the healthcare exchange, I believe that there is enough data to predict how many people would try to access the site in any given period.

All the Way Down the Line

It all sounds so simple but it can get very complicated. Not only do you need to test the potential load on the website and the web application, but you also need to test the potential load on the web server, the database serving the information, the database server, and the network tying it all together. Weak performance in any of these can cause the kind of problems seen with healthcare.gov. This is where an IT troubleshooter is worth their weight in gold. Someone who understands the interoperability between all of these systems and processes can root out potential problems before the application goes live.

Common Sense

When to launch a new application or website is also partly common sense. Computer testing can only go so far. If, what is reported in the Washington Post is correct, not only did the load test fail, the common sense test failed as well:

“Days before the launch of President Obama’s online health insurance marketplace, government officials and contractors tested a key part of the Web site to see whether it could handle tens of thousands of consumers at the same time. It crashed after a simulation in which just a few hundred people tried to log on simultaneously. Despite the failed test, federal health officials plowed ahead.”

In cases such as this I think of the immortal words of Walt Kelly: “We have met the enemy, and he is us.”

Thoughts

It is possible to correctly predict the performance of an application and have a wildly successful launch. Do you have stories of successes, large or small? Do you have stories of failures that you would just as soon forget but provided great lessons to you and others? I encourage you to share your story so that we can all learn. Let me know your thoughts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.