DevOps and The Cloud
ALCG Journal by Andrew Lehman
We have been testing both platforms with some interesting results. In brief, regarding Chromebooks, we found the biggest challenge was posed not by running on the Chromebook network-centric platform, but by the underpowered hardware that characterizes most Chromebooks. A Chromebook running on hardware comparable to a mainstream business-class notebook, like the Chromebook Pixel, pictured above, became a viable alternative to a Windows-based notebook for many use-cases. Once you then consider the inherent security and low maintenance costs associated with Chromebooks, the platform starts to look like it could be a bright alternative to the Windows notebook . Likewise, and on a comparable hardware platform, though with more local storage and memory, we found that a Linux-based layered platform was also surprisingly nimble, stable, and usable and could also be crafted into a secure, business-class solution.
Pull the Trigger on Multi-factor or Tokenized Authentication
Let's not bury the headline: you and your company are targets of sophisticated cyber attacks.
The real international conflict we see all over the world today is reflected on the Internet, as are the real dangers. The world is getting more dangerous as national governments and other groups engage in aggressive, violent campaigns. Likewise, there are national governments, terrorist groups and organized criminal organizations pursuing blatant and often sophisticated, persistent, aggressive and illegal activities in cyberspace. You and your company are targets, now, and ever day.
Because of this, it is important to implement security measures consistent with the magnitude of the cyber threats confronting us in today's environment. Though it is easy to be overwhelmed by the urgent and seemingly endless demands of today's rapidly evolving and increasingly demanding corporate environment, it is important not to allow critical security concerns to be relegated to the back burner.
Our users and our customers are getting more technically sophisticated and demanding, less patient and forgiving. While we in IT want to pursue the role as the leaner, faster corporate IT partner, eschewing the old image as a plodding bureaucracy, it is at the same time our responsibility as the experts to provide, metaphorically speaking, the car that is both fast and safe, and this is what our users and our customers expect from us.
So, plan & pursue a security road map as a high priority.
Step up your access game. Enable multi-factor or tokenized authentication.
Secure your devices. Lock-down end-user devices with appropriate rights. Remember, when a driver buys a car, she may want it with features X, Y and Z, but underlying everything, she expects the car we provide will be safe.
Leverage Partners & Service Providers. Use subject matter expert partners and service providers whenever possible. A good partner or service provider should be able to leverage economies of scale and focus to provide a superior service with equal or better security than you can provide internally, at a lower cost. Work only with partners and service providers who will work closely with you, provide sufficient transparency and who will participate in audits.
In today's dangerous IT environment, effective IT security, procedures and policies are increasingly critical to everyone who depends on technology and the Internet. The simple truth is, if you are not prepared, you will be a victim. Act now.
The Horses for Sources blog of the HfS outsourcing community this week writes about a revelation by by Mark Smith, CEO Ventana Research, about the practice of some large technology verdors of paying research firms or analysts for the right to review and approve research by analysts before it is published. So, despite what you may think, the independent analysis you think you are reading my not be so independent and unbiased. Not so surprising really. The firms are in it to make money after all.
Whatever you think of the practice, this informs how you should deal with the analysts, and Horses for Sources goes on to suggest a few questions you to ask your research firm before you rely on the research they provide to you.
Many of the thngs Dan Rockwell writes about resonate with me. In this list, "Ask 'what' and 'how' more than 'why' really resonates with me. It may may seem counterintuitive at first blush, but if the objective is to move ahead towards your goal, then "what" and "how" focus more on what to do and how to overcome the obsticle and move ahead and less on assigning blame and focusing on problems. Of course you need to understand what happened and why in order to figure how to proceed, but the emphasis should be on 'how do we proceed'.
8 Behaviors that propel leadership success: