This is definitely a business topic which understands that end-users of this technology would rather not or simply cannot develop a rational thought pattern about computers in general; only to slowly, almost as if gently falling like a leaf to the ground, an acceptance that either computing is wholesome for the whole family and there is nothing terrible about computing activities or the far-side; reality pokes you in the face and says directly - you maybe suffering from group-think, blinders being on too tight, and refusing to acknowledge the underlying fact of covert data corruption, retrieval, data-mining and the notorious memory stick; the act of finding specifics.
Whether you are a casual or heavy user of a personal computer (PC-Windows or Linux) or a Mac, anyone who uses a computing device (PDA, Blackberry, tablets) are exposing themselves (private information) to the world. The applications and products available are astounding but once in a while, someone finds a way inside.
Anyone who has a history of laboratory research, spent time in a military community, or a related technical focus knows that the ground is always alive with activities that the above-ground dwellers do not or refuse to understand and accept as fact.
We live in a society where tele/cell phone tapping, Internet-web pass-through to data-mining, the passing of viral infected code to your own electronic database and email has been proficient and successful in snatching your own identity.
My government protects me - that is a surface and above-ground dwellers attitude - that's the play you went to and the play you'll leave with; fixed in your head. Is it true? Of course it's true - what about 'Liberty for All' and the Bill of Rights' - truths for the above-ground dwellers.
During the same time frame, the under-dwellers or below-ground activities never stop. They have never stopped and actually picked up steam during 1945, before and after that year. The Internet developed by the U.S. Government to pass information, is a factual, theoretical, and operational success during the Vietnam exercise and others, too plentiful to mention. The practice has grown and what you see today is a global menace for many governments - the Internet.
Back to the main topic of safe computing and the fears of electronic data processing. These topics scare me and if we as users of this technology are not mindful of their destructive power, and only left to a few.
Electronic Data Processing is 'BIG BUSINESS', alive and doing extremely well today, throughout the World. Business data is yours and I assume protected w/ redundancy appliances, circuits with different vendors, backup disaster power supplies, off-site storage and malicious code-breakers and malware.
Anyone today, can pay $25 USD and receive a frightening amount of personal data (electronic data mining - processing) on anyone in the World.
Business needs:
1. Look for Spies Within You Organization...Skeptical of resumes is a good start. Background checks are only the tip of the iceberg and meant to deceive.
2. Trust No One: Especially your executives. Most are their for fattening; their style and future dreams - not yours.
3. When someone is Found To Be Worthy: Good - but beware; moles can appear as brilliant rays of sunshine. Years of loyalty really is not the gauge. What is?
The best gauge which works is plain talk; all subjects NOT off limits, the moderate, the left of center, the center, the left of right and NOT the far-right ranting...We just don't have the time nor the collective inclination to witness another group of people, swallowing hook-line and sinker as meritorious. Can they be saved or do they want to be saved and saved from what? They can help to keep people fully aware that we are being watched through many different electronic processing devices which run the gamut of cell phones, radio frequency interception (WWII), digital scanning, eye biometrics, Internet surfing and where you go, blogs you subscribe too and a whole lot more.
The HAIR play has a line about 'electronic data processing', and it is from this enterprise concept which provides a larger view of what can and has gone wrong (EDP) that I provide this rebuttal. EDP started w/ the larger computing main frames and research will show those inclined to venture closer to the truth, startling appointments and criminal tasks upon our American Civil Liberties were committed using electronics. With today's EDB (electronic data bases), a thousand million trillion of databytes on so many subjects from moon rocks to turtles will overwhelm the uninitiated.
And so it is, a foundation and bedrock of a technology that we as business men and women must be properly engaged and educated to uncover and pin-point not only the above-ground benefits of an emerging technology but bring forth from the shadows the below-ground activities in which we so blithely misinterpret.
To drive this even further into another reality ; Remember the Pringles can of potato chips scenario? An antenna made out of an empty potato chips can which successfully received business transmissions from wireless devices in an airplane manufacturing plant. The signals went over the strong metal fences of an Everett Boeing Plant, were captured and decrypted using an off the shelf product any savvy techno geek can operate. That was sadly, for Boeing a reality and it really happened.
Entertain and be watchful for the other watchful eye in gaining a perspective, perhaps an unfolding for a better business life lays just below your horizon.
December 09, 2006
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment