Security Risks of Today’s Software Driven World: The Importance of Encryption

Security Risks of Today’s Software Driven World: The Importance of Encryption

ASIC’s (Application Specific Integrated Circuits) or PLC’s (Programmer Logic Controllers) were previously used to perform specific computing tasks at high efficiency, on a hardware basis. But in today’s software-defined or software-driven world, the priority is flexibility and upgradability, so not just your PC and Smartphone but also Kitchen Appliances, TV’s, Security Cameras, Smoke Detectors, Cars, etc. must all be connected to the Internet.

It is hard enough keeping your laptop protected from the latest attacks. But all these “computing platforms” offer new pathways for hackers to steal your confidential data, plus disrupt your personal and professional life. So what should you do? Three things:

First, change every single password monthly, plus use a password management tool. This is a cumbersome but necessary step, to stay away of cyber-criminals.

Second, set up a VPN to encrypt all outbound traffic/data after you hit the “send” button.

Third, keep hard copy and printed records of all financial assets, tax documents and legal information.

And of course, come to an Angelbeat event in your city, to learn directly from the experts.

Internet of Things (IoT) Security Risks

Hear CEO Ron Gerber’s insights on the DDoS attack that halted Internet traffic throughout the United States, caused by hackers taking over WiFi-enabled cameras and thermostats. The darkside of the Internet of Things

How Facebook Can Compete with Microsoft, Google and Amazon Cloud Services: Parallel Processing Across Users

How Facebook Can Compete with Microsoft, Google and Amazon Cloud Services: Parallel Processing Across Users

Readers of the Angelbeat blog know my predictions on big three cloud winners – Amazon, Microsoft and Google – leaving everyone else, including HPE, IBM, Rackspace and others, to fight for leftovers. That is still largely the case.

Last week, Facebook announced its expanded job search and recruiting capabilities, putting it in direct competition with Linkedin. As Facebook looks for new growth in established US and Western markets, where it has hundreds of millions of daily users, expanding into B2B applications makes sense. But I think that this job-related push is just the tip of iceberg, with Cloud Computing services likely to follow.

Facebook can utilize its existing data center infrastructure, plus tap into the largely unused computing power of billions of individual users (parallel processing architecture), and emerge as a viable competitor to the Big Three.

Keep reading the Angelbeat blog and let’s see what happens…

Identity Theft in Today’s Digital World – Why You Still Need Paper

Identity Theft in Today’s Digital World – Why You Still Need Paper

Last month, the world seemed to end as Twitter and Netflix were shut down for almost a full day. Cyber-terrorists launched a DDoS or “Distributed Denial of Service” attack. Without going into technical details, the terrorists were able to block these websites from getting onto the Internet/World Web Wide, so no one could access them from their PC or smartphone. Think of a tree falling down and blocking the drive-through window at a fast-food restaurant, so no one can pick up their breakfast coffee and Egg McMuffin at McDonald’s. So how did they do that? That is where things get interesting and a little scary.

As you can imagine, Twitter and Netflix have lots of different ways, to ensure that their sites are operational and on-line. These cyber-criminals however, hacked and took over hundreds of thousands of individual webcams, that were connected to the Internet from a PC, Nanny Camera and/or home security system. The cyber-criminals then turned every single webcam (using this same driving analogy) into a “tree” that blocked the site. It took about a day to remove the trees, but there are some important lessons.

First, our lives are critically dependent on a robust and always-on Internet. But if bad things happen – which they will – remember to keep hard copy backups of your vital records. It may sound old-fashioned but sometimes paper works very well.

Second, in the very near future all of us will live in a smart home, with cameras, lightbulbs, air conditioners, locks and cars connected to the Internet  – controlled from your smartphone. This so-called Internet-of-Things or “IoT” phenomenon can make your life much easier, but increases the risk of identity theft. Just about everyone knows to install an anti-virus program on their home PC; but now do you have to worry about anti-virus for your lights or refrigerator? Not yet, but that is why you should keep old-fashioned paper records, containing all your personal and financial data. So if your identity is stolen, then you can easily re-create it based on these hard copies.

So while technology is great, exciting, cool and rapidly changing, keep using paper in case something goes wrong. And it will….

Angelbeat 2016 Mid-Year Review

Here are Ron Gerber’s thoughts on Angelbeat’s performance through the first half of 2016 – 45 events! – and his strategy for making the events even better through year-end.

Microsoft 2015 Q1 Commentary: Windows, Office, Phone Strategies

Hear Angelbeat CEO Ron Gerber’s insights on Microsoft as they struggle with negligible market share for windows phone (despite $10 Billion investment), negative cash flow impact of free office app for Apple iPhone and iPad clients, and competitive response from traditional Windows customers (HP, Dell, Lenovo) from aggressive Surface marketing.

NSA access to personal data; security or vulnerability?

Edward Snowden and Wikileaks have confirmed what everyone already knew and/or suspected. That government agencies, mainly the NSA, actively collect and analyze personal data. Hear Ron Gerber’s insights on this politically-charged subject and if you should feel safer or worry.

The Rise of the Smartphone as Digital Wallet

The iPhone6, with its fingerprint reader and complementary secure mobile payment system Apple Pay, is the catalyst behind the possible elimination of physical credit cards, according to Angelbeat CEO Ron Gerber

Changing of the Guard: Apple vs IBM vs Microsoft

Apple Earns $8B while IBM has to pay $1.5B to unload its money-losing semiconductor business. Hear Angelbeat CEO Ron Gerber discuss these related financial announcements, which clearly demonstrate a changing of the guard in IT.

Surface 3 Marketing

Listen to Angelbeat CEO Ron Gerber assess the impact of Microsoft’s Surface marketing campaign on its traditional OEM customers – HP, Dell, Lenovo – who now compete directly with their Windows operating system supplier.


HP & Symantec Spinoffs: Bankers, Lawyers Win; What About Customers & Employees?

HP & Symantec Spinoffs: Bankers, Lawyers Win; What About Customers & Employees?

HP and Symantec have reversed course and are splitting their companies: HP into PC/Printing and Enterprise/Server/Storage/Security, Symantec into Storage and Security. (Now if Symantec is correct then HP should have split into at least three companies, with Storage/Server separate from Security, but that is the subject of another blog….)

Let’s cut through the PR blitz and discuss if/why this makes sense and who are the guaranteed winners in these transactions (bankers, lawyers, directors, consultants, not employees nor customers).

Conglomerates and growth by acquisition came into “vogue” in the 1960’s/1970’s. Industrial conglomerates like ITT acquired many diverse companies with no customer-centric commonalities – from banks to hotels to pump manufacturers – and sought to achieve “synergies” by combining adminstrative functions like accounting with “superior” management skills.

This approach became problematic for two reasons. First and most importantly, administrative functions, overhead costs and bureaucratic inefficiencies increased because it actually became more complicated (not less) to manage these unrelated entities. Second, the acquiring conglomerates were publicly-traded companies. They had a fiduciary responsibility to communicate their corporate strategy to Wall Street, to promote and drive up the stock price. But the investment community could not understand their corporate strategy. So to address both problems, these conglomerates pursued spin-offs: the divestiture or selling off of businesses.

Both HP and Symantec, much like Cisco, IBM, Oracle, Microsoft and others, have pursued acquisition-driven corporate strategies within the IT space, to increase the breadth and scope of their offerings. So for instance, Symantec bought Veritas – recognizing the security issues are linked to where and how data is stored – while HP bought Compaq – believing that scale is necessary for success in PC’s. These acquisitions offered many theoretical and real benefits. They each became a larger and presumably more important supplier to customers, distributors and VAR’s/Resellers. Technical integration/links could be created within their products, maintaining interoperability across other vendors but working “better” within the company (similar to McAfee security Anti-virus running fine on AMD but better on Intel). HP in particular had greater leverage over suppliers, given the now larger PC business and many common elements between PC’s and Servers. So why the change now?

In the case of HP, two reasons. First, PC industry slowed dramatically, driven by Apple product adoption. Plus Microsoft emerged as a formidable and aggressive competitor, grabbing market share in a stagnant industry from HP. But you lose a lot of operational savings, plus you are saddling current HP shareholders with this seemingly unattractive business (unlike IBM, which generated billions in cash by selling their PC business to Lenovo, which in turn is reaping the benefits of scale/size as the dominant OEM PC manufacturer). It seems like the main catalyst was responding to Wall Street and Hedge Fund pressures, which views a challenging PC market as weighing down the HP stock price. (Now if HP hadn’t wasted over ten billion on acquiring Autonomy, maybe these financially-driven pressures wouldn’t exist but again that is the subject of another blog.)

With regard to Symantec, Wall Street pressures were again the driving force behind this spin-off, but there weren’t any extraordinary, external factors (like Apple and Microsoft coming at HP). Instead neither business unit was performing up to expectations, in growing markets. There is the hope that having two companies, each focused on a single segment of IT, will perform better. I have some personal questions if this really makes sense, plus Symantec loses lots of operational/marketing benefits.

But this is what the Board of Directors and Executive Management have decided for HP and Symantec, and I am doing some Monday Morning quarterbacking. The real answers will emerge in 2015/2016 but right now it is easy to see who the immediate winners and losers are.

Right now, employees are somewhat concerned, less in manufacturing and product design and more in centralized functions such as accounting, marketing, purchasing, legal, etc. Even though the businesses have operated somewhat independently for years, there is uncertainty, new bosses, updated logos, revised agreements, etc. Presumably there shouldn’t be any layoffs – in fact shouldn’t there be new hiring? – but most employees don’t like change, are probably taking a “wait-and-see” perspective, and updating their resume just in case.

Customers are probably more worried. They have heard countless presentations from HP and Symantec on the value of size, product integration and synergies. Now  they are getting a whole new series of talks, on product focus, eliminating bureaucracies, etc. IT executives place a great deal of trust on their vendors, and these spin-offs only increase anxiety. Another “wait-and-see” scenario, but with more downside risk.

The real winners are the bankers, lawyers, consultants and Directors, who are going to cleanup. Benefit consultant Mercer, for instance, is paid over $200,000 for executive compensation recommendations. Each Director (of which there are about ~12 per company) is paid >$300,000 to attend a few meetings. Each spin-off company can no longer share and must individually pay ~$5 million in annual compensation and Board of Director costs. To put this in perspective, if HP makes about $50/PC (best case scenario), then they have to sell another 100,000 PC’s a year, just to cover this expense. It will take ten’s of man-year’s of legal and investment banking work, to untangle all the past acquisitions, which will be billions of dollars in one time charges.

So the only thing for certain today is that a very few highly paid individuals will get even more money, while employees and customers can only hope for the best.

Cash Registers & Copiers – “Backoff” Attack – New Threat Vector

Cash Registers & Copiers – “Backoff” Attack – New Threat Vector

Last Sunday, I was enjoying my morning coffee and reading the NY times at the local diner. It was slow and the cash register was in sleep mode, with the Windows XP logo floating across the screen. The diner owner clearly wasn’t concerned about XP end-of-life and no updates/support over the past four months. Tens of thousands of other retailers probably have a similar lack-of-interest in buying new cash registers, which is why the “Backoff” malware – allowing hackers access to credit card data stored on these old devices – is so pervasive and dangerous. This threat goes well beyond Target.

It will take many years before EMV Smart Chip Technology – which stores data on a highly secure chip versus the relatively unprotected magstripe – gets widely deployed amongst both credit card issuers and terminal manufacturers. This is the best solution. In the meantime, when you see the XP logo floating across the cash register at your local store or restaurant, just pay cash and give up the points. Or be willing to check your credit card statement online, every day, for possible identity theft.

Backoff reminds me of the threat vector poised by copiers, or “Multi-Function Devices” (MFD’s), as Xerox likes to call them because they copy, print, scan, fax, etc. MFD’s are not protected by anti-virus or firewalls, and while they are not running XP, sensitive data can theoretically be access by hacking through the fax phone line, network cable connection, and/or over wifi with newer machines. Your internal security team, possibly with some outside help (there are reputable and honest “ethical hackers”), should conduct their own simulated attack and confirm that your confidential information is not at risk.


Lessons Learned at Angelbeat – iPad Case Study – IT Driving Workforce Productivity

Lessons Learned at Angelbeat – iPad Case Study – IT Driving Workforce Productivity

I recently had a great conversation with Tom, the head of global desktop architecture at one of the world’s largest financial institutions. He attended the Angelbeat 2010 seminar and got a lot of good insights around wireless and security. This proved extremely useful when the CEO bought a first generation iPad and pushed his boss (the CIO) to make email work on the tablet. But the IT organization was nonetheless reacting to a Line-of-Business (LOB) request.

Four years later – and after hearing comments from me and other Angelbeat presenters about IT organizations pro-actively driving workforce productivity – Tom told me about a great project that he initiated with real estate. They conducted a study and determined that on any given day, 36% of their workforce is not at their desk: traveling, on vacation, sick, meeting with clients, etc. So the company is theoretically leasing 1/3 more space – in very expensive metropolitan cities – than it needs, at a cost of billions of dollars.

Tom proposed that the company use a hotel-style system, whereby individuals would no longer have an assigned desk, desktop PC and dedicated phone. Instead IT would enable the iPad (or laptop or even a smartphone) to become the center of a flexible voice/data/video unified communications platform. With a robust wifi infrastructure, complemented by enhanced security, individuals would be assigned an open desk and use their iPad to do their jobs. To make phone calls (all done over wifi) just use a bluetooth earpiece, or if a traditional handset was preferred then an iPad docking station was available (see photo above). Traditional keyboards and larger display monitors could be “checked out”, as these items are needed to efficiently “produce” content (versus just reading/browsing the web).

Over the next ten years, IT projects total savings (from consolidating offices and reducing the total square footage of leases) in excess of $3 Billion.

What a great success story that we can all learn from!

Microsoft Nokia vs Amazon Fire: Marketing/Financial Comparisons

Microsoft Nokia vs Amazon Fire: Marketing/Financial Comparisons

Microsoft and Amazon are battling to become the number three player in the smartphone market (I can’t see Samsung nor Apple losing their top positions anytime soon). It is interesting to compare how these two Seattle tech giants decided to enter the market, from a marketing, business and financial perspective.

Microsoft, despite having hardware manufacturing expertise with Xbox, Surface, keyboards and mice, decided that they wanted to acquire market share and expertise, hence their Nokia acquisition (I still think that they should have gone after BlackBerry….). But the total cost is at least $13-15 Billion, including the purchase price of $7 Billion, $1.5 Billion in layoffs (you buy a company just to fire 50% of the workforce?), $3 Billion in annual and on-going operating losses, with no profitability expected in the short-term, not to mention other expenses that are harder to isolate/quantify. I guess with more than $50+ Billion in the bank, you can make big bets. And it is rumored that Microsoft spent this much for Nokia’s patents, just as it cost Google $10 Billion for Motorola’s intellectual property.

While Microsoft does promote OneDrive and automatic cloud backup of all photos with its Smartphones (nice touch but the same feature is available on Apple and Android), I am surprised at the lack of explicit and tight integration with Skype, XBOX and Bing. It is there, but you have to look for it and don’t hear much about it.

Amazon took a much different approach, in two main areas. First, they decided to build their own device and avoided billions in acquisition costs, given their Kindle hardware experience. Second, they strategically integrated the phone with their core retail and growing video/music business, through the Firefly technology (no wonder that Best Buy is struggling) and one-year of Amazon Prime, including free content and shipping. These marketing expenditures are a lot easier to justify when you don’t have to buy another company.

Both companies are admittedly struggling in the US market but this a long-term battle, with tremendous strategic importance. While there are questions/concerns about Microsoft’s approach – much bigger, riskier and expensive – this is just the first inning.

Top 4 IT Careers: Security, Cloud, Apps, Big Data

Top 4 IT Careers: Security, Cloud, Apps, Big Data

Many recent college graduates – and friends’ children – ask me what are the best career areas within IT. Here are my thoughts on the four areas that offer the greatest opportunities for personal satisfaction and professional advancement.
From Target Breaches to Russian Cyberattacks to the growing attendance at Angelbeat regional seminars and Black Hat national conferences, IT security remains a rapidly growing field. Criminals no longer need to rob a bank; they just hack into corporate servers. Digital information is as valuable, if not more, than gold.Cloud

Putting your infrastructure and storage in the Cloud is the de facto IT architecture for any startup, and increasingly used by enterprises of all sizes. But there are legitimate security concerns, strategic tradeoffs/limitations and financial issues. It is not always better and cheaper to go to the cloud. Understanding this dynamic, and being able to design the appropriate private/public hybrid cloud platform for an organization, will be a very useful skill for many years to come.


We live in a world of apps, with “sharing” apps – Uber for cars, Airbnb for travel – the latest buzz. Understanding the digital marketing required to drive tens of millions of users, plus the underlying technology needed to support a rapidly changing and dynamic user base (see cloud above), is a career path pursued by many recent college grads.

Big Data

Driven by the Internet-of-Things, Machine-2-Machine Communications, and Website/Social Media analytics now available by device/operating system/geography/wireless carrier/time-of-day, Big Data is here to stay. Medium-to-Large organizations (this isn’t a priority for small companies) face many challenges in capturing, analyzing and then taking action based on this data. If you have the skills to help in this area, then your career is bright. Quite honestly being recognized as the Hadoop expert at work (Hadoop being the open source software platform that is emerging as the de facto standard) will result in much higher compensation than trying to be yet another Cisco certified network engineer.

The Battle Grows for the Digital Living Room

The Battle Grows for the Digital Living Room

The Fire SmartPhone launch is just the latest escalation in the high-stakes battle for control of the increasingly digitized living room. And yes, this is absolutely a war amongst Apple, Google, Microsoft, Amazon and others, each looking to capture the hearts and minds of the consumer – and of course their pocket book.

In the short-term, this competition is definitely good for the consumer, with tens of billions of dollars being spent to lower prices, improve service, boost quality, etc. Long-term however, there are risks as each firm wants to lock you in on multi-levels (device, application, platform), so going to a competitor isn’t as easy as clicking on another website. That was Google’s standard (and correct) response when it faced desktop-oriented search antitrust questions. But the world has changed in just a few years. Each of these firms is building a bigger and more robust walled-in garden, with an increasing number of complementary and interconnected services/products, to lock in your wallet over many years to come.

My advice to the Angelbeat community is to relax, enjoy and try out many of these wonderful services and innovative products. Lots of free promotions and trial offers. But remain cautious as technology is changing at an ever-increasing rate – remember just a few years ago when the Motorola Razr was so hot? – and keep your options open. In the end content/creativity/design still wins out and you will always find a way to buy something you want (be careful Amazon, in your battles with top authors….).

Some concluding comments:
1. Will Comcast give better service (faster speeds) to its corporate-owned NBC websites/business units, and charge more to Disney and other Comcast/NBC/Universal competitors?
2. Should Microsoft buy Netflix and Barnes & Noble, to compete with Amazon’s video streaming business (perfect fit with xbox) and to take advantage of Amazon’s poor standing amongst authors/publishers? Microsoft already owns a minority stake in B&N’s Nook digital unit.
3. Should and/or will Verizon, Sprint and T-Mobile block the Amazon mobile app from their wireless service?

Edward Snowden – Hero or Traitor One Year Later

Edward Snowden – Hero or Traitor One Year Later

One of my neighbors recently did an online search for a new backpack for her son (needed for summer camp). Then a few days later she did another search for a pressure cooker (planning a summer BBQ).

The next day the FBI arrived at her door, making sure that (God Forbid) there wasn’t another Boston Marathon-type terrorist attack.

Many people were initially caught off guard by this NSA-type surveillance, wondering if there was any privacy left in the world. Knowing my profession and technology knowledge, they asked for my opinion, which is summarized below.

I thought that this Government-driven Big Data Mining, trying to “connect anonymous dots” to keep all of us safe, was absolutely great. There was no explicit targeting of my neighbor, just massive amounts of computing power blindly analyzing data to prevent another attack. All good in my book.

This does bring up the larger question of Edward Snowden, and the role of government in compiling digital records. Before 9/11, government clearly did not do enough. But reading Edward Snowden’s disclosures – and then seeing subsequent actions by Congress – government probably went too far.

I can only hope and pray that our elected leaders, and workers within the FBI/CIA/NSA, find the right balance. As a New Yorker who lost friends on 9/11 and father whose son serves in the Coast Guard’s Law Enforcement Unit, I am comfortable with the government knowing more than less. But that is just one man’s opinion. In the end, my credit card company knows infinitely more about my life, in great detail, than the NSA. And that is okay too.

Google/Android/Motorola vs Microsoft/Windows Phone/Nokia

Google purchased Motorola and Microsoft acquired Nokia for the same strategic reasons and at approximately the same time, namely to strengthen their position in this increasingly mobile world. How these acquisitions have played out offer some revealing insights into these two technology giants.

1. Both used substantial profits from other businesses to fund the multi-billion dollar acquisition price, and cover annual operating losses that are expected to continue for the near foreseeable future.

2. Both saw strategic value in patents/intellectual property, in light of an increasingly litigious common enemy, Apple.

3. Both saw a strategic fit between their core businesses – search and PC/Desktop – and handheld devices, which could not be fully achieved by simply offering a smartphone operating system.

4. Google wants to replicate (in the mobile world) Microsoft’s PC/desktop dominance, which was achieved through a thriving eco-system of vendors, partners, developers, OEM’s, etc. So the Motorola business unit is explicitly separated from the Android development teams, to retain the loyalty/trust of Motorola handset competitors including Samsung, HTC, LG and others. In the end Google wants Android to be as powerful in the mobile space as Windows is in the PC world.

5. Microsoft in contrast, suffering from both Apple envy and virtually no manufacturers willing to build Windows Phones, is going “all in” with Nokia.

The 2013 Holiday season should be dominated by Android and Apple purchases, with Microsoft a distant third. But Microsoft’s long-term commitment to the Windows Phone/Nokia platform – regardless of its next CEO – is a very good thing for businesses and consumers, as it will keep Apple and Google on their toes.

Gates’ Internet Tidal Wave 1995 Memo: How Did Microsoft/Ballmer Respond?

Here is my assessment of Ballmer’s legacy and how Microsoft as an organization responded to Gate’s 1995 Internet Tidal Wave memo and the Department of Justice 2000 antitrust case. Hopefully you’ll find some new insights and let’s start with my grades for Ballmer:

Strategic D: After becoming CEO in 2000 he correctly prioritized the importance of tablets/touch screens, mobile software/smartphones, smart watches, gaming and Internet portals ( With the exception of the (still unprofitable) XBOX, he either executed poorly or prematurely eliminated projects in all these areas, directly causing Microsoft’s current problems.

Leadership/Top Management Development & Succession C-: During the past decade three top Microsoft executives Ray Ozzie (Chief Software Architect), Rick Belluzzo (Corporate President/COO) and Steven Sinofsky (Windows President) all quit or were asked to resign. The lack of an obvious 2013 successor is not good, but understandable in light of these past failures. As a point of comparison, everyone knew the likely candidates when Intel’s past CEO resigned in November 2012. When the successor was announced in May 2013, no surprises, no turmoil, no confusion.

Financial C: Sales and profits grew significantly under Ballmer but this is much more a reflection of Gates, product pipeline and broader global economic growth. The ultimate financial criteria for a publicly-traded CEO is stock price and on this measure he failed.

Technology D: Everything started to go downhill with Windows Vista, Ballmer’s first major update without Gates’ involvement. More recent product upgrades got good reviews but unfortunately it seems like too little too late.

To help determine what Microsoft should do now, in 2013, it is useful to go back to Gates’ 1995 Internet Tidal Wave memo. Click here for the full memo; here is one insightful comment, “The Internet is at the forefront of all of this and developments on the Internet over the next few years will set the course for our industry for a long time to come.”

So Gates, Ballmer and Microsoft got the Internet right almost 20 years, but are now languishing. Why?

First, in the late 1990’s Microsoft focused primarily on the browser (the Netscape wars) and not as much on the applications/websites driving browser usage. Though people do forget that Microsoft launched Expedia in-house before spinning it off as a separate company.

Second, the 2000 Department of Justice antitrust action seemed to drove out not only Gates (“I’m worth $100 billion; do I really need a bunch of government lawyers telling me what to do???”) but also the creative spirit within Microsoft. The Internet Tidal Wave urgency and creative passion was gone.

So what should Microsoft do now?

First, cannibalize your existing cash cows – get people moved to Office 365 from Office 2013 now, before they switch to Google Apps.

Second, give away tablets and smartphones for free (in the United States at least), but lock these devices into Bing search for at least a year.

Third, stop stupid investments like $300 million into Barnes & Noble’s Nook, just because you are scrambling to compete against Google, Amazon and Apple. Instead of wasting this money, you could have given every single one of Microsoft’s 100,000 employees a $3,000 bonus.

Fingerprint Scanner in iPhone 5S, Voice/Video Biometric Sign-on

There is lots of hype around the recent iPhone 5S release because of its inclusion of a fingerprint sensor developed by Authentec – acquired by Apple last year – for increased device security and mobile payment functionality. Couple of observations.

First Authentec was acquired for $350 Million as much for its intellectual property – which strengthens Apple’s position against Samsung and Google/Motorola in Billion Dollar patent disputes – as its fingerprint expertise. Authentec’s annual revenue was $80 million but they lost money on every single fingerprint sensor they sold/made. Authentec’s management team did a great job in securing patents, but could not create a profitable biometrics business. Apple could have simply purchased product and/or licensed the Authentec fingerprint technology but decided (in my opinion) to buy the whole company for its IP portfolio.

Second there is growing pressure on every phone manufacturer to maintain/boost its margins. A silicon-based biometric chip does increase the manufacturing/material cost of an iphone, plus require additional overhead and customer support expenses.

Apple competitor’s, who already build phones with a camera and microphone, can also provide biometric-based device security but use readily established voice and facial recognition software, without any incremental hardware costs. So instead of swapping your finger (which is difficult if your finger is cut or if weather is cold), you simply tell “Google Voice” a predefined word, then point the camera at your face to unlock the phone. This approach provides three-factor biometric authentication – you must know the correct word, spoken with the correct voice, coming from the correct mouth/face – and greatly enhanced security, with virtually no impact on the user. And there is the obvious concern about fingerprint data and privacy concerns in light of NSA/Snowden controversies.

Angelbeat Internal Cloud Deployments – The Power/Weight of Legacy Apps

The challenges and pro’s/con’s of moving Angelbeat’s internal infrastructure to the cloud provides some valuable insights to organizations of all sizes, who are undoubtedly grappling with similar issues. IT at Angelbeat is fairly robust, including onsite and remote/traveling workers, >250,000 contacts maintained on Exchange, customized CRM/event registration apps developed in 1999 (when Angelbeat was formed), a dedicated server/data center/storage room, plus a website that is obviously mission-critical. Here is a summary of what we did and didn’t do.

The website was originally hosted on internal servers but moved to a specialized web hosting firm in 2000. A great decision (if I do say so myself) as hosting can be complicated, is not our core expertise, and the site has never gone down for longer than 15 minutes. Later in 2013, event registration processing will be switched to a cloud-based service such as EventBrite or Cvent. Both entities have links/interfaces already created to social media platforms, plus their webpage displays are automatically rendered correctly across different browsers and hardware platforms. The next logical step.

Data backup was originally done via an attached drive physically connected to the servers. But this creates a single point (or location) of failure, should there be a fire or flood. About 7 years ago, all data files and contact records were also backed up to cloud-based backup firm, and this has worked great. Fortunately I have never needed to recover my information!

The biggest (and in the end unsurmountable) challenge was moving internally-hosted/managed exchange data to an external Microsoft exchange hosting firm. We could not find one that supported public folders, plus preliminary costs were much higher internal expenses. If I were starting Angelbeat today, then using or sugarcrm would be a no-brainer. But given this legacy application that is the core of Angelbeat’s business (just like Cobol applications running on mainframes), we still have our own data center/servers that run exchange. On a related note, remote workers use thin client/virtual desktops applications to securely access this information from any location.

Big Brother Is Watching: How IT, Mobility and Social Media Affect The Individual Privacy vs National Security Tradeoff

Six weeks ago, the two terrorists who planned the Boston Marathon bombing were captured in a matter of days. This was accomplished because today’s incredibly powerful hardware and software can sift through billions – if not trillions – of multimedia data generated on social media sites through handheld, mobile devices. The biggest criticism against government/law enforcement officials was their reluctance to pursue leads more aggressively in 2011, i.e. they seemed to give too much weight to individual privacy considerations and not enough to national security risks.

Last week’s disclosure that the National Security Agency (NSA) collected/analyzed data from Verizon & others generated much negative press. Since the vast and overwhelming number of people have nothing to hide – does the NSA really need to see pictures of my daughter Amanda’s dance recital? – this reaction is understandable. But you can’t criticize government/law enforcement one day for worrying too much about privacy considerations, then take the opposite position the next day.

Having lost friends on 9/11, knowing others who lost limbs in Boston, and with a son serving in the US Coast Guard’s law enforcement group, I am hardly an unbiased analyst. My own take is that we live in a dangerous world, technology has the ability to make it safer, and for that I am willing to accept some government oversight. Let them know that Amanda wore a pink tutu (she looked adorable, by the way). I can only hope and pray that the people in charge of these programs have the correct moral compass, know which youtube postings and tweets matter, and stop the next marathon bombing before it ever happens.