Funny beats Serious, @sochiproblems 282k vs @sochi2014 175k

Whenever someone asks me about creating a viral marketing campaign I tell them that funny things almost always beat serious things.

Here is one example Twitter handle @sochi2014 has 282K followers, started on Feb 4 (3 days ago) with 193 tweets.

Sochi Problems

Sochi Problems

@SochiProblems

I'm a mess, and not prepared for you! Our athletes live like Kings!

Sochi

 

 

The @sochi2014 twitter handle has 175K followers, created long time ago, with 4,808 tweets

Sochi 2014

Sochi 2014 Verified account

@Sochi2014

 

sochi2014.com

 

 

Here is the story of the guy who is behind @sochiproblems.

@SochiProblems mastermind revealed: student Alex Broad

Popular Twitter account by Centennial College journalism student captures myriad of problems at Sochi Games

By Nolan N. White | Posted: Feb 7 2014 2:49 pm

Take an unusually slow day in a Toronto college journalism school newsroom, and a journalism student with a love of sports. Now add controversy over the 2014 Sochi Olympic preparations, and some social media.

What you end up with is @SochiProblems. The Twitter account is the brainchild of Alexander (Alex) Broad, 20, a journalism major at Centennial College in Toronto, and a contributor to the program’s newspaper, TorontoObserver.ca.

Broad himself was unprepared to see his creation, launched Tuesday Feb. 4, as a Twitter account called@SochiProblems, become so popular.  In only three days it has already attracted more than 240,000 followers ranging from ordinary Canadians, to well known personalities in the media, to athletes, current and retired.

 

 

Three lessons you can Learn From Seahawks that are good for Operations

Forbes has a guest post from SunGardAs’s Matthew Goche.  Matthew’s focus is security, but I think his points can apply to Operations in general.

What The Seattle Seahawks Can Teach You About Your IT Security Program

I typically enjoy the Super Bowl. We get together with family and friends to watch the game, laugh at the commercials, enjoy the halftime show, and place predictions on winners. What I love best is an exciting, competitive game. Unfortunately, this past Super Bowl did not live up to my hopes, mainly due to the Seattle Seahawks completely outclassing and crushing the Denver Broncos.

As I watched the game, it occurred to me that many companies’ IT securityprograms resemble the Broncos team, instead of performing like the Seahawks. This is not going to work in business (just as it didn’t in the Super Bowl) for three key reasons:

 

 

 

 

 

 

 

 

 

 

 

 

 

The three steps are 

1. Make fewer mistakes

Broncos: four turnovers. Seahawks: zero. For IT to prevent “turnovers,” change must be managed. Backups maintained. Security reviews conducted.

2. Have no heroes

Unfortunately, far too many organizations forget this fact. They choose to rely on IT MVPs and heroes: i.e., the one developer who knows what to do when a vulnerability is discovered, or the one network administrator who knows what to block when there is a potential breach.

3. Resilient from Top to Bottom

Before these playoffs, few casual fans could have named many of the Seahawks defenders. But everyone watching the Super Bowl found out that the Seahawks defense has almost no weaknesses. The defensive line is built on under-appreciated but high-quality players who are focused on team results, not personal glory.

The post closes with do you want to play like the Broncos or play like the Seahawks?

How do you want your IT security program to perform – like the Denver Broncos or the Seattle Seahawks? If you are the GM or coach at your company, you should focus on building a roster of IT security controls and security-focused IT providers that resemble the Seattle Seahawks.  By being prepared and validating all aspects of your program, you, too, can crush vulnerabilities and thrive in a complex threat environment.

Security is a bit easier when you have a team who works together.  Go Hawks.  Note my family, friends, one of who is a sheriff.

NewImage

Calif Gov't thinks a mandatory kill switch will deter crime, how about a IMEI registration system instead?

ComputerWorld reports on a technical proposal in CA for a mandatory kill switch.

California proposes mandatory kill-switch on phones and tablets

Proposed legislation part of an effort to slow rising smartphone and tablet thefts

By Martyn Williams
February 7, 2014 05:04 AM ET

IDG News Service - Politicians and law enforcement officials in California will introduce a bill on Friday that requires all smartphones and tablet PCs sold in the state be equipped with a digital "kill-switch" that would make the devices useless if stolen.

The bill is a response to a rise in thefts of portable electronics devices, often at knife or gunpoint, being seen across the state. Already half of all robberies in San Francisco and 75% of those in Oakland involve a mobile device and the number is rising in Los Angeles, according to police figures.

I’ve written about the issues created by the airplane mode that take your device offline and you can’t use a kill-switch when it is not on the network.

Another way is to enforce a registration of unique identification system that allows the tracking and ownership of a phone.  IMEI is a number used, but some thought could be put into how ownership of a phone can be determined.

International Mobile Station Equipment Identity

From Wikipedia, the free encyclopedia
 
 

The International Mobile Station Equipment Identity or IMEI /ˈm/[1] is a number, usually unique,[2][3] to identify 3GPP (i.e., GSMUMTS and LTE) and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone, but can also be displayed on-screen on most phones by entering *#06# on the dialpad, or alongside other system information in the settings menu on smartphone operating systems.

The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network. For example, if a mobile phone is stolen, the owner can call his or her network provider and instruct them to "blacklist" the phone using its IMEI number. This renders the phone useless on that network and sometimes other networks too, whether or not the phone'sSIM is changed.

The IMEI system is not perfect.

The IMEI number is not supposed to be easy to change, making the CEIR blacklisting effective. However this is not always the case: a phone's IMEI may be easy to change with special tools. In addition, IMEI is un-authenticated mobile identifier (as opposed to IMSI, which is routinely being authenticated by home and serving mobile networks.) Spoofed IMEI can thwart all efforts to track handsets, or target handsets for Lawful Intercept.[citation needed] Australia was first to implement IMEI blocking across all GSM networks, in 2003.[7]

And neither will be a kill-switch.  

Seems like this would be a good solution to have designed by the people who steal the phones.

Wonder if Snowden gets a job looking at Sochi Surveillance Data

Snowden is in Russia.  Wouldn’t it be ironic if he got access to the surveillance data from Sochi?  

Here is a post on the spying at the Sochi Olympics.

But as is often the case, the bigger threat to visitors may be the one they can’t see. As athletes, journalists, and spectators arrive in Sochi, their every electonic move is being watched. All information transmitted in the country via phone and Internet, including text messages and e-mails, is flowing through the Russian System for Operational-Investigative Activities, according to the U.S. State Department’s Overseas Security Advisory Council. The council is warning American travelers that the system, known as SORM, has had an upgrade in Sochi just in time for the games, allowing the Federal Security Service (formerly known as the KGB) enhanced access to communications.

“The system in Sochi is capable of capturing telephone (including mobile phone) communications; intercepting Internet (including wireless/WiFi) traffic; and collecting and storing all user information and data (including actual recordings and locations),” the U.S. council, which operates as a joint venture with the private sector, wrote in an assessment for its members ahead of the Olympics. “Deep packet inspection will allow Russian authorities to track users by filtering data for the use of particular words or phrases mentioned in emails, web chats, and on social media.” Of course, the terrorist threat at the Olympics is a real one, and the Russian system is authorized under local law, the report says.

There are two data centers in Sochi.  

Rostelecom Commission Sochi 2014 Secondary Data Center

23 March 2012 / Partners News

A Secondary Data Center (SDC) has been provided by Rostelecom for the Sochi 2014 Games. Its purpose is to guarantee the absolute reliability of the main information systems used by the Sochi 2014 Organizing Committee offices in Moscow and Sochi.

The SDC is one of the key elements of the Unified Information & Telecommunications Infrastructure for the Games and provides the complete backup of email systems, MSDynamix ERP systems, MSOCS systems (Office Communications Server), and DocsVision documentation systems, as well as Organizing Committee catalog services. The equipment included in the SDC is located on platforms at the Rostelecom data processing center in Moscow.

 

Seems like Snowden would have a lot to keep him busy if he got access.

Pssst, M2M is hot, and the smart data center industry guys are at leading edge

I was at Wavefront Wireless Summit and the hot topic is M2M.  

 

NewImage

M2M is machine to machine.

M2M can include the case of industrial instrumentation - comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network(wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information (for example, items need to be restocked).[3] Such communication was originally accomplished by having a remote network of machines relay information back to a central hub for analysis, which would then be rerouted into a system like a personal computer.[4]

M2M is hot thanks to companies like NEST that took the disconnected thermostat and connected to your mobile device, browser and the cloud.

Sitting on a panel and listening. It is really hard to surf the web and look at your e-mail when you are on a panel, so you need to listen. :-)  I realized that the data center industry with its focus on performance of the its electrical and mechanical systems for some of the smart data center guys is probably the most connected M2M solutions out there.  Data Centers are some of the youngest industrial plants.  Yes a data center is an industrial plant.  It is an information industrial plant.  And , uhhh it has a lot of connectivity, storage and compute available if the monitoring of the infrastructure was designed in.  Some of the smartest guys have whiz kids who are creating new algorithms to run their mechanical systems more efficiently, saving money in power used and the maintenance.

Listening to people who need to use cellular connections to get telemetry data from farm equipment is really hard. Is there cell coverage in the first place?  If not, you need to deploy cellular infrastructure.  Data Centers if designed for monitoring have plenty of capacity for M2M.

We don’t about M2M, but state-of-the-art data centers are huge machine to machine environments.  Including the servers themselves are sending GB of data machine to machine.  Splunk and others are doing this.

Need to think about this a bit more on how M2M and data centers should be discussed.  I’ll add category for now on “M2M"