Comment (1) Visits (9787)
Well, there's little to no chance we'll get snow in Tucson the rest of this year, so I built a snowman out in Second Life. That's my avatar on the right, andI am an eightbar specialist. Eightbar refers to our logo.
This was part of an IBM "Holiday Party" where dozens of IBMers met "in the virtual world" to participate in 3D competitions,I entered the "Build a Snowman" competition, since I am still a beginner at this. This was whatI was able to come up with in 20 minutes that we had to get it done. Why I made mine out of woodwith different colors was so that I could stand out from the crowd. Everyone else used traditionalwhite snowy textures.
Others had a more challenging "Build a Snow Globe" where you have to write scripts to get thelittle snow flakes to move around. This for the advanced builders of our group.
This is still new, emerging technology, but eventually, Second Life and other MMOs could be used to market products,that people can view from all three dimensions, talk to a technical specialist, and get all questions answered.It could be used for education, shopping around, and collaborating with others.
Anyways, I haven't heard the results, but I had fun anyways.
Last week, IBM clients, Business Partners and executives got together for the inaugural IBM [Think 2018] conference. There were over 30,000 attendees.
In an age of exponentially more data, connected devices and computing power, there are more ways for attackers to breach an organization than ever before. Teams are challenged to manage these threats as they deal with too many disparate tools from too many vendors, an enormous security and IT skills shortage, and a growing number of compliance mandates.
Marc van Zadelhoff, General Manager, IBM Security, kicked off the session "Ready For Anything: Build a Cyber Resilient Organization". The year 2017 was a tough year for security. People can relate to the number of security breaches that happened.
Why do companies struggle in this area? It is not just because hackers have become more sophisticated. IBM Security has over 8,000 security experts to help clients. When IBM is called in, we find 90 percent lack basic fundamentals from firewall rules and patch management. It takes on average 200 days for companies to detect breaches. Sadly, 77 percent do not have a response plan after the breach happens.
To help this, IBM has come up with new terminology. At a certain point, [the shit hits the fan], a Canadian phrase meaning "messy consequences are brought about by a previously secret situation becoming public." Marc explained that it often is accompanied by FBI agents showing up at the front door.
Marc referred to this event as "the Boom". All of the preparation and prevention happen "left of Boom". The clean-up, salvaging your brand reputation, and remediating the damage was called "right of Boom". Here are some examples of a Boom event:
Left of Boom is our domain of choice. We are surrounded with just security and IT problems, problems we have studied our entire careers, involving daily activities we complete with a sense of certainty.
Right of Boom is a completely different matter. Others get involved, including Legal, HR, and sometimes even the Board of Directors. These are distant, hazy problems that don't occur every day, and more uncertainty.
The Boom is not the initial breach, but when the breach becomes public, an average of 200 days later. Hackers can do quite a lot of damage during these 200 days. What might have started as phishing emails, might continue with access to sensitive databases, stolen credentials to other servers, access to internal networks, and additional compromises.
Likewise, companies should not expect to clean up the mess in just a few days either. IT forensics are used to determine the scope of the breach. Regulators and auditors are notified, press conferences and legal dispositions are scheduled to address the public concerns, and social media sentiment might fall.
Back in 2016, [IBM acquired Resilient] a security software company. Ted Julian, IBM VP Product Management and Co-Founder of Resilient, performed a live demo of this software. Basically, it is a dashboard that automates gathering incident data, determines the tasks required, and then orchestrates appropriate responses. This allows the security administrator to launch remediation directly in context.
Last year, over 1,400 customers have taken advantage of IBM's security breach simulator lab, the IBM X-Force Command Center. On the right side of the boom, time matters. What might take 90 minutes manually can be done in two minutes with IBM Resilient dashboard and the right amount of practice and training.
Next on stage were Wendi Whitmore, IBM Security Services, and Mike Errity, Vice President IBM Resiliency Services. While Wendi's team is handling the situation from afar, Mike's team lives in the data center. Mike explained Recovery Time Objective (RTO) and Recovery Point Objective (RPO), which applies to recovery after cyberattack, similar to Disaster Recovery after a hurricane.
Wendi indicates that executives need visibility into what is going on after a breach, and to have retainers involved in PR firms and other industry experts to be called on a short notice as needed right of boom.
Richard Puckett, Vice President Security Operations, Strategy and Architecture, at Thomson Reuters, was the final speaker. Richard spent the first six months of his job uplifting the security protocols at Thomson Reuters. They partnered with IBM to build up their talent for their Security Operation Center (SOC).
Threats are asymmetric. Unlike traditional physical threats from mobs of people, or trucks parked at the front door, cyber threats go undetected. Once they are detected, it can be difficult to identify the perpetrator. Richard suggests that good security requires good management. Patch management is not the sexiest, but is critical. Don't focus on shiny new objects, but rather fixing weak passwords and poor patch management procedures.
In the struggle to keep up, organizations are not doing a good job of mastering the security fundamentals. IBM believes that with the right approach, technologies and experts, our clients can fight back. IBM can deliver security and resiliency at the scale and speed necessary to protect businesses against the challenges of today, and tomorrow.
technorati tags: IBM, #Think2018, #IBMthink, #Think18, #Think, Marc van Zadelhoff, IBM Security, hackers, firewall rules, patch management, security breach, left of Boom, right of Boom, zero-day+malware, ransomware, IBM Resilient, Ted Julian, X-Force Command Center, Wendi Whitmore, Mike Errity, Richard Puckett, Thomson Reuters, asymmetric threat
Comments (7) Visits (13894)
Continuing my week's theme on the XO laptop from the One Laptop Per Child [OLPC] project, I have been amused watching the OLPC forum discussion on the choiceof browser options available.
IBM makes another breakthrough today with an announcement about tape data density. Unlike hard disk drive technologies that are hitting physical limits, IBM is proving that tape technology still has plenty of life in its future. When I first started working for IBM in Tucson, back in 1986, a 3420 tape reel held only 180MB of data, and a 3480 tape cartridge improved this to 200MB of data. Today's enterprise tapes, like 3592 cartridges for the TS1130 drives, or LTO4 cartridges for the IBM TS1040 drives, are half-inch wide, half-mile long, and can store 1 TB or more of data per cartridge, depending on how well the data can compress. To increase cartridge capacity, designers can make changes in three dimensions:
Working with FujiFilm Corporation of Japan, my colleagues at IBM Research facility in Zurich were able to demonstrate an incredible 29.5 Gigabits per square inch, nearly 40 times more dense than today's commercial tape technology. In the near future, we will be able to hold a 35TB tape cartridge in our hand. There was actually a lot to make this happen, improved giant magentoresistive read/write heads, better servo patterns to stay on track, thinner tracks less than a micron thick, and better signal-to-noise processing to accomplish this. To learn more, you can read the [Press Release] or watch this quick [4-minute YouTube video].
Tape -- You've come a long way, baby!
Comment (1) Visits (10692)
The same can be said for presentations that you give in foreign countries. Both in Japan and India, I had plenty of visuals to complement the text on the page, and the words that I spoke. Shawn over at [Anecdote] blog points to this greatpresentation by Garr Reynolds, author of [Presentation Zen]. The slide deck below has some key takeaways and quotes from Dr. John Medina's latest book "Brain Rules" that apply to presentations.
As the world becomes more globally integrated, communicating visually will be an important skill to develop.Read More]
Bruce Allen from BR Allen Associates LLC, an IT technology strategy and consulting firm, has written an excellent 9-page White Paper contrasting IBM and EMC's latest strategies. Here are some key excerpts:
To read the entire paper, its available from IBM here:
White Paper: Creating a Dynamic Information Infrastructure.
I hope everyone had a good weekend!
Yesterday, I went to the Bodyworlds exhibition. Here the anatomy of real human cadavers are on display, in full detail, thanks to a process call In the exhibit, you got to see the bones, nerves, muscles, digestive tract and other organs.Some in action poses, like swinging a baseball bat or ice skating, while others were stretched into specific poses to help emphasize one part or another. In some cases, they would show side by side healthy and unhealthy organs, for example, the lungs of someone that smokes tobacco cigarettes, compared to the lungs of a normal person. Quite a difference! Visualization can be an effective way to understand and gain insight from information. Presenting information in a visually stunning manner can be challenging, but often worth the effort. It reminded me of Edward Tufte, who has written several books on this subject.
In the exhibit, you got to see the bones, nerves, muscles, digestive tract and other organs.Some in action poses, like swinging a baseball bat or ice skating, while others were stretched into specific poses to help emphasize one part or another.
In some cases, they would show side by side healthy and unhealthy organs, for example, the lungs of someone that smokes tobacco cigarettes, compared to the lungs of a normal person. Quite a difference!
Visualization can be an effective way to understand and gain insight from information. Presenting information in a visually stunning manner can be challenging, but often worth the effort. It reminded me of Edward Tufte, who has written several books on this subject.
Comments (2) Visits (11781)
Last year, I posted about IBM VP Bob Hoey's three[Training Videos]about selling to the mainframe customer.
Well, his team has done it again. Here are the next three in the series:
Of course, not all of our YouTube videos are this silly. Others are focused on serious topics.Take for example this IBM UK Whiteboard session:
Comment (1) Visits (7972)
Well,This is completely off-topic, but now that I have a bluetooth-enabled Thinkpad T60, I have been interested in this new wireless technology. I have a bluetooth cell phone, a bluetooth wireless headset, and my thinkpad, and they all work together seemlessly. I am able to speak on my cell phone through my headset, listen to music and videos on my laptop through my headset, and even dial in to the IBM network through my cell phone, all without any cables!
A variation of the Wi-Fi soup-cantenna has emerged to intercepting bluetooth signals. Check out this coolBlueSniper Rifle
Now that's innovation.[Read More]
Comment (1) Visits (7373)
This week, the [Global Language Monitor] announced that "Web 2.0" became the One Millionth word of the English language. The average American only uses about 10,000 word vocabulary.
One way to improve your vocabulary is to read my blook (blog-based book), Inside System Storage: Volume I, which includes a 900-word glossary of storage-related terms. My blook is now available in hardcover or paperback at [Amazon] as well as direct from my publisher[Lulu]:
I have started working on a new book which I hope to have available for purchase later this year.Read More]