Nov 22 2011

2A – Business Requirements: Promo codes mia

iBookstore promo codes a no-show for e-publishers
by Steven Sande Nov 22nd 2011 at 12:30PM

*** begin quote ***

iBooks publishers looking to send ebooks to reviewers, or who want to stir up interest in a new title through a giveaway contest, are out of luck. Unlike the App Store, publishers cannot create promo codes for the iBookstore.

*** end quote ***

Seems an OBVIOUS oversight.

And, the author points out that Amazon missed it too.

Seems like a strange oversight.

One problem with translating the “book” to the “e-reader” meme is that there is a total loss of control.

For example, the concept of a library is destroyed. As well as, “lending” a book to someone.

It could seem that the “rules” have been turned upside down. And, no one is thinking at 100k foot altitude.

# – # – # – # – # 2011-Nov-22 @ 14:32

Oct 26 2011

5A – Information Security:

Posted by reinkefj in 5A - Information Security


Why not use a novel? TO create the password. Pick your favorite number. Say 37. Take page 37 of your novel. First part is the Third Line Seventh Word. Put in a special character like #. And, the Seventh Line Third Word. If you need lots of them, Page of paper lines #11 to 50. Write the site’s name on the line. Use that page with your technique. Most IT folks might borrow the book to read, but few will figure out your scheme! (I had identical copies of my favorite book at work and at home.) Like the “Purloined Letter”, hidden in plain sight.

# – # – # – # – # 2011-Oct-26 @ 19:11

Oct 23 2011

DATA: How do you maintain integrity?

Posted by reinkefj in DATA

Online Supreme Court opinions scrubbed in 2008 election runup
1875 court definition of eligibility deleted from 25 cases at
Posted: October 23, 2011 5:30 pm Eastern
By Bob Unruh © 2011 WND

*** begin quote ***

“This tampering happened at That is a fact. The questions which need to be answered now are who ordered it and who carried out the subversive plot,” he wrote.

Dianna Cotter wrote in the Portland Civil Rights Examiner: “This was done in these specific cases in order to prevent their being found by Internet researchers long before anyone had even begun to look for them, even before Obama would win the Democratic nomination at the DNC Convention in Denver, Colo., in August ’08. This is premeditation and intent to deceive.”

She noted that attorneys working on arguments always would return to the originals from the Supreme Court, “but 99.99 percent of the population has no access to dusty law texts or expensive legal research services such as Lexis and Westlaw.

“The manipulation at diluted the importance of Minor by killing the citations in Supreme Court cases spanning over 100 years. Since Google most often returns’s version of the case being searched for as the first or second hit, Justia’s version of Supreme Court opinions are most influential in the blogosphere’s forums and comments. Erasing those citations and text on the Internet literally erases the importance of Minor and its precedents to millions of Americans otherwise unlikely to ever step into physical Law Library,” she wrote.

*** end quote ***

Regardless of whatever side you’re on in the debates, this is an interesting issue from a “technology legacies” pov.

How does one determine that data has not been tampered with?

One would expect that, for example, a financial transaction would have a checksum somewhere. “Machines” do make mistakes.

So to, non-financial data can have great impact.

At the very least, there should be an indelible journal attached to information that shows what changed.

Here to is an example of depending up a secondary or tertiary source.

I’m sure this is goign to be discussed with Google. As the “referee” of credibility, by serving up manipulated data, Google’s credibility is hurt.

We’ve seen this issue in Wikipedia “battling updates”, and I’d opine, there will be more of this in the future.

# – # – # – # – # 2011-Oct-23 @ 21:40

Oct 22 2011

2A – Business Process Reengineering: Faults versus inovation

“Customers can tell you what’s wrong; only insiders can innovate.” — DeBono

# – # – # – # – # 2011-Oct-22 @ 16:53

Oct 19 2011

4B – B/IT Governance: Go to the “cloud” and forgo control

Posted by reinkefj in 4B - B/IT Governance

Why You Can’t Downgrade iOS
By David Strom / October 18, 2011 12:00 PM / 7 Comments

*** begin quote ***

If you rushed into upgrading your iThing to v5, you may be one of those that are having regrets. Your phone or tablet may be running slower, or draining its battery faster. Or there might be some apps that just don’t run at all under v5. Apple will basically say, “too bad.” Because you can’t downgrade your iOS to an earlier version – not without jailbreaking your phone or running some dubious software, and even then you might have problems.

*** end quote ***

Here’s a classic example of “cloud” risk.

How can you remain in control of your “production” environment when you’re not even in control of your platform. (That you paid for.)

One of the things that really twists my shorts is when the Windoze PC reboots on command from Microsloth.

I find out about it when the fool thing won’t reboot. (I have usb dongle that doesn’t have a boot record on it.)

It violates the concept that I’m in control.

Google changes its version of Presentation software.

It’s one thing if you’re a … non-production … User who is trading cost for control. If it’s free, you get what you pay for.

Organizations can make an ROI decision. If one can’t afford the cost of keeping control, then free is good. But you get what you pay for.

But, half measures, like you can un-upgrade IOS5 or when MSFT decides it’s in control, that’s unacceptable.


# – # – # – # – # 2011-Oct-19 @ 10:57

Oct 17 2011

3A – Acceptances: GOOGLEVOICE in the IPHONE4S fail

Posted by reinkefj in 3A - Acceptances

Google pulls Voice app from App Store to address stability
by Kelly HodgkinsOct 17th 2011 at 12:30PM

*** begin quote ***

Those with a new iPhone 4S who want to install Google’s Voice app are out of luck for a while. Google was forced to pull the app after complaints about its stability arose. According to Google Voice Product Manager Vincent Paquet, there is a bug in the sign-in code that causes the app to crash immediately on opening. The bug only affects this most recent release and earlier versions of the app reportedly still work without error.

Google is fixing the error and will have a new version of the app available as soon as possible. As of the writing of this post, a Google search will pull up the information for the old version of the app. If you try to download this broken version via iTunes, you will receive an “The item you’ve requested is not currently available in the US store.” error.

*** end quote ***

Makes you wonder how they designed their acceptance tests?

# – # – # – # – # 2011-Oct-17 @ 13:02

Oct 03 2011

INFOSEC: Automated tool — shoot your own foot

Posted by reinkefj in 5A - Information Security

Microsoft kills Google Chrome with bad malware signature
“One way to win the browser war” says security expert
By Gregg Keizer, Computerworld
September 30, 2011 04:35 PM ET

# – # – #

Regardless of the messy details, and I’m sure it was inadvertent, this points up several issues — recovery from the error, how does one maintain a quality controlled environment, and what happens if malware gets to id your production software as bad.

Seems like this was under control in less than a day. With the only data loss being bookmarks.

(1) This can serve as a learning episode. How were the bookmarks backed up? Restore should limit the loss to a day. If not, why not?

(2) A production environment should have all inputs “tested” in at worst a development environment before being admitted to “production”. If not, why not?

(3) What controls are in place to prevent a disgruntled sys admin from marking entire production environments as “malware”. Instant disaster! If not, why not?

Would seem that this episode has some lessons to be learned? Or at least, examined.

# # # # #

Sep 27 2011

ITA: Facing business realities by technology

‘L.A. Times’: Hollywood Prepares for Inevitable Post-DVD Era
by John Nolte

*** begin quote ***

Those days are over and no gimmick or punitive waiting period or “cloud-thingy” is going to bring them back.

1. We are used to paying much less for your product now.

2. We are used to waiting to see your product now.

3. Netflix Streaming might not have “Green Lantern” or “The Green Hornet” or whatever piece of crap green movie you dumped on us recently, but it does have a lot of cool stuff waiting to be discovered and rediscovered: Classic television, tons of documentaries, and those awesome TLC/Discovery reality shows (sans commercials!).

Through the conditioning of their customers to wait for their product to hit whatever outlet we’re comfortable with, Hollywood has lost the most important selling tool they once had: Urgency. The need to see something NOW.

*** end quote ***

Clearly, “Hollywood” hasn’t seen the benefit of clearly stating the “facts” in such a clear form.

Then, they’d be scared silly.

And, clearly they’d be looking for a better technology solution.

# # # # #

Sep 26 2011

QUALITY: Production versus Innovation

Posted by reinkefj in 2C - Quality Improvement

JUNE 11, 2007
At 3M, A Struggle Between Efficiency And Creativity
By Brian Hindo

*** begin quote ***

There has been little formal research on whether the tension between Six Sigma and innovation is inevitable. But the most notable attempt yet, by Wharton School professor Mary Benner and Harvard Business School professor Michael L. Tushman, suggests that Six Sigma will lead to more incremental innovation at the expense of more blue-sky work. The two professors analyzed the types of patents granted to paint and photography companies over a 20-year period, before and after a quality improvement drive. Their work shows that, after the quality push, patents issued based primarily on prior work made up a dramatically larger share of the total, while those not based on prior work dwindled.

Defenders of Six Sigma at 3M claim that a more systematic new-product introduction process allows innovations to get to market faster. But Fry, the Post-it note inventor, disagrees. In fact, he places the blame for 3M’s recent lack of innovative sizzle squarely on Six Sigma’s application in 3M’s research labs. Innovation, he says, is “a numbers game. You have to go through 5,000 to 6,000 raw ideas to find one successful business.” Six Sigma would ask, why not eliminate all that waste and just come up with the right idea the first time? That way of thinking, says Fry, can have serious side effects. “What’s remarkable is how fast a culture can be torn apart,” says Fry, who lives in Maplewood, Minn., just a few minutes south of the corporate campus and pops into the office regularly to help with colleagues’ projects. “[McNerney] didn’t kill it, because he wasn’t here long enough. But if he had been here much longer, I think he could have.”

*** end quote ***

Six Sigma to take your PRODUCTION to new levels.

TQM to take your INNOVATION to new level.

# # # # #

Sep 26 2011

FINANCIAL_RECONCILIATION: How old was that beneficiary

Posted by reinkefj in 6E - Reconciliation

September 23, 2011 1:57 PM
Watchdog: Gov’t paid $600 million to dead people

*** begin quote ***

(AP) WASHINGTON – The federal government has doled out more than $600 million in benefit payments to dead people over the past five years, a watchdog report says.

Such payments are meant for retired or disabled federal workers, but sometimes the checks keep going out even after the former employees pass away and the deaths are not reported, according to the report this week from the Office of Personnel Management’s inspector general, Patrick McFarland.

In one case, the son of a beneficiary continued receiving payments for 37 years after his father’s death in 1971. The payments — totaling more than $515,000 — were only discovered when the son died in 2008.

*** end quote ***

Seems obvious to me that in the best case, if the father was age 65 and retired in 1971, he’d be 102 and till collecting checks.

It would seem that every decade, someone should pay a personal visit to the pensioner with a picture.

Even if that cost $1,000 per visit, it would have prevented the loss of ½ million dollars.

As we see more ridiculous public pensions and other welfare programs, “Financial – Reconciliation” will be essential to prevent fraud.

# # # # #