Discussions

TechRepublic Tech Conference

+
0 Votes
Locked

TechRepublic Tech Conference

Tig2
So here we are at the Hilton Garden Inn "meeting and greeting". All the best people are here, gleefully anticipating the start of the Conference tomorrow morning. Being REAL geeks, I have the netbook on in the bar I am sitting in and am posting here.

Looking forward to seeing everyone here! Chime in or head for the lobby and say hello!
  • +
    0 Votes
    Tig2

    So Jason is giving us the lay of the land here. The topic is supposed to be "The Changing Face of IT".

    We live in a world of change. At a high level, this is a discussion of new challenges and trends in the world of IT.

    Tech Republic is in the unique position of being able to advise senior level people in a variety of roles to understand how the "worker bees" in IT perceive IT and their roles.

    Trends to watch-

    Consumerization of IT- According to Gartner, the old model of IT is moving. As the workforce changes, ownership of the enterprise platform is moving from the IT department and moving to the enterprise worker. We all have had individuals who want to do what they want to do and on the equipment and tools they want to do it on. Because this is in the name of productivity, IT must adapt and change. Or does it? And how?

    Borderless network- Old networks are changing as workers reach outside the enterprise. How does the IT department manage security in an environment where end users reach beyond the security of the interior network? How do we re-think security in this world?

    Clouds in the data center- CIOs see cloud computing as a real direction. How does computing in the cloud impact IT and how do we support this? What about the private cloud? Is the private cloud just virtualization with a different name? What does that mean to the IT professional?

    Outsourcing, the good, the bad, the ugly- Is outsourcing just a new way to approach resource management? Does it make sense for the enterprise to "own" their own IT or their own data centers? Is it better to let IBM have the "reins" of YOUR data center? What do you tell leadership when they want to move away from the in-house model?

    Mobilization- How do we manage that? Should IT own this or should we allow the individual to choose their own devices and we just manage? Or does the IT department define this? Knowledge workers want to be able to work on the go. So do people in a variety of other roles. How do we decide what tools work best and how do we advise the people "in the trenches" on devices that will best meet the need? Is the desktop device dead?

    We're going to discuss these topics. In the room, we will get around 15 minutes. You can take all the time you want...

    +
    0 Votes
    Madsmaddad

    Wow. Those look like the topics for the course that I taught this spring. Add a couple more like convergence, and security, and that's it. Can anyone send me any notes or links to slides to assist me in preparing for next year?

    Hope you all are enjoying yourselves.

    I am at the seminar on optical properties of round glass cylinders containing alcoholic beverages.

    +
    0 Votes
    Tig2

    How does the enterprise manage the social media policy? What are the points that should be considered?

    The enterprise needs to protect it's interests. That includes trade secrets, insider information, etc.

    By putting this in writing, the enterprise can remove ambiguity and clearly communicate standards and practices to the end users.

    While we are good with the idea because we are familiar with Internet use policies. But social media is a slightly different animal. The end user could ignore the Internet policy by simply going home and using their own computer. Social media is a different animal.

    What tools can help the enterprise to monitor employees? Are those tools mature enough to meet the needs?

    Are disclaimers effective? Why or why not?

    Is the statement "On the internet, no one knows you are a dog" true? Does the fact that you are a dog change the way people think of your owner? To what extent?

    How do you enforce your policy when your employee goes home? What do you do when your employee is disgruntled and takes your corporate name in vain?

    There is enough here to discuss for a very long time. What are your thoughts?


    Edit: Typo

    +
    0 Votes
    AnsuGisalas

    Hehehehe...
    Let's put a "no dogs allowed" sign on the internet, and stick Al Gore out on the porch to uphold it, too.
    Then Lieberman can be his watchdog... oh wait, no dogs allowed.

    +
    0 Votes
    NexS

    That everything on the internet is true?
    They have these truth filters that means all the information you find is correct, complete and truthful.

    I read it on the internet.

    +
    0 Votes
    OH Smeg

    HAL 9000 is Nice I read it on the Internet. :0

    Col

    +
    0 Votes
    jasonhiner Moderator

    Here's the link:
    http://twitter.com/#search?q=%23TRLive

    You can see what people are posting about the event on Twitter, and then come back here and discuss it, of course. :-)

    +
    0 Votes
    Tink!

    I'll catch it on TweetDeck

    +
    0 Votes
    CharlieSpencer

    Sorry, buddy, I still don't get it. A bunch of posts about some fight, then people telling me when they started and stopped their presentations. Little of what I'd define as actual 'content'.

    I'll monitor this discussion; there seems to be more going on here.

    +
    0 Votes
    Tink!

    You actually checked the Twitter feed?

    +
    0 Votes
    CharlieSpencer

    First one I've looked at in months, and it reminded me why it will be months before I look at another one. Same stuff, different day. One has to come back here (or go somewhere other than Twitter) to have a coherent discussion of the material anyway.

    +
    0 Votes
    Tink!

    TR being a tech site, they should look into doing this because there's already sites out there that do it.

    I've seen where a site has a live chat screen that is connected to Twitter. In this way you can either add to the chat by inserting comments directly into the chat screen, or via Twitter.

    I'm assuming it auto-searches and pulls the Twitter hashtag and then displays it on the chat screen. I haven't looked that deep into it yet. Whatever way it does it, the chat at least resembles a chat conversation rather than the sporadic randomness of a normal Twitter feed.

    Just something to look into.

    +
    0 Votes
    OH Smeg

    But then again I've never seen the reason for Twit to begin with and it's way off my list of things to do.

    If it was part way useful maybe things would be different but from looking at it it's as useful as t1ts on a bull. Just my humble opinion there.

    Col

    +
    0 Votes
    CharlieSpencer

    I couldn't figure out why y'all traveled just to watch a fight with so much else to do in L'ville, or why you thought the rest of the community cared what y'all had on the tube. Should I assume hashtags aren't assigned or moderated in any fashion, and that random duplication isn't uncommon?

    I'll be #sex is pretty popular.

    +
    0 Votes
    Tink!

    You basically have to search before you pick a hashtag. I had another organization that had to change their tag because it was already being used by a couple other organizations.

    Many places just don't worry about it and if it is being used by more than one, they just leave it up to the users to sort out which ones are which.

    +
    0 Votes
    Tig2

    "Your picture is ugly"

    This was a real email received by Toni some years back.

    Blogging is as simple as starting a discussion and hitting "enter". Frankly, that is a lot of power in the hands of the individual.

    Toni shares with us some of the email (anonymously, of course) that she has received as a blogger on Tech Republic over the years.


    Blogging FOR TechRepublic is a joy. I know this as I have done it. But doing so constantly reminds you that there are opinions everywhere and everyone has one.

    The question to you all is, "What do YOU think is an effective blog? What words of advice would you give to the bloggers on TR? How can we improve the quality of our posts?"

    +
    0 Votes
    CharlieSpencer

    1. Request the PTBs move the 'Worthwhile?' button to the bottom of the page, between the end of your content and the beginning of the comments. You'll get more responses if people don't have to remember to go back to the top to provide it.

    2. Always post the first reply to your blog entry. This ensures it will appear in the Discussions Forum promptly, instead of hours or days later when someone else notices it on the home page and responds to it. It also makes it apparent in Discussions who the blog author is.

    3. Avoid characters in your titles other than alphanumeric. Sometimes they don't survive the formatting, and sometimes they're just annoying. I'm talking to those of you who use parentheses.

    4. If you're going to include a graphic, make that sucker as big as possible. If it can't be clearly read at 1024x768, make it a link.

    +
    0 Votes
    Tig2

    I will make sure that your comments on this is read/heard.

    Great points! Thanks!

    +
    0 Votes
    CharlieSpencer

    I think I remember someone posting that personal remark. I also recall you didn't write the entry under discussion, that the blog entry in question was actually written by someone else on one of the blogs you host. Finally, I remember several members giving that poster his well-earned ration.

    +
    0 Votes
    Shellbot

    Hows eveyone doing?? Having fun??
    Wish I was there ..

    +
    0 Votes
    Tig2

    And missing you muchly.

    (((hugs)))

    +
    0 Votes

    It's 10 PM Thursday night and I'm heading out to drive to Louisville... wish I could have made day 1, but I will be there for day 2!

    Scott

    +
    0 Votes
    Tig2

    IT consumerization has been something that we have seen but tried to ignore for years. It is believed that we no longer have the luxury of doing this.

    "Consumer IT will affect every enterprise. Attempts by enterprise to deny this are doomed to failure, just as previous attempts to deny Wi-Fi, "smart" mobile phones, the Internet, and even the PC itself failed".
    - Gartner-

    Consumerization refers to devices that appeared in the consumer driven market that moved into the business space and vice versa.

    Consumerization has been driven by equipment manufacturers who perceive the consumer as a revenue stream, the Internet and its ability to meet multiple needs for the average individual, and the Millenials- people born after 1980 who have never been without technology.

    Consumers are the largest consumers of technology. According to Paul Ortellini, President and CEO of Intel, the primary focus of the manufacturer is this group.

    Millenials bring a new attitude to the IT table. They have grown up with technology so they are more inclined to look to the technology solution to accomplish tasks. The Millenial is less inclined to respect barriers to the use of technology including corporate policies around IT.

    Risks in consumerization include security, loss of control, regulatory and legal issues, increased support costs, loss of productivity, and loss of user dissatisfaction. It becomes necessary to strategize to counter these risks.

    Consider how consumerization impacts your workplace and how you, the IT professional manage the risks while providing a flexible enough environment to maintain both productivity and user satisfaction.

    +
    0 Votes
    Tig2

    How does your enterprise manage consumerization? Do you have policies in place today? Do you have a grasp on what the impacts/risks are?

    NickNielsen- My company allows us to use whatever phone we want and they support it... except that they support limited functions on the smart phone.

    Ganyssa- Our company has a list of devices that we agree to support on the network. We are only allowing the device to use a portal to email, not applications on the network itself.

    ???- My company is distance learning. I can receive my device from the company and can choose from two plans. The device is only used for work.

    Deb- Email is generally business, text messaging isn't. Does your business shut off text messaging?

    JD- We cut off all texting for our business users.

    Bill- How do you manage privacy? Are your users aware that they have no expectations of privacy? Do your have a policy?

    JD- Our users know that business devices are for business. They don't have an expectation of privacy.

    GG- Our policy is clear. We allow "reasonable" personal use but we don't clarify exactly what "reasonable is. This will likely change.

    Bill- Is this a productivity issue? Can people bring in their own devices and waste business time on them?

    Deb- In many ways this is a mentality shift. Similar to the tele-worker in that business perceives a loss of control.

    These are the highlights of the discussion. Please add your voice.

    +
    0 Votes
    jasonhiner Moderator

    Here are my live photos from the event (via a Flickr). We'll be publishing a larger gallery next week with a lot more photos.

    http://www.flickr.com/photos/jasonhiner/sets/72157624399975570/

    +
    0 Votes
    CharlieSpencer

    Some different faces, though.

    +
    0 Votes
    ganyssa

    Some the same. Wish you were here. I've had to hit JD three times in your absence.

    That was on the ride here, though.

    +
    0 Votes
    Tig2

    To the tune of "Who Are You" by The Who...

    Deb is a former law enforcement officer, police academy instructor, Criminal Justice instructor and more.

    Cybercrime is a way to differentiate illegal activity that is committed using a computer network or the Internet.

    The computer might be a tool of the crime, a target of the crime, or used incidentally as a part of the crime.

    "Behavior reflects personality" - John Douglas, FBI profiler.

    Motivation can be emotional, "just fun", monetary profit, sexual impulse, political motivation, and psychiatric illness.

    Means are the ability to access the tools used in the commission of a crime.

    Opportunity is the ability to actually be present to commit the offense. These are the three necessary points to actually be considered a suspect for a criminal charge.

    23% of malicious activity originates in the US. Not so good.

    Technologies that cybercriminals use include broadband, wireless, web 2.0, online banking, e-commerce, social networking, mobile computing, standardization, and the cloud. Obviously, we aren't going to stop using these tools... but neither will they.

    Fighting cybercrime requires appropriate and enforceable laws, law enforcement that understands technology, victims and witnesses that are willing to report, a court system that is able to appropriately weigh the evidence presented, and a corrections system that understands the difference between a hacker, a white collar criminal, and the so-called average criminal and rehabilitates appropriately.

    IT and law enforcement need to align in order to fight cybercrime. This requires that we consider the things that might keep us from working together.

    The tools we have available to us are basic. Monitor and document activity on your network. Report the crime when it is detected. Know the law or get to someone who does. Understand jurisdictional issues or get to someone who does. Finally, educate, educate, educate.

    Prevention and awareness are strong tools to fight cybercrime. Choose to get involved and educate others.

    +
    0 Votes
    Tig2

    Why do you use the technology you do?

    Scott Lowe- A couple of reasons. Cost is the first as Microsoft is easy to acquire and inexpensive for education. It integrates well with other Microsoft products and deploys quickly. For a small staff, it is just easier.

    While the college is primarily Microsoft, we do use Open Source but only where it makes sense.

    Jack Wallen- Linux admins are the Maytag repairmen of IT (in an Open Source shop). One of the reasons our consultancy doesn't recommend Linux more often is because we don't make money. We don't get the level of call outs for Linux environments. It is a stable platform that works well.

    All of Microsoft's products work well together because Microsoft made them to do that. Open Source comes from a variety of sources so there is a greater challenge to interoperability. That paradigm is changing and newer tools ARE more interoperable.

    The myth about Linux is that it is hard to learn. It's a myth. As Linux has matured, it has gotten easier to use. End users can pick it up easily. The learning curve is really more around what the user is accustomed to.

    The Desktop- Do you see momentum for the Linux desktop for business?

    Jack Wallen- As business begins to understand how easy it is to use the Linux desktop, it seems like a no-brainer to use Linux. The stopping point is where business has developed tools or adopted tools to do critical functions that do not work on the Linux desktop.

    Scott Lowe- Application compatibility is a huge driver for us. We have a small number of Mac users who will probably be shifted to Windows soon. I personally use a MacBook Pro but I use Windows on it.

    Microsoft is making changes to be more portable and more agnostic. This will provide a richer user experience for those users that use other browsers (for example).

    Open Q&A...

    How to you choose a tool to do the job? Are you only willing to use a specific tool because of who makes the tool or do you select a tool based on the actual need?

    Scott Lowe- I look at what the need is and how it can be integrated in my environment. I am a *mostly* Microsoft shop so that tends to be the best fit.

    Jack Wallen- Proprietary software has one goal- make money. Open Source has a different philosophy. The people working on Open Source projects have one goal- make the best possible product. This is not to say that Open Source doesn't make money, there are Open Source companies that do. But the philosophy at the foundation is different.

    Rather than choose just one- only Microsoft, only Mac, only Open Source- choose the tool that meets your needs the best.


    Note: Any mis-statements contained here are the fault of the note taker... me.

    +
    0 Votes
    CharlieSpencer

    Jack Wallen - Scott, you pompous ***.

    Scott Lowe - Jack, you ignorant ****.

    Seriously, good stuff, guys. Tiggie, thanks for transcribing. I'd like to see similar 'pro / con' presentations at future events.

    +
    0 Votes
    Tig2

    There's a link on the front door to the live stream. Check it out!

  • +
    0 Votes
    Tig2

    So Jason is giving us the lay of the land here. The topic is supposed to be "The Changing Face of IT".

    We live in a world of change. At a high level, this is a discussion of new challenges and trends in the world of IT.

    Tech Republic is in the unique position of being able to advise senior level people in a variety of roles to understand how the "worker bees" in IT perceive IT and their roles.

    Trends to watch-

    Consumerization of IT- According to Gartner, the old model of IT is moving. As the workforce changes, ownership of the enterprise platform is moving from the IT department and moving to the enterprise worker. We all have had individuals who want to do what they want to do and on the equipment and tools they want to do it on. Because this is in the name of productivity, IT must adapt and change. Or does it? And how?

    Borderless network- Old networks are changing as workers reach outside the enterprise. How does the IT department manage security in an environment where end users reach beyond the security of the interior network? How do we re-think security in this world?

    Clouds in the data center- CIOs see cloud computing as a real direction. How does computing in the cloud impact IT and how do we support this? What about the private cloud? Is the private cloud just virtualization with a different name? What does that mean to the IT professional?

    Outsourcing, the good, the bad, the ugly- Is outsourcing just a new way to approach resource management? Does it make sense for the enterprise to "own" their own IT or their own data centers? Is it better to let IBM have the "reins" of YOUR data center? What do you tell leadership when they want to move away from the in-house model?

    Mobilization- How do we manage that? Should IT own this or should we allow the individual to choose their own devices and we just manage? Or does the IT department define this? Knowledge workers want to be able to work on the go. So do people in a variety of other roles. How do we decide what tools work best and how do we advise the people "in the trenches" on devices that will best meet the need? Is the desktop device dead?

    We're going to discuss these topics. In the room, we will get around 15 minutes. You can take all the time you want...

    +
    0 Votes
    Madsmaddad

    Wow. Those look like the topics for the course that I taught this spring. Add a couple more like convergence, and security, and that's it. Can anyone send me any notes or links to slides to assist me in preparing for next year?

    Hope you all are enjoying yourselves.

    I am at the seminar on optical properties of round glass cylinders containing alcoholic beverages.

    +
    0 Votes
    Tig2

    How does the enterprise manage the social media policy? What are the points that should be considered?

    The enterprise needs to protect it's interests. That includes trade secrets, insider information, etc.

    By putting this in writing, the enterprise can remove ambiguity and clearly communicate standards and practices to the end users.

    While we are good with the idea because we are familiar with Internet use policies. But social media is a slightly different animal. The end user could ignore the Internet policy by simply going home and using their own computer. Social media is a different animal.

    What tools can help the enterprise to monitor employees? Are those tools mature enough to meet the needs?

    Are disclaimers effective? Why or why not?

    Is the statement "On the internet, no one knows you are a dog" true? Does the fact that you are a dog change the way people think of your owner? To what extent?

    How do you enforce your policy when your employee goes home? What do you do when your employee is disgruntled and takes your corporate name in vain?

    There is enough here to discuss for a very long time. What are your thoughts?


    Edit: Typo

    +
    0 Votes
    AnsuGisalas

    Hehehehe...
    Let's put a "no dogs allowed" sign on the internet, and stick Al Gore out on the porch to uphold it, too.
    Then Lieberman can be his watchdog... oh wait, no dogs allowed.

    +
    0 Votes
    NexS

    That everything on the internet is true?
    They have these truth filters that means all the information you find is correct, complete and truthful.

    I read it on the internet.

    +
    0 Votes
    OH Smeg

    HAL 9000 is Nice I read it on the Internet. :0

    Col

    +
    0 Votes
    jasonhiner Moderator

    Here's the link:
    http://twitter.com/#search?q=%23TRLive

    You can see what people are posting about the event on Twitter, and then come back here and discuss it, of course. :-)

    +
    0 Votes
    Tink!

    I'll catch it on TweetDeck

    +
    0 Votes
    CharlieSpencer

    Sorry, buddy, I still don't get it. A bunch of posts about some fight, then people telling me when they started and stopped their presentations. Little of what I'd define as actual 'content'.

    I'll monitor this discussion; there seems to be more going on here.

    +
    0 Votes
    Tink!

    You actually checked the Twitter feed?

    +
    0 Votes
    CharlieSpencer

    First one I've looked at in months, and it reminded me why it will be months before I look at another one. Same stuff, different day. One has to come back here (or go somewhere other than Twitter) to have a coherent discussion of the material anyway.

    +
    0 Votes
    Tink!

    TR being a tech site, they should look into doing this because there's already sites out there that do it.

    I've seen where a site has a live chat screen that is connected to Twitter. In this way you can either add to the chat by inserting comments directly into the chat screen, or via Twitter.

    I'm assuming it auto-searches and pulls the Twitter hashtag and then displays it on the chat screen. I haven't looked that deep into it yet. Whatever way it does it, the chat at least resembles a chat conversation rather than the sporadic randomness of a normal Twitter feed.

    Just something to look into.

    +
    0 Votes
    OH Smeg

    But then again I've never seen the reason for Twit to begin with and it's way off my list of things to do.

    If it was part way useful maybe things would be different but from looking at it it's as useful as t1ts on a bull. Just my humble opinion there.

    Col

    +
    0 Votes
    CharlieSpencer

    I couldn't figure out why y'all traveled just to watch a fight with so much else to do in L'ville, or why you thought the rest of the community cared what y'all had on the tube. Should I assume hashtags aren't assigned or moderated in any fashion, and that random duplication isn't uncommon?

    I'll be #sex is pretty popular.

    +
    0 Votes
    Tink!

    You basically have to search before you pick a hashtag. I had another organization that had to change their tag because it was already being used by a couple other organizations.

    Many places just don't worry about it and if it is being used by more than one, they just leave it up to the users to sort out which ones are which.

    +
    0 Votes
    Tig2

    "Your picture is ugly"

    This was a real email received by Toni some years back.

    Blogging is as simple as starting a discussion and hitting "enter". Frankly, that is a lot of power in the hands of the individual.

    Toni shares with us some of the email (anonymously, of course) that she has received as a blogger on Tech Republic over the years.


    Blogging FOR TechRepublic is a joy. I know this as I have done it. But doing so constantly reminds you that there are opinions everywhere and everyone has one.

    The question to you all is, "What do YOU think is an effective blog? What words of advice would you give to the bloggers on TR? How can we improve the quality of our posts?"

    +
    0 Votes
    CharlieSpencer

    1. Request the PTBs move the 'Worthwhile?' button to the bottom of the page, between the end of your content and the beginning of the comments. You'll get more responses if people don't have to remember to go back to the top to provide it.

    2. Always post the first reply to your blog entry. This ensures it will appear in the Discussions Forum promptly, instead of hours or days later when someone else notices it on the home page and responds to it. It also makes it apparent in Discussions who the blog author is.

    3. Avoid characters in your titles other than alphanumeric. Sometimes they don't survive the formatting, and sometimes they're just annoying. I'm talking to those of you who use parentheses.

    4. If you're going to include a graphic, make that sucker as big as possible. If it can't be clearly read at 1024x768, make it a link.

    +
    0 Votes
    Tig2

    I will make sure that your comments on this is read/heard.

    Great points! Thanks!

    +
    0 Votes
    CharlieSpencer

    I think I remember someone posting that personal remark. I also recall you didn't write the entry under discussion, that the blog entry in question was actually written by someone else on one of the blogs you host. Finally, I remember several members giving that poster his well-earned ration.

    +
    0 Votes
    Shellbot

    Hows eveyone doing?? Having fun??
    Wish I was there ..

    +
    0 Votes
    Tig2

    And missing you muchly.

    (((hugs)))

    +
    0 Votes

    It's 10 PM Thursday night and I'm heading out to drive to Louisville... wish I could have made day 1, but I will be there for day 2!

    Scott

    +
    0 Votes
    Tig2

    IT consumerization has been something that we have seen but tried to ignore for years. It is believed that we no longer have the luxury of doing this.

    "Consumer IT will affect every enterprise. Attempts by enterprise to deny this are doomed to failure, just as previous attempts to deny Wi-Fi, "smart" mobile phones, the Internet, and even the PC itself failed".
    - Gartner-

    Consumerization refers to devices that appeared in the consumer driven market that moved into the business space and vice versa.

    Consumerization has been driven by equipment manufacturers who perceive the consumer as a revenue stream, the Internet and its ability to meet multiple needs for the average individual, and the Millenials- people born after 1980 who have never been without technology.

    Consumers are the largest consumers of technology. According to Paul Ortellini, President and CEO of Intel, the primary focus of the manufacturer is this group.

    Millenials bring a new attitude to the IT table. They have grown up with technology so they are more inclined to look to the technology solution to accomplish tasks. The Millenial is less inclined to respect barriers to the use of technology including corporate policies around IT.

    Risks in consumerization include security, loss of control, regulatory and legal issues, increased support costs, loss of productivity, and loss of user dissatisfaction. It becomes necessary to strategize to counter these risks.

    Consider how consumerization impacts your workplace and how you, the IT professional manage the risks while providing a flexible enough environment to maintain both productivity and user satisfaction.

    +
    0 Votes
    Tig2

    How does your enterprise manage consumerization? Do you have policies in place today? Do you have a grasp on what the impacts/risks are?

    NickNielsen- My company allows us to use whatever phone we want and they support it... except that they support limited functions on the smart phone.

    Ganyssa- Our company has a list of devices that we agree to support on the network. We are only allowing the device to use a portal to email, not applications on the network itself.

    ???- My company is distance learning. I can receive my device from the company and can choose from two plans. The device is only used for work.

    Deb- Email is generally business, text messaging isn't. Does your business shut off text messaging?

    JD- We cut off all texting for our business users.

    Bill- How do you manage privacy? Are your users aware that they have no expectations of privacy? Do your have a policy?

    JD- Our users know that business devices are for business. They don't have an expectation of privacy.

    GG- Our policy is clear. We allow "reasonable" personal use but we don't clarify exactly what "reasonable is. This will likely change.

    Bill- Is this a productivity issue? Can people bring in their own devices and waste business time on them?

    Deb- In many ways this is a mentality shift. Similar to the tele-worker in that business perceives a loss of control.

    These are the highlights of the discussion. Please add your voice.

    +
    0 Votes
    jasonhiner Moderator

    Here are my live photos from the event (via a Flickr). We'll be publishing a larger gallery next week with a lot more photos.

    http://www.flickr.com/photos/jasonhiner/sets/72157624399975570/

    +
    0 Votes
    CharlieSpencer

    Some different faces, though.

    +
    0 Votes
    ganyssa

    Some the same. Wish you were here. I've had to hit JD three times in your absence.

    That was on the ride here, though.

    +
    0 Votes
    Tig2

    To the tune of "Who Are You" by The Who...

    Deb is a former law enforcement officer, police academy instructor, Criminal Justice instructor and more.

    Cybercrime is a way to differentiate illegal activity that is committed using a computer network or the Internet.

    The computer might be a tool of the crime, a target of the crime, or used incidentally as a part of the crime.

    "Behavior reflects personality" - John Douglas, FBI profiler.

    Motivation can be emotional, "just fun", monetary profit, sexual impulse, political motivation, and psychiatric illness.

    Means are the ability to access the tools used in the commission of a crime.

    Opportunity is the ability to actually be present to commit the offense. These are the three necessary points to actually be considered a suspect for a criminal charge.

    23% of malicious activity originates in the US. Not so good.

    Technologies that cybercriminals use include broadband, wireless, web 2.0, online banking, e-commerce, social networking, mobile computing, standardization, and the cloud. Obviously, we aren't going to stop using these tools... but neither will they.

    Fighting cybercrime requires appropriate and enforceable laws, law enforcement that understands technology, victims and witnesses that are willing to report, a court system that is able to appropriately weigh the evidence presented, and a corrections system that understands the difference between a hacker, a white collar criminal, and the so-called average criminal and rehabilitates appropriately.

    IT and law enforcement need to align in order to fight cybercrime. This requires that we consider the things that might keep us from working together.

    The tools we have available to us are basic. Monitor and document activity on your network. Report the crime when it is detected. Know the law or get to someone who does. Understand jurisdictional issues or get to someone who does. Finally, educate, educate, educate.

    Prevention and awareness are strong tools to fight cybercrime. Choose to get involved and educate others.

    +
    0 Votes
    Tig2

    Why do you use the technology you do?

    Scott Lowe- A couple of reasons. Cost is the first as Microsoft is easy to acquire and inexpensive for education. It integrates well with other Microsoft products and deploys quickly. For a small staff, it is just easier.

    While the college is primarily Microsoft, we do use Open Source but only where it makes sense.

    Jack Wallen- Linux admins are the Maytag repairmen of IT (in an Open Source shop). One of the reasons our consultancy doesn't recommend Linux more often is because we don't make money. We don't get the level of call outs for Linux environments. It is a stable platform that works well.

    All of Microsoft's products work well together because Microsoft made them to do that. Open Source comes from a variety of sources so there is a greater challenge to interoperability. That paradigm is changing and newer tools ARE more interoperable.

    The myth about Linux is that it is hard to learn. It's a myth. As Linux has matured, it has gotten easier to use. End users can pick it up easily. The learning curve is really more around what the user is accustomed to.

    The Desktop- Do you see momentum for the Linux desktop for business?

    Jack Wallen- As business begins to understand how easy it is to use the Linux desktop, it seems like a no-brainer to use Linux. The stopping point is where business has developed tools or adopted tools to do critical functions that do not work on the Linux desktop.

    Scott Lowe- Application compatibility is a huge driver for us. We have a small number of Mac users who will probably be shifted to Windows soon. I personally use a MacBook Pro but I use Windows on it.

    Microsoft is making changes to be more portable and more agnostic. This will provide a richer user experience for those users that use other browsers (for example).

    Open Q&A...

    How to you choose a tool to do the job? Are you only willing to use a specific tool because of who makes the tool or do you select a tool based on the actual need?

    Scott Lowe- I look at what the need is and how it can be integrated in my environment. I am a *mostly* Microsoft shop so that tends to be the best fit.

    Jack Wallen- Proprietary software has one goal- make money. Open Source has a different philosophy. The people working on Open Source projects have one goal- make the best possible product. This is not to say that Open Source doesn't make money, there are Open Source companies that do. But the philosophy at the foundation is different.

    Rather than choose just one- only Microsoft, only Mac, only Open Source- choose the tool that meets your needs the best.


    Note: Any mis-statements contained here are the fault of the note taker... me.

    +
    0 Votes
    CharlieSpencer

    Jack Wallen - Scott, you pompous ***.

    Scott Lowe - Jack, you ignorant ****.

    Seriously, good stuff, guys. Tiggie, thanks for transcribing. I'd like to see similar 'pro / con' presentations at future events.

    +
    0 Votes
    Tig2

    There's a link on the front door to the live stream. Check it out!