Since 2016 is the 20th year I’ve served as CIO, I’ve given a great deal of thought to the various careers I’ve had and the roadmap for the 20 next years of my working life. In my late teens and 20s I was an entreprenuer running a 35 person software company while doing my medical and graduate school training. I was also a winemaker, home builder and engineer. In my early 30’s I was an Emergency physician, software coder, and data analyst. In my mid 30’s as a CIO, I focused on architecture, high reliability computing, and centralization of IT service delivery. In my early 40’s, I focused on disaster recovery, interoperability, and educational technologies..
security
See the following -
The Biggest Cyberthreat To Companies Could Come From The Inside
A recent attack against Morgan Stanley that exposed hundreds of thousands of customer accounts was an inside job, a threat experts say is nearly impossible to stop...
- Login to post comments
The Blockchain Is the New Google
At its core, the blockchain is a technology that permanently records transactions in a way that cannot be later erased but can only be sequentially updated, in essence keeping a never-ending historical trail. This seemingly simple functional description has gargantuan implications. It is making us rethink the old ways of creating transactions, storing data, and moving assets, and that’s only the beginning. The blockchain cannot be described just as a revolution. It is a tsunami-like phenomenon, slowly advancing and gradually enveloping everything along its way by the force of its progression. Plainly, it is the second significant overlay on top of the Internet, just as the Web was that first layer back in 1990. That new layer is mostly about trust, so we could call it the trust layer.
- Login to post comments
The Brave New World Of Unmanned Vehicles
While the FAA, other legal and regulatory agencies, and privacy advocates catch up in terms of the legality and ethics o,f such uses of unmanned vehicles, manufacturers are envisioning a future in which UAVs will be a prevalent part of everyday life. "It's going to spark a lot of creativity," said UAV manufacturer Zenon Dragan. Read More »
- Login to post comments
The Coming Push For Open Source Everything
When we can no longer trust proprietary hardware or software, open source becomes the only option Read More »
- Login to post comments
The Data Divide
[T]he digitization of interactions means that every time we carry a smart phone, send a text message, or buy something online, we’re creating value for someone. A lot of it, as it turns out. These days, information isn’t just power, it’s big money.
- Login to post comments
The Future of File Sharing: Integrating Pydio and ownCloud
The open source file sharing ecosystem accommodates a large variety of projects, each supplying their own solution, and each with a different approach. There are a lot of reasons to choose an open source solution rather than commercial solutions like Dropbox, Google Drive, iCloud, or OneDrive. These solutions offer to take away worries about managing your data but come with certain limitations, including a lack of control and integration into existing infrastructure. There are quite a few file sharing and sync alternatives available to users, including ownCloud and Pydio...
- Login to post comments
The High Cost Of Poor Software Quality
We recently highlighted how a bug in the Stockholm Stock Exchange caused an errant trade of more than 4.2 billion index futures contracts (a value equal to 131 times Sweden’s GDP) to send the trading network into a tailspin and forced trading to a halt. A spokesperson for the exchange blamed the mistake on a parsing error... Read More »
- Login to post comments
The History Of Surveillance And The Black Community
February is Black History Month and that history is intimately linked with surveillance by the federal government in the name of "national security." Indeed, the history of surveillance in the African-American community plays an important role in the debate around spying today and in the calls for a congressional investigation into that surveillance. [...] Read More »
- Login to post comments
The Impact (Or Lack Thereof) Of Mobile Computing On Life Science R&D
The computing transformation being effected by mobile computing may not be one we fully appreciate while burying our heads and thumbs in the latest cool app or game. Yet this transformation is likely the most important since the introduction of the personal computer... It’s that the transformation marks a complete change to the underlying platform. Read More »
- Login to post comments
The Internet, SMS, and Participatory Health
Serina Kalande (@serina_k) is a volunteer with Rising Voices, where she has lead the Blogging Positively project. The project began almost as soon as Global Voices itself. It’s a collection of HIV-positive bloggers and those blogging about HIV AIDS. You can view a map of this network here... Read More »
- Login to post comments
The Linux Foundation Announces Project to Build Real-Time Operating System for Internet of Things Devices
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the Zephyr™ Project. This open source collaborative effort will unite leaders from across the industry to build a real-time operating system (RTOS) for the Internet of Things (IoT). Early support for the Zephyr Project includes Intel Corporation (including its acquired business groups Altera Corporation and Wind River), NXP Semiconductors N.V. (including its recent merger with Freescale), Synopsys, Inc. and UbiquiOS Technology Limited. Zephyr Project is inviting others interested in this technology to participate.
- Login to post comments
The New Bioterrorism? The Hacked Medical Device
A time-and-technology challenged FDA, proliferation of software-controlled medical devices in and outside of hospitals, and growth of hackers have resulted in medical technology that’s riddled with malware. Furthermore, lack of security built into the devices makes them ripe for hacking and malfeasance. Read More »
- Login to post comments
The NSA Is Commandeering The Internet
Technology companies have to fight for their users, or they'll eventually lose them. Read More »
- Login to post comments
The NSA-Reform Paradox: Stop Domestic Spying, Get More Security
The nation can survive the occasional terrorist attack, but our freedoms can't survive an invulnerable leader like Keith Alexander operating within inadequate constraints. Read More »
- Login to post comments