Thursday, May 26, 2022




What a year..

Personally, the most trying.. coping with this "pandemic," including being there for teenage daughters... but more substantially the loss of my father ... then within a week lost my long-standing companion, Cocoa, a Labrador Retriever (the last two completely unrelated to this pandemic furor). 

Professionally, found myself marveling at the collective unwillingness (inability?) of many sectors to welcome intellectual honesty around cloud capability.  I walked away from the enticing option of "check-box" certification (I have a Harvard MBA, for God's sake!) exams in favor of implementing the tech (just because your staff or new hire has a certification doesn't mean they can efficiently implement a solution appropriate for your environment)... yet in spite of very loud public whining about a scarcity of cloud implementation skills, no one I didn't have a personal relationship with five years ago was willing to meet to review findings.

True, I'm not on any Gartner matrix.  But doesn't everyone agree Gartner is a pay-to-play domain?  Are we really okay with a model that favors India's Brahmin class over our own innovation (no, not just me... spent some time with a few engineering innovators who finally concluded "my baby is ugly" and left a brilliant solution to keep customers happy in another domain.

Tuesday, February 9, 2021

eWISE AgileHealth©



The IT landscape at mid-to-large health organizations is dominated by electronic health record systems (EHR), a market led by Cerner, EPIC and Meditech.  Innovative applications to support health care (addressing COVID, other CRISPR DNA therapies/research and so much more) are available on Amazon Web Services (AWS), Azure and Google Cloud platforms.  The eWISE AgileHealth© approach enables secure access to data, appropriate integration of new data and enables integration to the millions of health devices (and providing vendors) that are modern health care.  Are you ready to visit the 3-Domain Architecture?




Christmas 2018

 



Spending a few days with my favorite person in the world, daughter Annika.  Danish pancakes for din-din Christmas day and for breakfast two days later.  Steak, peas and baked potatoes the day after Christmas.  Lots of Nintendo Switch, video blog from Danny Gonzalez... and a few other activities.  Cocoa says, "woof."





Wednesday, May 30, 2018

Russia/Ukraine Update



Watch for the Third Edition of my book,Navies, Petrol and Chocolate, due in February 2021 (on Amazon in paperback and ebook).

Fearing a move of Russian troops to the Ukraine border,  western forces have exercised in EstoniaRussia's 2018 exercise happened in the East... The Russian seizure of three Ukraine cargo vessels vicinity the Kerch Strait in late November 2018 was an unhappy display (seized sailors and ships weren't returned for many months).  Russian naval exercises happened in 2020... what's next?





Wednesday, May 9, 2018

What does Kim want?


Granted, scoring a meeting with the President of the United States is a coup no North Korean leader has scored in the history of the country, but what (beyond more status enhancing activity) does Kim Jung Un want from the upcoming meeting with Donald Trump?

Here is a crazy idea:  he wants general elections to select a president of both Koreas.   Assume that the North (25% of the population who worship the man today) votes  as a block and the south (the remaining 75%) splits between several (two or more) candidates...Un wins!!




Korean population density


A worthy project for Gallop, the polling company.  Informed scholars believe Kim becomes irrelevant  the moment he allows a new government to undermine his northern authoritarian regime.  At the top of a democratically elected organization, with his secret police suddenly able to run rampant across the peninsula... uh oh!  What do you think?





Saturday, May 5, 2018

Privacy


The Fourth Amendment to the United States Constitution specifically protects:  "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

A woman I recently met was calling anyone  using Facebook an idiot, because "your data is open for abuse and examination."  We choose to share information on Facebook, I  replied.  What about banks, landlords and others with access to financial transaction data (because they pay for it)?   What about data, in your medical record, that hackers are sharing with the global criminal community?

Granted, hackers are criminals.  But are your health organizations really doing, what they should, to protect against (or quickly detect) a hack?  Likely not...

Banks and other organizations with access to your financial records are not criminal.  Yet they have unfettered access to your financial records and accounts, in the name of understanding your creditworthiness and making robust financial decisions.

[from Wikipedia] Article XIV of the Massachusetts Declaration of Rights [stated even before the 4th Amendment to the US Constitution, that]: Every subject has a right to be secure from all unreasonable searches, and seizures of his person, his houses, his papers, and all his possessions. All warrants, therefore, are contrary to this right, if the cause or foundation of them be not previously supported by oath or affirmation; and if the order in the warrant to a civil officer, to make search in suspected places, or to arrest one or more suspected persons, or to seize their property, be not accompanied with a special designation of the persons or objects of search, arrest, or seizure: and no warrant ought to be issued but in cases, and with the formalities, prescribed by the laws.

In the internet age, we need to enact laws to protect citizens from probing commercial and government entities, and punish these abuses with civil and perhaps criminal penalties....

Tuesday, February 27, 2018

Cyber Vulnerability

                               

A few weeks ago several scary hardware vulnerabilities surfaced to illustrate how sophisticated hackers have become.  Spectre and Meltdown hacks use manipulation of central processing unit cache (yeah, the "CPU" is one of the key chips on your computer's motherboard).  These hacks use a detailed understanding of cache memory functionality to steal data from applications on your computer or perhaps from elsewhere on your network (thanks to Carbon Black for this illustration regarding the workings of CPU cache/processing).

Some patches have been published, but these hacks are very hard to block.  In spite of assertions that we haven't seen this malware "in the wild," when you contemplate what this kind of hacking vulnerability means, you begin to realize how vulnerable computers are, in general, and understand the "rocket science" some of these hackers can bring to the table.

Computers.  Yes, the MRI and heart monitor in your hospital are computers.  Every device on your network.  Obviously desktop, laptop and mobile computers (including your phone) are also computers.

So what do you do about this?  Of course, install firewalls and enact your system's onboard security features.  Keep up-to-date on operating system patches (yikes... you might be forced to tolerate dog-slow performance or upgrade to the new phone!) ... but if you are responsible for any size organization, you should also monitor your network a bit more carefully.

Even  if your firewall can't stop a hack (pieces of malware infiltrate your network, then reassemble once inside, for example), you can detect unwanted data transmissions or peculiar performance characteristics (yes, even that sophisticated malware causes suspect hacked CPU behavior).

Thanks for reading.