Wednesday, April 27, 2016

Tech Musing #3


Overview:
Along with the some breaking news coming out such as former National Security Agency contractor Edward Snowden leaked details of government data-gathering efforts and Apple recently fought a high-profile battle over the FBI's demand for help unlocking an encrypted iPhone in San Bernardino, California, people become more and more concerned of their personal private information, and privacy become a hot topic these days. This article talks about, computer hardware and software industry leader, Microsoft’s latest tech clash suit with US over privacy. In this case, Microsoft suited the Justice Department over its use of court ordered the company to turn over customer files stored in its computer centers, and also not allow them to notifying their customers. Not only ask Microsoft for the US-citizen’s private files, US government but also demanded for emails of a non-U.S. citizen that the company has stored in a data center located in Ireland. Except Microsoft, some other companies also suffered the same thing. The Redmond, Washington-based company says authorities used the 1986 law, known as the Electronic Communications Privacy Act, to demand customer information more than 5,600 times in the last 18 months. This high frequency definitely influences the operation of the company and also affect the company’s competitive advantage in customer’s privacy.

Relevant to Course:
This article is very relevant to what we have leant in class like privacy, information security and potential venerability of data. It also shows me from a new stand point of how government use their power to request user’s personal information. This article provides me how big corporates feel about government’s action and how they use their power to against them. It also shows me the endeavor they have made to protect their user’s privacy.

Importance as an MIS student:
As a MIS student. Information security is a big part of knowledge we should have. Through learning the action government has made and the corporate decisions, we should be able to understand why we need to use different technics to make our information secure. Just like other companies, including Google, Facebook and Yahoo, have increased their use of encryption in order to keep their data safe and hard to compromise, we should learn different technics to keep our information and data secure.  


Tuesday, April 26, 2016

TECH MUSING #3: Edward Snowden Video

I can’t believe that people are so ignorant with this topic. It’s honestly mind boggling that people don’t have a clue that their information can be used and tampered with at any moments notice. I believe that what Snowden wanted was for the American people to know the truth and to be able to have a say with what happens to their information and their privacy. After watching people get interviewed and not even knowing that the government can do what they’ve been doing for years.. It’s crazy! I guess being an MIS major we’re aware of these things because we take classes such as this one, but I feel like everyone should know what’s going on with their information and really want to know how private, their privacy really is.

Article:
https://theintercept.com/2016/04/25/spy-chief-complains-that-edward-snowden-sped-up-spread-of-encryption-by-7-years/

This article talks about how Edward Snowden pretty much started the domino effect of encryption and how in the next few years there's a great possibility that encryption can be broken. He mentioned that the availability of encryption is so much more transparent people have been working around the clock trying to break in and have our information. This is so relevant to me, my peers, everyone and anyone who uses technology because once the encryption can be broken, we have nothing to protect us from people stealing anything they want from us; from text messages to emails and data. I think in order for our information to remain protected, there needs to be some new form of security and protection, much like the security and privacy that encryption has provided with us. This new form of security and protection must be much stronger and more secure than encryption so that it cannot be broken and deciphered. I’m not sure exactly what this entails but I hope that in the future, some new type of security is created so that we can be able keep our sense in privacy.

Tech Musing 3 - Edward Snowden Video and Suzie 4th Amendment article

Edward Snowden Video
I really enjoyed both the Edward Snowden videos and your article on the 4th Amendment. Citizen privacy vs government protection is a topic that has always fascinated me. I think what about the video struck me the most was in the beginning of the first one with the NSA employee who came up with a new surveillance system. The surveillance system allowed for more data collection while encrypting personal information. Allowing the government to collect the information but not allowing them to see who it was from. If the information was then pertinent they could request a court order. However, when he pitched the idea he was told that the agency was moving forward with another initiative.

What I find most interesting was when that NSA agent went to speak to the agency counsel. When he brought up his concerns about the program the agency decided to pursue, he was told to drop this subject, that the counsel would not speak to him anymore, and to essentially go home.

4th Amendment Article
What I really enjoyed about this article was the point regarding toll data. Nowadays we don't think about all the personal information, the data, that we put into the world around us. In the case of the example, just owning a toll pass can allow people to see into your daily commute. No to mention the data that we create by use of our smartphones.

How this pertains to our class
I think both these articles pertain to our class by virtue of their very nature. We surround ourselves with technology, creating "smart" devices that communicate with each other. Whether it be your radio, car, thermostat, security system, or your toll pass. All of this technology generates data that can be useful to ourselves, and to those around us.

Sunday, April 24, 2016

Tech Musing #3 "Panama Papers: inside the Guardian's investigation into offshore secrets"

Article: http://www.theguardian.com/news/2016/apr/16/panama-papers-inside-the-guardians-investigation-into-offshore-secrets 

Overview
An article was posted to the Guardian on April 16th, 2016 titled "Panama Papers: inside the Guardian's investigation into offshore secrets" by Juliette Garside. I have found this article to be the most complete when it come to putting the Panama Papers Scandal into perspective and understanding the timeline of events. Garside begins with the foundation of the scandal, recounting the contact of the "John Doe" wishing to unload some data. From there, Juliette discusses the manner in which the investigation was conducted. She talks about the "red flags" that were identified including the Icelandic Prime Minister walking out of an interview, the stepping down of Mossack Fonseca founding partner, Ramon Fonseca, and the arresting of two Mossack Fonseca employees. Garside then delves into series of events that led to publishing this massive amount of sensitive information.

25 February 2015 - During this time, correspondence with the information source, "John Doe," has been established and information is prepared for unveiling.

June 2015 - News organizations discuss how the information will be delivered to the public and how the information will be handled.

September 2015 - The Guardian secures its position in the information unveiling and participate in the discussion of new handling.

December 2015 - The size of the scandal is beginning to be put into perspective with 2.6 terabytes of data available and accounts of dealings of Vladimir Putin valued at $2bn. This is also the time that Mossack Fonseca employees were arrested, but released while two other Fonseca employees fled the country.

4 March 2016 - Mossack Fonseca is officially informed that information regarding the details of some of their "sensitive" accounts has been acquired and viewed.

11 March 2016 - Icelandic Prime Minister walks out of interview. Ramon Fonseca resigns from adviser position with Panamanian president.

15 March 2016 - Wife of Icelandic Prime Minister uses Facebook to announce that her husband had no official hand in the accounts held at Mossack Fonseca. Coming days before the release of information, it is hard to not sense panic from the pair.

6.48pm, Sunday 3 April - Edward Snowden tweets a link to official leak article.

7pm GMT, Sunday 3 April - Information was revealed to the public.

Relavance to Course
This article is very relevant to our course material. Firstly, there has been much discussion about the case in general, and this article offers a linear, clear point of view. Secondly, we have learned much about information security and privacy, two core concepts of this scandal. It will be interesting to see the aftermath of this scandal and the potential financial repercussions to some of the world's powerful people.

Saturday, April 23, 2016

Project Management-Extra Musing

Project Management-Extra Musing


Waterfall or Agile?

There was a question about a client that asked.. "Which is best – Waterfall or Agile?" What this article is discussing is that it is not about which one is best but it is about which one fits better a specific part of as specific project...

To make it clearer, you probably have many many dresses.. midi dresses, formal dresses, casual dresses, cocktail dresses etc, but when we pick a specific dress we have to chose it based on that special occasion. Lets say we have a job interview; we will not pick a gown because we'll probably look ridiculous. Well, that is exactly the same when choosing which methodology use for a project.

Choosing what is "perfect" for us is subjective, and when selecting a project management method even more. The article mentioned that “A project manager using Waterfall because it's what they know rather than what's best for their project probably knows that there's a better way, but it's a brave paradigm shift to step out of your comfort zone and try a different methodology”. Tons of plans fail because project managers want to stick with what they think is best based on what they know rather than adopting the appropriate methodology for the project at that time. We may prefer to wear our classy formal gown or our sporty skirt but they're no good for a job interview.

So, we should apply that dress selection methodology when holding on an IT project!  What if, as we planned each piece of the project we selected the best methodology for that specific part? Rather than contemplate a project as a whole we should consider each stage of the project independently breaking the overall into manageable pieces and considered what methodology would fit best for each.

Relevance to MIS 441
This article and discussion is very relevant to what we have been learning along this semester about Agile and waterfall methodologies. As we learned earlier in the semester most organization use a combination of Agile tools and methodologies. Agile does not describe a specific approach but offers a collection of tools and best practices, and there are many of them such as Extreme programming, Scrum, Kanban, Crystal family, and many more. We learned over the second part of the semester that the difference between Agile and waterfall is huge. Waterfall is prescriptive, extensive documentation, formal, sequential, process focus and of gradual change. In contrast, Agile is abstract, minimal documentation, informal, continuous, communication focus and of rapid change, and as Bob discussed in an interview Agile methodologies are best in every way because Agile methods are human methods and we are taught about it since very young age.


Importance as an MIS student
As an MIS student we should be able to identified which methodologies are better for each type and part of a specific project. We should be able to organize and direct other people achieve a planned result within a predetermined schedule and budget. We need to be able to execute these processes to plan the project and then to monitor and control it.


As a project manager in the future we are required to have a diverse set of skills including technical, management, conflict management and customer relations. We would have many different responsibilities, internally we should be able to develop project schedules, assessing project risks, monitoring and controlling project deliverables and milestones. Externally, we need to be able to report the project status and progress, work directly with clients and other stakeholders, identifying resource needs and obtain resources. So, it is of high importance for us as MIS students to well understand how and when to execute these methodologies.

Tech Musing Extra Credit: Project Management

Project Management Software: Wrike
This article discusses about how the project management software, Wrike, has developed and its exponential growth making it more effective and efficient. Wrike, founded by Russian born entrepreneur, Andrew Filev, in 2006, is a platform for real time work management and collaboration that helps to make day-to-day work easier, more transparent and efficient for thousands of companies. Around 6,000 paid customers in over 108 countries already enjoyed it cool features and advantages. It also raised $10 million in venture capital funding from prominent investors and their customers include teams from Google, Stanford, and eBay. Filev says, the company started as a collaboration and project management vendor and then as the company were working on managing our clients’ projects, we realized the need for something bigger. We needed a tool to help us collaborate better. So we created Wrike to solve our own problem. Wrike accelerate the growth plan and continue to innovate. Many companies like Google, Hawaiian Airlines and PayPal have already use the platform because it they already have experienced the pain that comes with project management from other software.

Relevance to MIS 441
This article is relevant to our class project and for other project management project because it provides an alternative tool to MS Project for many purposes.  Its role for project management techniques is to implement projects successfully and establish in areas such as the planning and control of time, cost and quality. Its useful features are
-        Task management
-        Calendar integrations with Outlook, Google and iCalendar
-        Assigning members to the task
-        Discussions
-        Real time activity stream
-        Gantt Chart
-        Performance Chart
-        Time tracking
-        Progress report
-        File sharing and editing

Importance as an MIS student
For the MIS student, Wrike, is useful tool for managing their entire project. It is an effective way for managing multiple tasks and sub tasks for multiple projects. It is widely use for small teams members like in our MIS class. You can sync your calendars, tasks, and project milestones through integrations with Outlook Calendar, Google Calendar, and iCalendar. Wrike also offers a range of other 3rd party integrations, including Excel, Word, Google Drive, Box, Dropbox, and Gmail. Wrike’s iPhone and Android apps mean that everyone associated with a project can stay in constant communication, regardless of whether they are in traveling or permanently based in different offices and time zones which is useful when student are out for spring break during the semester. It would be easier for MIS student when they have experience about this kind of tools to get the jobs in industries and tech companies like this.

Article link:





Friday, April 22, 2016

Tech Musing 3 - CitzenFour

I have the good fortune of having HBO (or my grandparents' HBO password), so I was able to watch CitizenFour in its entirety. I actually watched this documentary when it first came out, because it was my first opportunity to look into who Snowden was as a person. Having watched it again for this class, I found it to be even more chilling the second time around. The unrestrained power the government wields in regards to information collection is staggering, to the point where it is difficult to even wrap my mind around the entire scope and scale of what they're doing. This mass collection is clearly a violation of constitutional rights, and I have a hard time believing people who argue the opposite. That being said, I can see where they  are coming from on a legal standpoint. When the constitution was written 230 years ago, the notion of emails, text messages, metadata or even phones was pure fantasy. As such, the laws have gaps in them where they do not account for these new forms of communication and information exchange. The law simply does not have provisions and protections for the internet, and most likely won't any time soon given the state of Congress. One of the main things I take away from things like this is that our laws are often outdated, and need updating for the modern age (a prime example being the German extradition of a comedian who mocked the Turkish president, using a law from the 1830s as justification to send him to Turkey).

It's unfortunate that we won't likely see change anytime soon, in part because of a technologically illiterate Congress. Many of our elected officials were born before the computer was even invented - certainly before the internet became widespread - and they simply don't understand it. Some of the proposed laws, especially in the wake of the San Bernadino shooting and subsequent legal battle with Apple, show that Congress doesn't understand not only modern technology, but how privacy fits into it. Recently, Diane Feinstein and another Congressman introduced a bill that would required all information exchanged over the internet and mobile devices to be accessible at any time for law enforcement upon request. Essentially, they asked for back doors to every form of encryption, which makes it useless. They basically want to outlaw effective encryption. This would make it even easier for the NSA to run the programs Snowden describes in CitizenFour, It is a felony to steal or tamper with someone's physical mail because it is a massive invasion of privacy. Why should it not be equally illegal to steal and tamper with someone's mail and correspondence just because it is in a different format? These are the kinds of basic parallels that our current Congress seems to be failing to grasp, and why I think many people are frustrated with them.

On the actual topic of privacy, I think a quote from Benjamin Franklin is extremely relevant: "Those who would give up essential liberty, to purchase a little temporary safety, deserve neither safety nor liberty". We should not be forced to give up our rights in the name of national security. Especially in the name of programs that have been shown to not be all that effective in the first place. I do not feel safer knowing the government is watching everyone. I feel more at risk, and like I'm being made out to be an enemy of my own country. I feel more on edge and distrusting of anything the government says. Ironically, distrusting the government would most likely put me more in line with the Founding Fathers than the people who claim to be protecting the Fathers' vision. It's sickening, to be frank. I haven't changed any habits on the internet per se, as I don't think anything I do now will be of any particular interest to the government (unless the government is really into watching Stephen Colbert on YouTube). However, I do find myself caring about my privacy in all other aspects of my life, and being more guarded with the details of my life. I think Snowden has accomplished his goal of getting people to care about their privacy, and taking steps, no matter how small, to protect it. I hope this continues to evolve, and maybe one day shut down the NSA's spy programs. A good start would be to not renew the Patriot Act when it next comes up, however I don't think our next President is likely to do that (assuming it is Hillary or Trump). For now, the only thing we can really do is vote, and pray the politicians actually decide to care.