United States

Our memories are all we have

I am in China for work, with a few connection to the real world outside, so Italian news usually comes to me late, when I am able to connect to internet from hotel; great firewall allowing. Being isolated from the Italian reality put things into a different perspective, allow you to keep less news with more time to digest and think about. It happened a few days ago I learned of the death of Umberto Eco, one of the greatest Italian tinker of our age. He was a great writer, a great thinker, a truly free spirit. The first thing I did…

Management style, common error to avoid

Management style, common error to avoid Being a manager is a hard job, and it deals with cultural, economical, corporate issues and rules. But being a manager is indeed an important job usually performed with a not clear idea on what a manager should do. We can find Bad and Good managers, and most of the times they do not even realize where they stand in the good or bad dashboard, because usually nobody teach you what to be a manger means. Nevertheless there is a world of literature on management, so If someone really want to improve from naïve…

The rightful way to make an employee unhappy

Management is a difficult art, management in big corporations is more difficult. Management in a corporation where the multicultural requirement is a need is even harder. We all know it and, to a certain extent, we have to deal with it. We can’t expect everything works well and right, and we have to show flexibility and we have to be open to change and embrace the new but… Let’s be real, no matter how much effort you put sometimes things are just not right. When the environment is too toxic probably is better to leave than hoping for a change. …

The IoT Files – Infrastructure

The IoT Files – Infrastructure IoT is a complex argument, we already know it. In my previous introductory post I tried to explain the privacy and security concerns that IoT is bringing to us (https://www.linkedin.com/pulse/iot-files-privacy-antonio-ieranò). Most of those concerns are intercnnected one to the other, but have also a strong relationship with the next point: the infrastructure needed. With Infrastructure I refer to a lot of things, that goes beyond the simply technical aspect, because a real IoT infrastructure goes way beyond the access protocol or the wireless. Wireless Outdoorsindoors Connections But since we named Access protocols and wireless stuffs,…

The IoT Files – Privacy

In the previous post “The IoT Files – intro and security” I started to talk about Security issues related to the IoT world. Security imply a wide range of elements, one of them is Privacy. But since the nature of this topic is particularly sensitive I will talk about it separately. Privacy in the Internet of Things assume a different taste than we used to think. We should think again what IoT means. A lot of objects that are able to communicate and process data,  equipped with sensors that make them aware of the neighborhood. Those sensors will be able to…

Global Cooperation in Cyberspace Initiative

Dear Colleagues,   The EastWest Institute is leading a Global Cooperation in Cyberspace Initiative to help make cyberspace more secure and predictable. As part of that initiative, EWI has established a “breakthrough group” that is working to enhance cybersecurity for governments and enterprises globally by enabling the availability and use of more secure information and communication technology (ICT) products and services.   For providers in the ICT supply chain, the group is promoting the use of recognized and proven international standards and best practices that improve product and service integrity. For buyers of ICT, the group is working to foster the use of procurement…

The sunrise of hate and the sunset of reason

I am a vivid LinkedIn user, I post on LinkedIn and read posts. Is a great way to understand and know the world outside. but lately I have seen a rise of hate comments and speeches that I find disturbing. Mostly are related to political issues (quite understandable USA election are rising the bar of intolerance and violence between the contenders) but also ethnic and religious ones are present. The most deplorable are the ones related to the never ending war between Israel and Palestine and the reaction to muslin radicalism. I am not a religious guy, I am agnostic,…

Ahmed Mohamed the kid arrested because too smart

What did you do?   There is no doubt that Ahmed Mohamed is a smart guy. He “create” a clock assembling some electronic stuffs at only 14, while most of our kids are, more or less, able to chat and write silliness on Facebook. But his story is quite interesting, you can find on the web a lot on this. To make a long story short apparently the guy bring the handmade clock to school, waiting for praise and compliments. The teacher instead call the police, and the little boy is arrested, handcuffed and brought to prison. Now let be…

Some times they come back

View image | gettyimages.com I wrote a few time ago about double standards in IT security that affect eastern countries’ companies as Chinese Huawei and  ZTE or Russia’s ones  when dealing with western countries. I wrote this effect is quite evident every time you read news on cyber security threats. Guess what… I was reading some news lately and I encounter some statements that make me think (again) about it: Let’s take the FREAK attack as an example. FREAK attack is a security vulnerability that breaks HTTPS protection. The troubles today owe to ‘export grade encryption’ – a deliberately weaker form of encryption baked into products shipped outside of the United States, enforced by the American government. The restrictions were removed…

Are we using a double standard in IT security?

Are we using a double standard in IT security? In the last years Cyber Security has raised as a major concern in any sector of our lives, from government to business and even at private and personal level. But I am wondering if there is a sort of double standard when we judge facts happening when they are related to cybersecurity. Let’s make some example: We all have read concerns rising form the rumoured new rules that china will impose to companies selling IT equipments in some sensitive sector like financial, western expert have raised all so of questions pointing out that…

Posts navigation