Online Music Still in Flux – The Fight for Primacy

Jimmy and Grandad watch CricketThere have been a couple of events over the last couple of days that show that the online music industry is still in flux.

The struggle that seems to be at play here is the struggle between content and content delivery; who dominates? Is it the content owner that has the primacy, or is it the content deliverer?

This struggle is one that we are going to see in many areas.

Many web sites owners have already handed their primacy over to Google as the content deliverer. Some of them have lived to regret this as they fall down the search rank and their business suffers.

Many retail businesses have already handed their primacy over to eBay as the content deliverer. Again, some have lived to regret this as eBay changes its policy and their business suffers.

It’s difficult to know whether the advertisers still have primacy over Google, or whether it’s Google that now has primacy over advertising.

The music industry seems to have decided that it is going to fight to retain primacy. Whether they are successful or not remains to be seen.

Technorati tags: , , ,

Grumpy Old Men of IT (GROMIT)

Jimmy and Grandad riding highI’m wondering whether I am being subversively recruited into a secret club that is solely for people who have been around IT for more than 20 years and are entering the Grumpy Old Men phase.

No one has explicitly mentioned the secret club, it’s a secret club after all. It’s just a feeling I have.

I keep finding myself in conversations where I am engaged by someone of a similar age for the sole purpose of reminiscing about the good old days of IT and how these new kids really haven’t a clue. 

Without even thinking about it I find myself sucked into telling stories of these supposed “good old days” and working myself into a state of grumpiness. I’ve started to call these people and the secret society “GROMIT” (Grumpy Old Men of IT).

I wonder whether there is a minimum age for the secret club at 40 and that I am being groomed for the time when I pass this milestone in a few months time.

The exchanges between myself and the members of GROMIT seem to go nearly always go a bit like this:

GROMIT: “Why can’t the operations team keep this equipment updated with all of the patches.” (or some other similar issue)

Me: “We do seem to be making hard work of it.” (I’m being lured in)

GROMIT: “It never used to be this difficult. When we used to do it we just got on with it and sorted it out. I knew the configuration of everyone of the systems I looked after and they were always up-to-date.” (Spot the trap)

Me: “Yes, I think we learnt some hard lessons that they don’t seem to learn these days.” (I’ve now completely taken the bate)

GROMIT: “Do you remember working in the old building.”

Me: (Getting reeled in now) “Oh yes. Do you remember the old Mainframe Sysprogs who sat in the back corner. There was no way you would mess with their system unless you were sure about what you were doing. You checked things and double checked them. There just doesn’t seem to be the rigor these days.”

And of we go to grumpy land.

Am I just getting old and grumpy? Are you a fellow grumpy?

Do you ask questions like:

  • Why does it take so many people these days?
  • Why can’t these kids get it right the first time around?
  • Where are all of the old disciplines?
  • Why are we still having to learn these lessons?
  • Why do none of these kids understand the whole system anymore?

Does GROMIT exist? If it doesn’t, should it?

BBC: Blackberry ban for French elite

Jimmy and Grandad take a trip to LondonThe BBC are reporting on a ban on Blackberry use for French Officials:

“French government officials have been ordered not to use handheld Blackberry devices amid fears that foreigners could spy on them, reports say.

Workers in the French president’s and prime minister’s office have been told their e-mails risk falling into foreign hands, Le Monde newspaper reports.

France’s SGDN security service is worried because Blackberries use US- and UK-based servers, the paper says.”

What I found interesting about this article wasn’t the erroneous security issues but this statement:

“But some officials are flouting the ban and using them in secret, it adds.

“They tried to offer us something else to replace our Blackberries but it doesn’t work,” one unnamed official told the paper.”

This is another example of the strength of User Innovation. These officials are really important people who should be very concerned with security. Their need to communicate is greater than their need to obey by the rules. I’ve witnessed similar behaviour in many organisations; people needing to get things done doing whatever it takes to get it done. If the French security services can’t stop people working outside the defined security envelope what chance to other organisations have.

The thought of all these French officials using these things in secret conjures up all sorts of clandestine images for me. I’m imagining lots of people in dark glasses and overcoats congregating down dark alleys to feed their addiction. Others are sitting next to each other in a public place agreeing the sign for the time when they should surreptitiously leave. Such is their need.

Technorati tags: , ,

Virtual Earth gets terrain

Microsoft’s Virtual Earth has integrated terrain for Great Britain.

A couple of examples.

The view of Scafell from Great Gable:

The view of Catbells and the Jaws of Borrowdale from Friars Crag:

Google earth has had terrain for a while, but this would appear to be more detailed than their offering (but not a lot)

I’m bigging this one up because it has come to Great Britain first, I always like it when we are ahead .

Bang goes a whole load more hours looking at things for no real purpose.

Technorati tags:

Frustrated with search

Trees, treesToday I am very frustrated that I cannot find what I am looking for.

I remember reading an article the other day about the declining number of people who use web based e-mail. It included a really interesting chart to demonstrate the relative decline of the various options (Hotmail, Yahoo, etc.). I wanted to refer to this chart in another post I want to write today, but I can’t find the article.

I would normally have tagged it in del.icio.us if I thought I was going to refer to it again, but I haven’t.

I flag a lot of things that I might go back to in feedburner too, but I haven’t.

So it’s off to Google, Live Search, and the rest, but they aren’t telling me what I want to know. They want to point me to sites that discuss the relative merits of each one, but that’s not what I want. I want a chart that I know I’ve seen, but can’t communicate through the interface available to me what it is I require. I can’t communicate the concept or my impression of what I remember. I’m stuck trying to find the combination of words that get me to an answer.

I’m also left with the feeling of inadequacy that comes when I know I should have done something (del.icio.us) but didn’t.

Search still has a long way to go. If these systems know so much about me, why don’t they remember something that I found interesting? Why do I need to tell them that I found it interesting? Why can’t I see all of the pages that I actually bothered to read in the last few weeks? There won’t be that many of them. Most of the data I trawl through is only scan read, very little is read in detail.

Time to go and think about something else, it may come back to me then. The brain does something that none of these IT systems do yet, it carries on processing something even when I’m not thinking about it. But then I might be worried about the privacy issues.

Microsoft Sales Toolkit (UK)

Picnic by DerwentwaterA number of people have seen me using a book called “Microsoft Sales Tool Kit” recently. It’s a great reference tool for all of the Microsoft technologies from a sales perspective. While I’m not normally in the role of direct sales, it’s very useful to know how the technology is likely to be sold by others.

If you are interested then you can order one from here: www.microsoft.com/uk/gearup.

If you subscribe to receive updates you get a real paper book, it’s also available for download .

Windows Live Writer – Playing

Mossy dry stone wallsBeta 2 of Windows Live Writer was released yesterday. This is just me playing with it a bit…

It seems to work fine. They still haven’t done anything about the dictionary so it looks like I’m going to have to reapply my UK dictionary hack.

The spell checker now works inline with nice squiggly lines, even after the hack.

The interface has got a bit more cluttered, and I’m not sure it’s for the better. There seem to be more options that I rarely use taking focus of the ones I use a lot. Moving categories to the bottom seems like a change for changes sake rather than something that needed to be done.

Technorati tags:

A Creative Commons Example: I've had a picture published!!!

Skiing in Bansko, BulgariaI use flickr to publish my photos so that I can use them on the blog, but also so friends and family can see them. Photography is a hobby which I enjoy and could really get into, but I have decided to restrict myself for now.

My standard setting for flickr copyright is Creative Commons Attribution-NonCommercial. This one happens to be covered by version 2.0. I’m quite relaxed about people using my pictures, but I don’t want them making lots of money out of me (as if that was possible).

A few weeks ago I was contacted by someone putting together a free magazine that gets distributed at a number of regional airports in the UK. They liked one of the pictures we posted from our skiing holiday in Bansko, Bulgaria and wanted to use it in a feature.

Even though the magazine is free, it’s still commercial, so they were seeking permission in lines with the copyright agreement.

I gave permission asking that the “attribution” still stood and for a copy of the magazine in return.

Last week two copies of the magazine arrived with my photo in them and my name by the photo .Published Bansko Picture

It’s a surprisingly good feeling to know you are a published photographer – even if it is just in a free magazine.

Creative Commons worked. They had access to the file, they could have just used it without asking, but they didn’t. Others may have used pictures without asking and without attribution but the fact that someone went through the process of shows that it can work.

 

Technorati tags: ,

Slow IT – 64-bit Windows

Jimmy and Grandad try to understand hoodiesThe IT industry likes to project itself as dynamic, thrusting, rushing forward. But some things in IT take a long time. The mainstream transition of IT to 64-bit is one such example that I was reminded of today.

64-bit processors and 64-bit operating systems have been around for a very long time.

According to wikipedia the history starts in 1961, but I think I would regard the launch of the MIPS and Alpha chips in 1991 & 1992 as the launch into the mainstream of IT. That’s 15+ years.

The followers here have certainly been Microsoft, with the vast majority of Windows clients and servers still running Windows 32-bit. And 32-bit Windows isn’t going away any time soon, even on the servers. Yesterday Microsoft restated its position on Windows 64-bit and the intention that Windows Server 2008 will be the last one available on 32-bit.

The limitations of the 32-bit architecture on Windows server are evident all over the place and still there is a huge reluctance to make the move. There are thousands of servers with 64-bit processors in them willing to take up an even greater load, but being forced to work within an architecture that is to say the least limiting. Even in an industry where change is inevitable it seems that change still isn’t easy.

User Innovation and Security

Look out Jimmy!!!User Innovation by end users of IT systems is inevitable. For years this innovation has primarily happened on the end user device. There have been a number of reasons for this; flexibility, isolation, responsiveness, connectedness, tools, capacity, control, etc. Each of these have created a compelling User Innovation platform.

Most organisation don’t actually like their users innovating in this way because they think users should be “doing their job”. One of the levers that organisation pull when they are trying to get people to focus on “doing their job” is security; “you can’t do that because it’s against the security policy”. The “security policy” being the lever to get them to step back into line, but this doesn’t work because the need to innovate is strong.

Let me try and explain the reasons why I don’t think that management via a rules based security policy works.

Security is normally the responsibility of a central function who express this responsibility through a security policy. Users are responsible for following the security policy, not for good security. The policy that is defined needs to be applicable to everyone making it generic in nature and tends to be rules based “though shalt not send executable files across email”.

The combination of centralized responsibility and generic rules based policies put the end user in a situation where they don’t understand the real security issues and hence innovate around the policy in inappropriate ways.

Rules based policies then get embedded into the service that is manufactured for the end user. Because the User Innovator assumes that the rules have been embedded into the service they also assume that if they are allowed to do something that it’s not a security problem.

But the truth is, it’s not possible to embed the rules in all situations within the service. Lets take Internet based services as an example. How do you set boundaries on the whole Internet with a set of rules and how on earth do you embed those rules into the service that you deliver.

At the same time you limit what they can do within the organisation so that Innovators are more likely to innovate outside it.

The publishing of potentially sensitive corporate data on Google Calendar which has been uncovered this week is probably a good example of these issues. I’m sure there are a number of reasons for the problems, but one of the main ones has to be people’s lack of understanding of the security issues involved, their reliance upon the security boundaries set for them and the level of control placed upon them within the organisation.

User Innovators need to be embraced as people who are adding value, they then need to be given some responsibility to consider the risks of the innovations that they are undertaking. Sometimes this means physically protecting them. Sometimes this should mean educating them on the risks that they are about to face and providing them with mechanisms for mitigating those risks. User Innovators need to be taught how to undertake a risk assessment of their innovation. They are going to innovate, so we should help them to do it knowing the risks.

The User Innovators are not the enemy though, they are trying to innovate so that they can gain something and that something is normally a benefit. Their skills should, therefore, be harnessed to help answer the security problem that are changing every day. There are a number of ways of getting their significant expertise focused on a particular problem, but I think that’s a topic for another day.

Technorati tags: ,

Feeling a little older – ZX Spectrum makes 25

Jimmy and Grandad riding lowToday marks the 25th anniversary of the ZX Spectrum.

When I was at school I did most of my ‘O’ levels on a trusty ZX Spectrum, printing it out on a thermal printer and then sticking the bits of metallic paper to some real paper so the teachers could read it.

Knowing it is 25 years old makes me feel that little bit older .

Knowing that I have 2GB in my USB memory stick doesn’t make me too nostalgic for the days of fussy micro-tapes, but knowing how much we managed to do in 48KB does make me wonder whether we have used all of these extra circuits to their full potential.

 

Technorati tags: ,

Blackberry on my Windows Mobile

Jimmy and Grandad take a trip to LondonIt seems that RIM are wanting to extend their footprint to Windows Mobile 6.

The interesting thing about this is that RIM aren’t porting the capability to a Windows Mobile type application. The software will run as a Virtual Blackberry on the device, this Virtual Blackberry will use the Blackberry interface, not the Windows Mobile interface.

I’ve used a Blackberry interface a little and a Windows Mobile 5 interface a lot. They are very different and I’m a little uncertain how people will feel switching between them.