Stories by Evan Schuman

Who's flying the plane? The latest reason to never ignore security holes

Some things are just so predictable. A retailer is told about a mobile security hole and dismisses it, saying it could never happen in real life -- and then it happens. A manufacturer of passenger jets ridicules the risk posed by a wireless security hole in its aircraft, saying defensive mechanisms wouldn't let it happen -- and then it happens.

Written by Evan Schuman19 May 15 19:09

Digital Dumpster diving: A trashcan that reports on what you throw away

Every now and then, a product comes along that is either genius-level brilliant or celestially clueless. To get the CC award, product designers must force themselves to not only ignore the bad ways the product could be used or to naively believe that minimal safeguards would prevent them. For your consideration: the GeniCan, which scans and otherwise figures out almost everything you are throwing away or recycling and wirelessly transmits that data back to the mother ship.

Written by Evan Schuman05 May 15 19:09

Target's under-stocked sale: Lessons not learned

In retail -- and especially in e-commerce -- there's a nuanced distinction between having a very popular sale and arranging for far too little merchandise. It's like those hold recordings that say the lengthy hold time is because of high customer call volume, prompting most people to mumble, "That and the fact that you're too cheap to hire enough call center operators."

Written by Evan Schuman24 April 15 04:23

Sony reminds us all what a pathetically weak link email is

Sony is reliving the nightmare that <a href="http://www.computerworld.com/article/2858358/fbi-calls-sony-hack-organized-but-declines-to-name-source-or-finger-north-korea.html">its hacked databases</a> gave rise to late last year, now that <a href="http://www.computerworld.com/article/2910891/wikileaks-publishes-searchable-database-of-hacked-sony-docs.html">Wikileaks has thoughtfully published all of the leaked documents in a searchable database</a>. Really, they are the most courteous hoodlums ever.

Written by Evan Schuman21 April 15 19:11

Let's rethink email

I've been using email longer than most people (more than a quarter of a century), so I think I have the credibility to say it's overdue for an overhaul.

Written by Evan Schuman06 April 15 19:03

Where's the data?

It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.

Written by Evan Schuman18 March 15 01:56

Some email truths for Hillary Clinton

This week, shortly after former U.S. Secretary of State Hillary Clinton became the poster child for enterprise BYOD issues, she held a news conference to explain and justify her convenience-oriented defense. During that briefing, she said that her private email server "was set up for President Clinton's office. And it had numerous safeguards. It was on property guarded by the Secret Service. And there were no security breaches."

Written by Evan Schuman13 March 15 08:04

LLAP, Star Trek tech!

Friday, February 27, brought the terribly sad news that Leonard Nimoy, the actor who will always be known in IT circles as <em>Star Trek</em>'s Mr. Spock, had passed away. For a lot of people in IT, <em>Star Trek</em> was incredibly important. It's not unusual to hear IT professionals say that <em>Star Trek</em> first got them interested in computers or technology. And over the past half century, much of technology was influenced by the franchise.

Written by Evan Schuman03 March 15 23:21

Uber shows how not to do a privacy report

The Uber privacy report released last week (Jan. 30) is the perfect example of how <em>not</em> to handle a privacy PR disaster -- or any privacy policy matters at all.

Written by Evan Schuman06 Feb. 15 06:08

Can you trust Amazon's WorkMail?

When Amazon unveiled its cloud-based corporate <a href="http://www.computerworld.com/article/2877217/aws-launches-workmail-for-the-enterprise.html">WorkMail email offering</a> last week (Jan. 28), it stressed the high-level of encryption it would use and the fact that corporate users would control their own decryption keys. But Amazon neglected to mention that it will retain full access to those messages -- along with the ability to both analyze data for e-commerce marketing and to give data to law enforcement should subpoenas show up. 

Written by Evan Schuman03 Feb. 15 20:07

Let's not make patent trolls stronger

As you can tell by the name we've given them, patent trolls aren't popular critters. The game these operators play is shady and sleazy, bordering on extortion -- though it's completely legal. What they do is to purchase patents, with no intention of using or selling them, but rather to shake down as many people as possible by accusing them of violating the patent, even if the patent troll has no reason to believe that.

Written by Evan Schuman20 Jan. 15 22:29

Hold the phone, McDonald's

Mobile payments are supposed to be fast, easy and convenient. I knew when I pulled up at a McDonald's drive-through window the other day that the fast food giant's implementation of Apple Pay challenged. I just didn't know challenged it would be.

Written by Evan Schuman24 Dec. 14 01:55

Getting in customers' faces

Retailers love thinking about how they can use IT analytics of social media to get close to their customers. But when a retailer breaks through the invisible social media wall and reacts to an online post with a very personal in-store interaction, it may not reap the desired increased-sales outcome.

Written by Evan Schuman10 Dec. 14 01:35

OK, BlackBerry, what else have you got besides security?

BlackBerry's pitch to get back into the warm embrace of corporate IT shops seems logical enough at first glance: We're the most secure in mobile. Mobile is where all of your data and interactions are heading. Therefore you should give us all of your corporate business.

Written by Evan Schuman26 Nov. 14 00:37

Are fingerprints PINs or physical artifacts?

In security and privacy circles today, no good deed goes unpunished. Consider Apple's recent privacy initiative. Under its new encryption policy, Apple can't divulge confidential information about its customers' data, because only the consumer's credentials can unlock the data -- and those credentials are completely under the control of the customer. For added security, Apple layered biometric authentication (fingerprint) on top, so that people wouldn't have to type their passwords/PINs in public, exposing themselves to the dangers of shoulder-surfing.

Written by Evan Schuman11 Nov. 14 21:11
[]