• About Me
    • Bios
  • Professional
    • Resumes
      • Data Security Resume
      • Full Consulting Resume
      • Skills List
    • Certifications
      • Certified Information Systems Security Professional (CISSP)
      • GIAC Certified Incident Handler (GCIH)
      • GIAC Security Leadership (GSLC-Gold)
      • Novell Certified Linux Professional (NCLP)
      • Red Hat Certified Engineer (RHCE)
    • Communities
      • A Ticket, A Task Kit
      • Infragard
      • Central Iowa Area Linux Users Group
      • SANS Community
    • HOWTOs
      • How To Configure Firefox – 2005 Version
      • How To Configure FreeBSD
      • How To Configure Mediawiki
      • How To Configure NetBSD – 2004
      • How To Configure Palm Treos
      • How To Migrate Red Hat 6.1 server to VMWare
  • Fun Stuff
    • Allergies
    • Book Reviews
    • Coyote Signs – The Inspiration
    • How to make s’mores
    • How to ship a tiger to Canada
    • Photography
    • Strained Geometries
  • Categories
    • Business Security
    • Coyote Signs
    • Mythology
    • Natural History
    • Psychology
    • Sprint
  • Contact
Menu

Do not award coyotes medals of honor

  • At September 30, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not award coyotes medals of honor
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not grant coyotes honorary doctorates

  • At September 29, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not grant coyotes honorary doctorates
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not give coyotes tickets to R-rated movies

  • At September 23, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not give coyotes tickets to R-rated movies
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not prop open door and allow coyotes into sandwich shop

  • At September 22, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not prop open door and allow coyotes into sandwich shop
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not buy beer for underage coyotes

  • At September 16, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not buy beer for underage coyotes
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not paint coyotes mauve

  • At September 15, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not paint coyotes mauve
(If you can’t see the image above, try the local archive)

  • PDF
    (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not confuse coyotes

  • At September 09, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not confuse coyotes
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not teach coyotes to operate motor vehicles

  • At September 08, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not teach coyotes to operate motor vehicles
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Do not give coyotes the secret of fire

  • At September 02, 2007
  • By Josh More
  • In Coyote Signs
  • 0

(What is this?)

Do not give coyotes the secret of fire
(If you can’t see the image above, try the local archive)

  • PDF (If the link fails, try the local archive)
  • Inkscape SVG
  • Icon

Solutions are everywhere

  • At August 06, 2007
  • By Josh More
  • In Business Security
  • 0

One aspect of my job that people simultaneously do not understand and think is marking speak is that of custom solutions generation.

This is often described as “We don’t sell products, we sell solutions.” or “Clients all have different needs, instead of fitting each one into the same box, we build a custom box for each client.” It’s a good story, but what does it actually mean?

The problem with explaining it, is that most of what I do for one client would make absolutely no sense for another, which leaves us to only speak in generalities. Of course, when you do that, people get bored and drift off. So today, I’m going to try to do it differently.

Over the weekend, the following news story was released. The attention-grabbing headline was “China tells living Buddhas to obtain permission before they reincarnate”. Of course, being in the business I am in, I immediately had the following thoughts:

  • Boy is that an implementation headache
  • China just created another branding problem for themselves

So, I am going to look at this problem from an IT/Business perspective. Suppose for the moment that China hired me as a consultant, and they posed the problem. This is how things might evolve:

China: Welcome. We need to prevent the Dalai Lama from re-incarnating. We’d like you to help.
Me: OK, we’re starting a bit early here. Let’s take a step back and reconsider the problem.
China: The Dalai Lama has too much power in Tibet, we need to be able to control things over there.
Me: Alright, if I am hearing you correctly, you are saying that you perceive the situations in Tibet as a threat to China
China: Right.
Me: Now, from what I know about Tibet/China relations, one of the reasons that Tibet is a threat is that China puts increasing control over Tibet, and the people don’t like that, right?
China: Well, maybe.
Me: I fully understand your need to keep your people safe, but let’s consider what might happen if you were to ban reincarnation…
Me: It seems to me that, since many people in Tibet are already reincarnating, this policy would either be ignored or would seriously upset the population.

China: Hmmm.
Me: Now, suppose you could ensure that the policy would be followed by increasing the military presence in Tibet.
Me: What would that cost?

-China pulls out an envelope and runs a few numbers.
China: Umm, that would take 50 million troops, at 85 yen per day blah blah blah (I’m not even going to pretend that I know what it would cost China to fully invade Tibet).
Me: That sounds like a lot of money.
China: Yeah.
Me: So let’s look at the other option. Suppose that the people feel compelled to follow the policy, but get upset. What would you do in that situation?
China: Send in the troops.
Me: So the cost for that would be…
China: Oh.
Me: So maybe this isn’t the best solution to your problem. Let’s brainstorm a few others right now.

Let’s compare this to the standard IT solution that does not consider the entire business case:

China: Welcome. We need to prevent the Dalai Lama from re-incarnating. We’d like you to help.
GenericIT: Sure, we can do that for you.
GenericIT: First things first, we need to install a firewall on each of your reincarnate lamas, to block outbound soul migration.
GenericIT: We recommend using SoulShield.
GenericIT: Next, you’ll need a maintenance plan for each firewall, and we recommend that you install a country-based reincarnation detection system in Tibet, so you can find when souls are trying to break out of containment.
GenericIT: You’ll need one CRDS installed in each of Ngari, Tsang, Ü, Amdo and Kham
GenericIT: Now, who will manage the system? Do you want the hassle of manually allowing reincarnations, or would you like us to do this as a managed service for you?

China: Umm, get us a quote on both options.
GenericIT: Sure, no problem.
-GenericIT doodles on back of envelope.
GenericIT: Well, we think we have what we need. We’ll get back to you next week with two quotes.

Now, I ask you to consider two things.

  1. If you were China, which long-term solution would be best?
  2. If the technical solution fails to work 100%, what are the chances of GenericIT’s contract being renewed at the end of the year?
« Previous
Next »
Other Sites: Business, Photos/Conservation
Search

Get the feed (RSS):



Josh More - Entropologist
Expert in removing chaos from
I.T. and business systems.

Recent Posts

  • Thinking about enterprises
  • New Book: Breaking In to Information Security
  • Security Metaphors
  • Book Review: All Yesterdays
  • Book Review – Blackhatonomics
  • Three Stories about Growing Up
  • Internet Theft and the Holidays
  • Sophos: Pushing the Boundaries
  • Controlling the Security Story
  • Video – OWASP – July 16th, 2012

Archives

Categories

  • Business Security
  • Coyote Signs
  • Mythology
  • Natural History
  • Psychology
  • Sprint
  • Uncategorized
Copyright © 2013 by Josh More