Technology Easy Sell

Benefits and Risks
Technology is not like buying a time share, thank G-d. 

We examine the costs and the benefits, and it either works and provides us a tangible competitive benefit or it doesn’t.

“You can’t be competitive without modern technology, you’ll simply be out of business.”

At the end of the day, you don’t want to be sold a worthless bag of goods from a no good (not genuine) salesperson. 

Read about it here in my new article in Public CIO. 

(Source Photo: Andy Blumenthal)

Malware Through A Charger

Malware Through A Charger

Who would’ve thought you can get cyber attacked this way…

Forbes is reporting that Georgia Tech researchers have discovered an exploit where malware could be introduced to your computer through the plug in AC power charger.

Based on their proof of concept, when you connect your computer and electrical plug, you could get more than an electrical charge to your Apple iOS computer–you could get hacked!

The malicious charger has been named Mactans and in the future could be put together by inserting a miniature computer board (e.g. a BeagleBoard) right into the base of a charger plug (larger than the one shown above).

The hack attack is enabled by the USB port which is used for charging and doubles as a data port so that the malicious code would be surreptitiously inserted into your computer.

So be careful what you plug into, because when you think you’re just powering up your battery, you may end up powering down your whole computer device.

This sort of reminds me of the shoe bomber that forever changed how we view seemingly innocuous shoes at the airport.

A shoe may not just be for walking, and a AC charger may not be just a power source anymore. 😉

(Source Photo: here with attribution to Lee Bennett)

>CONOPS, Proof of Concepts, Prototypes, Pilots, and Enterprise Architecture


User-centric EA seeks to implement successful IT governance for the enterprise. As such, it seeks to ensure that new systems not only meet users’ requirements, but also that organizational investments in new IT are successful.

There are a number of ways to phase in a new system to help ensure its success for the organization.

By first developing a clear definition of capabilities (CONOPS), and moving from proof of concept to prototype and to pilot, risk is mitigated on new system implementations and more systems are successfully brought to fruition. This phased systems development approach helps User-centric EA meets it target architecture and transition plan for the organization.

  • Concept of Operations (CONOPS)—evolves from a concept and is a description of how a set of capabilities may be employed to achieve desired objectives or a particular end state for a specific scenario.”
  • Proof of Concepta partial solution to a problem intended to prove the viability of the concept. A proof of concept may involve a small number of users acting in a business (non-IT) role using the system to establish that it satisfies some aspect of the requirements for the complete solution. The proof of concept is usually considered a milestone on the way of a fully functioning prototype.
  • Prototype—an original instance of some thing serving as a typical example for other things of the same category. A prototype is built to test the function and feel of the new design before starting production of a product.
  • Pilot—an initial roll out of a system into production targeting a limited scope of the intended final solution. The scope may be limited by the number of users which can access the system or by the business categories affected or the business partners involved or other restrictions as appropriate to the domain. The intent of a pilot project is to validate that the system is working in production as designed and limiting the business exposure if it is not.”

Note: Definitions of proof of concept, prototype, and pilot project were adapted from Wikipedia. The Definition for CONOPS was adapted from Navy Warfare Development Command (public website).