Why I Still Get Paper Bills

I think it might be Ben Franklin who said “A paper bill is the worst way to get your account statement, except for all the other ways.” Or maybe not.  Whatever.  I still get a lot of bills on paper delivered through the (physical) mail, and here is why. Continue reading

Registering Again … (Sigh)

The bane of social networking sites is the need to register one more username, one more password, and once more to fill in some sharable details.  That is sooooo 2008.   I am registering with a conference so I can select interesting presentations, and reminded once again how much I hate registering for sites. Continue reading

Social Business: Identity and Reputation

Social Software is turning the idea of identity on it head.  Actually this is a trend that has been happening for long time, but it is being thrust into the public consciousness by the desire now to bring social systems into the enterprise: ESS.  It used to be that on the Internet nobody knows you are a dog), but that is changing.  What they do know is your reputation, which becomes your identity. Continue reading

Web Security vs. Superstition, Part 4

Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles.  Part 4 is about some strange behavior I have seen in security groups and other insanity. Continue reading

Web Security vs. Superstition, Part 3

Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles.  Part 3 is about an experience I had with a public forum, and their justification for deviating from these guidelines. Continue reading

Web Security vs. Superstition, Part 2

Web site security is a very important issue to me. I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles.  Part 2 is in response to my meeting with such a “security expert”. Continue reading