Jun 092015

The Twentieth Century was defined by abundant and cheap energy while this century will be shaped by our access to massive amounts of data.

How do managers deal with the information age along with the changes bought about by technologies like the Internet of Things, 3D printing, automation and social media?

Management in the Data Age looks at some of the opportunities and risks that face those running businesses. It was originally prepared for a private corporate briefing in June 2015.

Some further background reading on the topic include the following links.


May 282015
radio programs for techonology, web, social media, cloud computing and computer advice

Paul Wallbank regularly joins Tony Delroy on ABC Nightlife on to discuss how technology affects your business and life.

Along with covering the tech topics of the day listeners are welcome to call, text or message in with their thoughts and questions about technology, change and what it means to their families, work and communities.

If you missed the May program, it’s now available on our Soundcloud account.

For the May 2015 program Tony and Paul looked at some of the gadgets coming out of the Internet of Things, what your social media posts say about you and Mary Meeker’s big Internet Trends report.

Join us

Tune in on your local ABC radio station from 10pm Australian Eastern Summer time or listen online at www.abc.net.au/nightlife.

We’d love to hear your views so join the conversation with your on-air questions, ideas or comments; phone in on 1300 800 222 within Australia or +61 2 8333 1000 from outside Australia.

You can SMS Nightlife’s talkback on 19922702, or through twitter to @paulwallbank using the #abcnightlife hashtag or visit the Nightlife Facebook page.

Apr 192015
Future proofing your business free webinar

On April 29 I’m helping Flying Solo with a webinar on how small and single operator businesses can future proof their businesses.

During the webinar we’ll be looking at how businesses can adapt and profit from a rapidly changing economy.

Some of the things we plan to discuss include the trends driving the changing marketplace, some of the tools businesses can be using to harness a rapidly evolving workforce and methods to attract mobile consumers.

We’ll also have a look at some of the ways canny business owners can use social media, cloud computing and other online services to make their businesses more profitable and flexible in a tougher business world.

The webinar itself is free and you can sign up at the Flying Solo website. Hope to see you there.

Feb 172015
radio programs for techonology, web, social media, cloud computing and computer advice

Paul Wallbank joins Tony Delroy on ABC Nightlife nationally from 10pm Australian Eastern time on Thursday, February 19 to discuss how technology affects your business and life.

If you missed the show, the program is available for download from the ABC site.

For the February 2015 program Tony and Paul look at robot driven hotels, the internet of rubbish bins and how your TV could be listening to you.

Last year a lawyer read the terms and conditions of his new Samsung TV and discovered that the company recommended people don’t discuss sensitive information around it. This has lead to widespread, and justified, concerns that all our smart devices – not just TVs but smartphones and connected homes – could be listening to us. What happens to this data and can we trust the people collecting it?

The internet of rubbish bins

It’s not only your TV or smartphone that could be watching you, in Western Australia Broome Shire Council is looking at tracking rubbish bins to make sure only council issued ones are emptied.

Shire of Broome waste coordinator Jeremy Hall told WA Today  the council’s garbage truck drivers had noticed more bins than usual were getting emptied and a system needed to be put in place to identify “legitimate” bins.

While Australian councils are struggling with rubbish bins a hotel in Japan is looking to replace its staff with robots and room keys with face recognition software. The Hen-na Hotel is due to open later this year in Nagasaki Prefecture, the Japan Times reports.

Join us

Tune in on your local ABC radio station from 10pm Australian Eastern Summer time or listen online at www.abc.net.au/nightlife.

We’d love to hear your views so join the conversation with your on-air questions, ideas or comments; phone in on 1300 800 222 within Australia or +61 2 8333 1000 from outside Australia.

You can SMS Nightlife’s talkback on 19922702, or through twitter to @paulwallbank using the #abcnightlife hashtag or visit the Nightlife Facebook page.

Jun 222014

A few weeks back I gave a presentation to the Australian Seniors Computer Clubs Association as part of Staying Safe Online Week.

The presentation, Security In The Age of Connected Kettles, looked at where we are today with online security and some of the challenges facing individuals, businesses and communities as threats become more pervasive with cloud computing, personal technology and the internet of things while the people creating these risks become more professional.

Overall, it’s not a cheery scenario and I end with a call to action that we have to start insisting business, public sector and political leaders start taking online security seriously as a public safety issue.

Over ten slides we covered where we are today in personal and small business online security and some of the challenges facing individuals as computing moves onto the cloud and smartphones.

The ongoing online safety battle

Online safety is evolving as we move from PCs to tablets and smartphones, today the risks are increasingly appearing on our mobile devices although the desktop computer and email scams remain the biggest risk.

It’s increasingly about the money

A change to the security landscape in recent times has been the rise of professional malware. While a decade ago most of the hacks and viruses we saw were the work of people demonstrating their skills or causing mischief, today there is big money in compromising computers and capturing data.

The rise of ransomware

One of the best examples of the professionalisation of the internet’s bad guy is the rise of ransomware.

Ransomware locks your computer with a demand for payment to release your data; if you don’t pay you lose all your information.

Many of the online threats though are far more subtle; the theft of data from Target, compromises of Sony’s customer databases and ongoing security breaches illustrate how the risks are far greater than just on our desktop.

Smartphone lockups

Ransomware has moved off personal computers onto smartphones with both Android and Apple systems being attacked.
The ‘hacked by Oleg Pliss’ message is a good example of how Apple’s products are just as much at risk as other companies’ platforms.
Also the ‘hacked by Oleg Pliss’ lockup shows how the security aspects of cloud computing services are going to become more important to the average person.

Security basics

The basic advice for the average user remains the same;

  • Strong passwords
  • Don’t use common passwords
  • Be careful what you click on or visit
  • Keep your systems up to date
  • Have good security software

However times are changing and many security issues are out of the average person’s control.

Lessons from Heartbleed

The Heartbleed Open SSL bug illustrated the limits of individuals in protecting their information. As a bug in the secure socket layer software, the Heartbleed Bug could expose sensitive data on websites using the service.

The disappointing thing with Heartbleed is that people following good security policies were vulnerable.

Probably the biggest threat with Heartbleed however is the Internet of Things, where relatively simple devices – the connected kettle – could expose security credentials.

The Target hack

Another example of how security is beyond the control of the individual user is the Target hack. Hackers found their way into the US department store’s network though an airconditioning contractor. From there, they were able to steal millions of customer payment details.

The Target hack is one of dozens of similar coporate security compromises and this will continue until security is taken seriously by company directors and regulators.

A pocket sized security breach

As the Oleg Pliss hack showed, smartphones are not immune to security breaches.

With our phones gathering increasingly more data on our behaviour, protecting the data they gather is going to become one of the biggest challenges facing us.

Rich data

Smartphones are not just gathering location data, as technologies like iBeacons roll out more information is being gathered from more sources.

When we go shopping, attend a football game or visit the doctor these technologies are collecting information on our personal habits and behaviour.

Not a generational issue

One of the myths around security and privacy is that concerns revolve around the generations.

The idea that only older people care about privacy or that younger folk understand technology is a myth.

Unfortunately however our political and business leaders come from a segment of society that doesn’t care about or understand the technology or issues.

If meaningful change is to be made in securing our information, then we’re going to have to demand our business and political leaders take these issues seriously.

Jun 102014

Today I spoke about online safety to the Australian Seniors’ Computer Clubs Association about staying safe online.

Hopefully I’ll have a copy of the presentation up tomorrow but what was notable about the morning was the concern among the audience about security and safety of cloud services.

The ASCCA membership are a computer savvy bunch – anyone who disparages older peoples’ technology nous would be quickly put in their place by these folk – but it was notable just how concerned they are about online privacy. They are not happy.

Another troubling aspect were my answers to the questions, invariably I had to fall back on the lines “only do what you’re comfortable with”  and “it all comes down to a question of trust.”

The problem with the latter line is that it’s difficult to trust many online companies, particularly when their business models relies upon trading users’ data.

Resolving this trust issue is going to be difficult and it’s hard to see how some social media platforms and online businesses can survive should users flee or governments enact stringent privacy laws.

It may well be we’re seeing another transition effect happening in the online economy.

Aug 252013

Business Insider’s unathorised biography of Yahoo CEO Marissa Mayer is both enlightening and scary while giving some insight into the psyche of the tech industry.

Nicholas Carlson’s story tells the warts and all tale to date of a gifted, focused and difficult to work with lady who’s been given the opportunity to lead one of the Dot Com era’s great successes back into relevance. It’s a very good read.

Two things jump out in the story; Mayer’s desire to surround herself with talented people and her chronic lateness.

When asked why she decided to work at a scrappy startup called Google, which see saw as only having a two percent chance of success, Mayer tells her ‘Laura Beckman story’ of her school friend who chose to spend a season on the bench of her school varsity volleyball team rather than play in the juniors.

Just as Laura became a better volleyball player by training with the best team, Mayer figured she’d learn so much more from the smart folk at Google. It was a bet that paid off spectacularly.

Chronic lateness is something else Mayer picked up from Google. Anyone whose dealt with the company is used to spending time sitting around their funky reception areas or meeting rooms waiting for a way behind schedule Googler.

To be fair to Google, chronic lateness is a trait common in the tech industry – it’s a sector that struggles with the concept of sticking to a schedule.

One of the worst examples I came across was at IBM where I arrived quarter of an hour before a conference was due to start. There was no-one there.

At the appointed time, a couple of people wandered in. Twenty minutes later I was about to leave when the organiser showed up, “no problem – a few people are running late,” he said.

The conference kicked off 45 minutes late to a full room. As people casually strolled in I realised that starting nearly an hour late was normal.

It would drive me nuts. Which is one reason among many that I’ll never get a job working with Marissa Mayer, Google or IBM.

A few weeks ago, I had to explain the chronic lateness of techies to an event organiser who was planning on using a technical speaker for closing keynote.

“Don’t do it,” I begged and went on to describe how they were likely to take 45 minutes to deliver a twenty minute locknote – assuming they showed up on time.

The event organiser decided to look for a motivational speaker instead.

Recently I had exactly this situation with a telco executive who managed to blow through their alloted twenty minutes, a ten minute Q&A and the closing thanks.

After two days the audience was gasping for a beer and keeping them from the bar for nearly an hour past the scheduled finish time on a Friday afternoon was a cruel and unusual punishment.

This was by no means the first time I’d encountered a telco executive running chronically over time having even seen one dragged from the stage by an MC when it became apparent their 15 minute presentation was going to take at least an hour.

It’s something I personally can’t understand as time is our greatest, and most precious, asset and wasting other people’s is a sign of arrogance and disrespect.

Whether Marissa Mayer can deliver returns to Yahoo!’s long suffering investors and board members remains to be seen, one hopes they haven’t set a timetable for those results.