In all the euphoria for Web 2.0 I am lately traveling in “Modem-country” again. Oh no! Do you remember?! No high speed Internet, connections with 40K or even 33K (thousand) only, where a slow DSL is 768K, normal are 2M (million). Wow. It is relatively easy to use Google and many other websites, but then I stepped into “Web-2.0-content” and got into the World-Wide-Wait…
And I realized how many website developers add into “unclean” code, complex but unnecessary flash animations, large images that have not been optimized to quick loading times. I received mails with 2MB attachments, happy that we use an IMAP-server, so I did not need to download the attachments as in earlier times!
It’s also frustrating if you send me my entire inquiry back, as if I wouldn’t be able to remember what I wrote or look up my mail. If you quote, fine. If not, be so kind and delete the inbound mail. Ctrl-A to mark all, or Ctrl-Shift-End to mark from the cursor to the end. Then hit “delete”…
We became so quickly used to high speed, many just don’t care what the recipient uses to connect. And yes, I got a 20MB file attachment too… Lucky I use a decent software that did not automatically try to download it… Sorry, I will only read it upon return.
Best of all, I do like the Word.doc-attachments, they always look so funny when I open them with Open Office. Some even warn me of activated Macros in the document (which I usually disable) I know why I prefer PDF 😉 And sorry people, I will not click to auto-confirm reception, I find this rather annoying.
So my friends, you better think about all this gadgets you like on websites. Especially when you address an international audience, I may not be the only one who cannot use your site.
A discussion on LinkedIn triggered thoughts about personal priorities in business. And keep in mind that it’s the (wo)man in the mirror that makes a change (or doesn’t).
I do think we far too much try “selling” and many people have forgotten the good old habits of reliability, honesty, trust and faith. We spend all our time making money to spend on luxuries and saving it for spare time we do not have. We forgot how to live.
Many managers nowadays aren’t any better than Ebenezer Scrooge and one just wishes the Ghosts of Christmas to visit them! What is important? The money you make? The money some unknown investor makes? Welcome to the Grey Gentlemen! If you are a manager, what are your values? Think about it!
Throughout the time I was employed by others, I played a game I call, “Bring Me a Rock.” The game has thousands of minor variations but they all follow the same basic format.
The game begins when the boss calls me into his or her office and invites me to have a seat. Over the next several minutes of extended conversation, the boss’s message can easily be summarized in four words, “Bring me a rock.” I’d then return to my own cubicle or office and construct a list of the features I believed the boss’s rock should have and begin to study where and how such a rock might be developed.
Hours, days, weeks, or months later I’d return to the boss’s office and proudly place my rock squarely in the middle of the desk. Aghast or at least disdainfully, the boss would ask, “What the #e!! is that?” Gently I would remind, “You asked me to bring you a rock.”
“That,” derisively, “is not the rock I wanted.”
Then I would inquire, “Can you tell me about the rock you want?” “Yes!” emphatically, “I will know it when I see it!”
Eventually my last boss got tired of the game and let me know I was being laid off. As I heard his words, I realized that I too was tired of the game.
If this has happened to you, this blog is just for you.
A German saying asked “Do you still have sex or do you play golf already?” (Hast Du noch Sex oder golfst Du schon?). Adapting it this week to “Hast Du noch Privatsphäre oder googlest Du schon?” (see title).
Following the general and naive media hype (can the media be truly that naive?!) about the new Google Chrome, German ZDF and some other more reputable news media took a closer look. Do you remember the public outcry when Microsoft was found “phoning home”? Google’s Chrome does not just call home. Your browsing history (aside others) is stored right on the Google servers. Interesting enough, despite ability to develop tools cross-plattform, the Chrome browser is only available for the Windows environment.
Another report did address the fact that Google builds “The Cloud“. As most my readers are travel industry related, you may recall that Amadeus Germany (“Start”) replaced the last “dummy terminal” in 1993 with a “PC”. Enabling storage of information locally. With “The Cloud”, you need to be always online, but you do not need a large hard drive any more, as all programs and data is stored on the servers in the web. The Google servers that is if you ask Google… Welcome back to our roots!
1 ½ years ago, at my anual ASRA presentation (4,1 MB), I addressed data security. The friends in ASRA joked about me being paranoid. Last weeks the “loss” and misuse of private government data (in large style) is all over media and politics in Europe, especially U.K. and Germany. In Germany even the official registration office (where any citizen must register one’s address) sells the data quite publicly. So paranoid? Or just realistic? Or underestimating the case?
The Department of Homeland Security (DHS) is reported to actually pick laptops from travelers without a particular security concern (“spot checks”). Too bad, if that happens to an Airbus official, who denies to give the passwords to access the encrypted data. And there is no official information, how the data is secured by the DHS. So the data may end up at Boeing quite “legally”. And yes, sure there are many ways to ensure the DHS not getting access to any privacy data. The Cloud Computing can also be set to communicate not with Google but with your own server(s) and a nice, unobtrusive special login allows you to invisibly purge (not just “delete” recoverably) all private data including server accesses in case that becomes necessary. Then you login in via VPN (access details not on the computer) and just restore your work environment. On this or just another PC… Details on request 😉
Hmmm… The DHS and politicians sure know that terrorists are not so stupid as to answer “did you pack a bomb” with “yes” (still “normal” question at U.S. airport check-in) or that they are usually organized good enough to secure their backs better. So if they know that, am I paranoid to believe them to not be interested in terrorists but to increase their control of us, their citizens?!
It is a radical change of the legal paradigm that one is innocent until proven guilty. Today we are all presumed terrorists and have to proof we are innocent citizens! All that under the argument that an innoncent person does not have to hide anything? What a complete farce!
George Bush, Wolfgang Schäuble, read my lipps: You will be going into history for having brought down freedom and established the surveillance state. Oh, sorry George Bush, you did better, you’ve become the president leading the U.S. into global wars being proven lier, using faked proof for “weapons of mass destruction”. Your “holy wars” have as much justification as the holy wars of the mideval ages! What was that movie? Wag the dog… Good to start a war to cover up the real business – such as to establish a surveillance state? The land of the free… The what? … Well done Mr. President!
So as a summary: Be careful with your private data and start to consider preference of non-commercial Open Source software, such as Mozilla, Open Office and Linux instead of Windows – it becomes increasingly a (vital) privacy issue! Not only privately, but increasingly also for corporations…
Best Western hit the media this week being reported to have been hacked and 8 million customer datasets being stolen. Best Western objected the news, mentioning they have no proof for such hack and they would delete their data anyway frequently.
Say WHAT? Corporations spend millions acquiring customer data and Best Western deletes them? Hmmm…
No matter, if this has been a newspaper hoax, there is something good in this. Who knows today, where data is collected, how it is stored, kept secure, who has access to it? How “secure” is “secure”? The Internet by definition is insecure. An old – even pre-WWW saying in IT: To have a secure system, remove all input… If a user in old DOS entered “format c: /u” the drive was formated irreversably. Oops, I forgot to backup that file? Too late. In my 2007 ASRA-presentation on Airline Sales & e-Commerce, my friends in ASRA joked that I would be paranoid… Today they know better, thanks to media coverage of data insecurities. I get increasing inquiries.
Most large corporates have a faulty and flawed security. Most even do not use encrypted communication with the most sensitive data they send through the web. Discussions on LinkedIn confirm the U.S. Department of Homeland Security to pick Laptops. Where does the data on them end up? Maybe your U.S. competitor has access to it?
But now we talk about personal profiles. Where is what data stored electronically about you? Have “they” told you they store the data beyond the immediate transaction? No. We only learn by security breaches becoming public that such behavior is not the exception but the rule. And thanks to the global networked world we live in, data is no longer limited to “my hotel”, “my supermarket”, “my anything”. But the hotel reports some or all of the data to the central server somewhere. Next you arrive in another city, they do have your address data on file. Hmmm… What else do they have???
And then we come to the new laws in the U.S., Germany and sure elsewhere, legally forcing providers to collect data and make it available to their government representatives. Said what? What is a “government representative”? Do I trust him or her? Not the government – I don’t trust “government”. But worse, “the representative”. Who controls the controller?
So sorry for the bad publicity Best Western, but thank you for another example to make people aware and think about their personal information. Did you ever read 1984? George Orwell did not even imagine what exists today!
Shift happens! Internet meet World. World meet Internet…
No? I couldn”t make you consider eating that scorpion? Hmm… How about Lobster? Shrimp? That is something different? Okay. They live in the sea, they are larger. But matter of fact, they both are crustaceans! [1]
So what are cultural differences all about? I was asked lately – by a beautiful lady I must admit – if I wouldn”t have problems the different culture and mentality…? From what I learned doing international sales and projects: Sales as well as friendship are based on mutual respect. That includes to (temporarily) accept local customs and traditions, as well as those of your guest. To be friendly, honest and trustworthy are keys to success. Lies have an extremely low half-time and they tend to hit you in the back at the most awkward of times.
This website uses only standard Wordpress cookies, not used for any analysis. We'll assume you're ok with this, but you can opt-out if you wish. AcceptRejectRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.