Quickbase blog: How Much Code Do You Need to Collaborate These Days?

Today we have a seeming ubiquity of the coding generation: rapid application development can be found everywhere, and it has infected every corporate department. But what is lost in this rush to coding everywhere is that you really don’t need to be a programmer anymore. Not because everyone seems to want to become one. But because the best kinds of collaboration happen when you don’t have to write any code whatsoever.

You can read my post about this topic in the Quickbase The Fast Track blog here.

iBoss blog: How Stronger Authentication Methods Can Better Secure Cloud Access

There are many myths about cloud computing. One common one is that servers in the cloud are less secure than when they are located on-premises. Like so many other myths, this has some basis in fact, but only under a very limited set of circumstances. In my latest post for iBoss’ blog, I talk about ways to better secure your cloud-based servers using multifactor authentication (MFA) and single sign-on (SSO) methods to better protect these assets.

SecurityIntelligence.com: The hiring shortage hits the black hats too

An interesting analysis in Digital Shadows recently spoke about the hiring shortage that has befallen the black-hat hacker community. While most enterprise IT managers are frustrated about getting skilled cybersecurity personnel for their own teams, there are some unexpected benefits, too.

I spoke to Ron Gula, the CEO of Tenable Security, who has witnessed this situation first-hand. Even though security budgets are increasing, “money can’t make smart people appear out of nowhere,” he told me. Finding new black-hat talent can be just as frustrating as your next legit IT hire.

You can read my story posted today on SecurityIntelligence.com here.

Quickbase blog: How to make scheduling meetings easier and more productive

One thing that hasn’t changed about today’s office environment is that meetings are still very much in force.  Certainly there are ways to make their end product – such as linked spreadsheets (poked fun of by this Xkcd comic) — more productive, such as how Proctor & Gamble eliminated 18-24 days of meetings per person per year after implementing QuickBase. This was very effective because many of the meetings consisted of identifying the most current version of a given source within a huge master spreadsheet. What used to take days now takes minutes or hours, since this single, and unworkable spreadsheet was divvied up into linked QuickBase files that were more manageable.

But there are other productivity gains to be had with meeting scheduling and tracking and online calendar technologies that can be had as well. Before you dive into any of these, realize that you will probably need more than one tool to help, depending on your needs.

Most of us arrange meeting times via email, or worse yet, through a series of phone calls. This makes everyone miserable because finding a common free time among your participants can be maddening, what with a series of seemingly never-ending emails or voice messages. There are two online services (SetMeeting.com and Doodle.com) that can do this for free. Both work by having each intended participant set up feasible free times and letting everyone converge quickly on a common slot. Yes, notifications are still sent via email that you have a pending meeting, but there is no back-and-forth negotiation over whether this Tuesday at 10 am is better than next Friday at 11:30. Doodle also has paid plans that start at $39/user/year that add features such as encryption, reports on who is missing from the common agreed time, and more.

Once you actually hold your meeting, you would like to keep track of what your agenda is, and how you intend to follow up. There are many tools that can help here, including Opp.io (free to $29/user/month), Glip.com (free to $10/user/month) and Getflow.com ($19/user/month and up).  Each tool offers an online SaaS portal where you can share documents and show tasks and workflow. Prices vary depending on the number of team participants and other usage factors.

But what if you are a consultant or have a retail business and want your customers to book your time electronically, rather than call to schedule an appointment? Then you’ll need another series of digital tools such as Timetrade.com or Calendly.com. Both allow you to set up permissible time periods that you are available, and like the common time schedulers, will send you an initial email notification but otherwise leave the back-and-forth messages out of your inbox. Calendly has a free basic account, with premium accounts at $10/user/month that add custom branding and URL links and reporting options. TimeTrade has various subscription options.

What about if you are traveling and want to broadcast your itinerary? You might want to inform your customers when you are traveling so you can arrange meetings and use your time more effectively. The free service TripIt.com can do this, but you probably want to use the paid version ($50/user/year) to make use of features such as tracking when your favorite airline seat becomes available on your flight and some other features that frequent flyers will appreciate.

While there isn’t a single digital tool that can satisfy everyone’s meeting needs, there are some very attractive ways that you can become just as productive as P&G did without spending a lot of money. And you could always take a few tips from our infographic that we posted a few years ago: comments such as staying on topic, arrive a few minutes early and end on time are always useful too.

iBoss blog: The IoT Can Be a Potent Insider Threat

Insider threats can come from the most unexpected places. Earlier this year, the hacker Andrew Auernheimer created a script that would scan the Internet to find printers that had port 9100 open. The script then printed out racist documents across the globe

You can read my post here about the threat of Internet-connected printers.

Dice: Using virtual avatars to create real empathy

We have reached a point where computers are needed to make our medical providers act more human. The idea is to use virtual reality techniques and programs to help train doctors to deal with health emergencies and other clinical care situations. The MPathic-VR system covers a wide range of situations and real-world behaviors that are typical in a clinical situation. You can read my story on Medical Cyberworlds (who developed the system) on Dice today here.

Quickbase blog: Signs your team is misusing email for collaboration

There are numerous articles on the misuse of email (including this post where we talk about ways to onboard Gen Y workers), but one of the biggest mistakes is email becomes the general all-purpose tool for all kinds of inappropriate collaboration methods for your team. While email is great for point-to-point communications, it falls down when it comes to sharing and editing spreadsheets and documents, scheduling meetings, and tracking projects — all things that I talk about in my latest post for the Quickbase Fast Track blog here.

Veracode blog: Why is SQL injection still around?

While there are many Web hacking exploits, none are as simple or as potentially destructive as SQL injection. This isn’t news: the attack method has been around for more than a decade. Sadly, for something so old it is still one of the most popular ways to penetrate networks and extract data. And it is easy to find and almost as easy to avoid. Why is SQL injection still with us? It all comes down to a lack of understanding about how SQLi vulnerabilities work.

You can read my post in Veracode’s blog here.

A first person account from Brussels

A friend of mine, Arielle Goldfarb, is a graduate student in counter-terrorism at the IDC school outside of Tel Aviv. Goldfarb grew up in Israel and then moved to Toronto for several years, before going back to Israel to finish her studies. She found herself last week in Brussels. This is her story.

First, realize that I speak from my own personal experience and my own opinions. As part of my master’s program, we were offered to be part of an Israeli delegation to visit NATO and that is why I was there in Brussels. After the attacks, one of the immediate feelings I had was that I wanted to go home, home being Israel. It was such a strange thing to say, considering that Israel faces terrorism every single day. Somehow, being in Israel felt safer than staying in Europe. When we learned that El Al was sending a jumbo jet, I cannot say I was surprised, but I was relieved. Being on that plane, especially on Purim, was a very meaningful experience. I felt at that moment that all the passengers on the plane (over 400 of us) were grateful to be able to fly back to Israel. Without this flight, who knows how long we would have been stuck in Brussels?

Going through this experience has somewhat shifted my attention and interests. I would like to take steps to learn more about Europe’s security outlook, not only in relation to terror, but also as a doctrine as a whole.

It is somewhat ironic but the Brussels trip also strengthened my understanding of the reality of terrorism in the world today. That was an important learning experience. To me, it became clear through this trip that there is a requirement for international cooperation when it comes to fighting terror and that it is imperative for every country to think ahead and prepare, instead of acting to increase security only after being personally affected by terror.

I also learned that there are serious shortcomings in security in Europe that should be addressed. One of the recurring themes of the trip was that Europe does not view terrorism as an existential threat. With this outlook on the security situation, it is hard to believe that Europe is taking sufficient and drastic enough measures to increase their intelligence sharing among the various countries and agencies. What I do think is that unfortunately, with every attack, Europe’s outlook changes coming one step closer each time to viewing terrorism as a threat to its existence.

Another thing that I learned – which was somewhat surprising for me — has been the method in which terrorist organizations are funded. I had previous knowledge of the need to fight terrorism from its root, that is to follow the money trail, but I was not aware of the extent and the creativity of terror fundraising. I learned that charities are probably the main way that terrorists funnel money, and that ISIL has come up with new tactics for funding, such as selling antiquities that they pillage on the black market.

Thanks for the report Arielle. I am glad that you are safe and back in school.

Quickbase blog: Recognize the Warning Signs of Spreadsheet Abuse

There are lots of circumstances that don’t fall under abuse but do account for inappropriate spreadsheet usage.

Part of the problem has to do with the universal appeal of spreadsheets: after all, they have been around for decades and the user interface of the grid of empty cells is so seductive. You just have to type in a number or a formula and you are good to go, right?

Well, not exactly. There are lots of warning signs that it is time to retire your Excel spreadsheet and move to something more sophisticated and capable to build your mathematical models. As a public service, let’s look at a few questions to get to the bottom of things.

Is your data poorly structured? Just like poorly structured programs, a spreadsheet that has input cells all over the place (instead of at the top or organized into a single section) can quickly become a nightmare to debug and understand. Say one of those input cells is accidentally deleted. Or what if you have a spreadsheet that doesn’t clearly label its input fields at all (with a contrasting color or some other graphic device)? When you get to this level of complexity, it is time to consider using something else.

Do you have a very sparse matrix? When you have a spreadsheet that has hundreds of rows and columns with just a few numbers or formulae sprinkled throughout, it becomes harder to find those numbers across all that empty space. Even on the largest of monitors, there is a whole lot of scrolling around to see the active data cells, and easy to miss something that is hiding in an open field. Databases are better for this sort of situation.

Are you mixing spreadsheets with other data sources? You have heard the expression oil and water don’t mix, right? The more complex your data model, the more difficult it is to see how it works and what is the ultimate goal. This is especially true when it comes to using SQL and other data sources as part of your spreadsheet. Ideally, your spreadsheet shouldn’t depend on any external data file to do its work, but that isn’t always possible. If you are building a more complex model like this, think about using a different product or entering the world of serious programming. You probably should start by using an online tool that can make the data connections easier. One way to go would be to look carefully at what Microsoft is doing in its support for online OData sources, and while certainly you can add this to an existing spreadsheet, you probably don’t want to.

Can you find your mistakes quickly? Most spreadsheets suffer from this problem, because they have been built over time with lots of additions and changes to their models. This means that obvious arithmetic mistakes are often hidden or obscured. Or worse yet, you don’t have a feel for your numbers. You may not be able to test your assumptions and making some common sense inputs to see if your spreadsheet produces results that are within your expectations. If your spreadsheet has grown like topsy then maybe it is time to look at some other way to model your calculations.

Do you have more than one author of your spreadsheet? This can be a real issue. Having two or more authors writing formulae can be a problem: how do you track changes and who has the most current version of your file? Chances are, you have experienced this when two people are working on different portions of the file concurrently, and then it is up to someone else to be the final judge of which changes get put into production where. When your spreadsheet is in the cloud, this becomes a non-problem.