The Joys of Geocaching, book review and podcast

You would think I would be all over Geocaching – the hobby that involves searching for hidden treasure caches around the world by using a combination of your own wits, a portable GPS receiver, and a lot of persistence. It involves solving puzzles and rather obscure clues to find the caches, check. And hiking in the great outdoors, check. It has a Web 2.0 component, with the site geocaching.com that keeps track of caches and finds, check.

But for some reason geocaching has passed me by. Maybe it is because I just spend too much time doing geeky things already. Don’t really know, but if you are game to try it and don’t know where or how to start, then you want to read this book called The Joy of Geocahing Paul and Dana Gillin.

Paul is my podcasting partner behind the MediaBlather.com series that we have done over the past several years on various social media and public relations-related topics. The couple have been caching for several years, including on their honeymoon in France. They relate some wonderful case histories of power cachers (people that try to find dozens or hundreds of caches in a given period), tools, tips, techniques and jargon to get even the greenest cacher started in this hobby. For example, a “nano” cache is one so small that it can be hidden anywhere, while FTF means “first to find” a particular cache once it is hidden. The chance to be the first to find one is motivation in and of itself for many cachers. Then there are the obstacles, such as weather-related accidents or  “Muggles” who are ordinary humans that disturb caches or question why someone would be rooting around in the woods looking for an ammo box that has a logbook and a bunch of plastic toys inside.

Maybe it is for the same reasons that I didn’t last long with the post-Myst follow-on computer games: it just seemed like too much work. But there are millions of cachers out there, discovering new finds. This book accomplishes both being a how-to and also a travelogue of sorts. If the idea is appealing, buy the book and give it a whirl. There are lots of caches nearby — a quick look at my own zip code in St. Louis found close to a thousand of them.

You can also listen to a podcast that the Gillins and I did for MediaBlather.

Conference weeks in St. Louis

It is wall-to-wall conferences for the next couple of weeks here in St. Louis. There are various events that you might want to attend, some free, some with small fees. A few I am actually speaking at too!

  • Association of Information Technology Professionals, national student conference. I am speaking at this conference on Friday, providing two sessions (Going beyond Facebook: Social Collaboration Tools to Kickstart your first job and  What every student needs to know about LinkedIn to get your first job)
  • ITEC, Put on by Bill Sell, this has a great lineup of IT speakers on Wed.
  • Geek Day, an annual gathering of virtualization specialists and vendors on Thursday
  • Missouri Invest Midwest, an annual conference that has short pitches from start-ups in a wide variety of fields on Wednesday and Thursday
  • Global Communications Summit, at St. Louis University. I will be speaking (Making sense of social networking strategies for marketing professionals) on March 30th at this conference

I will also be moderator of this ITexpertVoice.com Webinar on Windows 7 Migration Options and Tools on April 13th, if you are interested, please sign up and join us.

IT Expert Voice Webinar: Understanding Windows 7 Security Features

What has changed for the better and worse with Windows 7 when it comes to endpoint security? There are some improvements to the built-in firewall and encryption features, remote management as well as better integration with Microsoft’s Network Access Protection services in Windows Server 2008. This panel will discuss these and other topics and talk about what are the security implications when you make the migration to Win 7 in your enterprise.

Join me as I moderate this webinar panel on March 11th at noon CT. You can register for this free event here, and check out other content on ITExpertVoice.com about Windows 7 topics too while you are at it.

Ten ways to inexpensively augment your current IT security infrastructure

I will be doing this webinar tomorrow at 1 pm ET for TechTarget’s SearchSecurity.com web site, you can start at this URL.

I will present ten different ways that a midmarket IT organization can improve its threat management and network security posture. I will review a critical strategy going forward into an economic recession: making only minimum investments in new tools and finding products that don’t require a great deal of increased manpower to implement and manage. The webcast will focus on midmarket IT strategies that either don’t cost a lot of money, or at least provide fast returns on the investments.

Can collaboration save our economy?

The economic news is depressing, and yet I want to see opportunity where others see looming disaster. And I think one way we can try to make things better is become more productive and do a better job collaborating with each other. Think of it as a no-cost stimulus package that even the Republicans can love

Remember when the PC was first introduced, everyone thought it was such a great personal productivity tool? Sadly, the more powerful that PCs have become, the harder it is to use them to collaborate. This is because we get used to using them as our personal machines, and most of us don’t like sharing our computers, let alone our work products from them.

The primary collaboration tool today is still what it was ten years ago: I send you an email attachment with a Word or Excel file. You make changes and then email the file back for me to look at. This is really serial collaboration, because we alternate working on the same file. While this model is okay for two people, when you have a whole group that is trying to add their thoughts it gets very messy, to say the least. Also, one person can hold up the entire process and then the rest of the group has to wait until that person has finished their revisions. And if we don’t agree, we pretty much have to start the process from scratch. A friend of mine is ghost writing a book for two of his bosses. I can’t imagine what his editing cycle is going to be like under this model.

It is time to realize that serial email-style collaboration is so last year. Consider these trends:

First, the Internet is now ubiquitous and most of us are comfortable using it to connect to our partners, supplies, customers, and colleagues. It has also made email more powerful, and most of us have become addicted to checking our email several times a day and even during off hours too. Some of us have to check email so frequently that we start to get a bit jittery when we are offline for a few hours, let alone when we want to take a week off on some deserted beach where there isn’t any connectivity.

Contrast this with Lotus Notes, which has been around for about 20 years and supposed to be the be-all and end-all collaborative tool, or Microsoft’s SharePoint, which is more recent. Both Notes and Sharepoint require everyone to run it, and develop to its own programming interfaces. That seems so quaint and outmoded now. And both are very quirky to install and deploy, which makes them less desirable too.

Second, email is a great notification system and a great way to organize your to-do list. You don’t have to use it as the transportation system for sending documents around, though. As an example, you can set up a blog to automatically notify via email when someone posts a comment to a particular page, so people can participate in a discussion thread but don’t have to continually return to that page to find out what has been posted.

Third, free or low-cost Internet applications have come of age, such as Google Docs, Google Calendar, Trackvia, Tripit, Timedriver, Hourtown and Setmeeting. All of these don’t require any software to download, don’t have a lot of upfront training or even any dough to use, which means that people can experiment with them and see if they will be suitable for their needs. All of these products can offload some of the tasks that we are used to doing on email and make us more productive in scheduling meetings, sharing work product, and arranging our time. Look for a story from me in the New York Times next month on this topic.

Fourth, instant messaging has become more useful for connecting remote work teams together and can be used as another notification system that is more immediate and more potent in terms of bringing people together. Some firms are beginning to use the built-in IM features of Facebook and Twitter for this purpose too. Again, this takes some load away from looking at your inbox for starting a particular task or trying to get a colleague’s attention.

Finally, there are other tools for two-person collaboration that will work better in real time, such as LogMeIn or GoToMyPC, that allow two people to actually see each other’s computer screen while they are talking on the phone. My podcasting partner Paul Gillin likes Yuuguu.com, which allows teams of 25 to share the same desktop, no matter if they are on Linux, Mac or Windows.

We still have a long way to go when it comes to collaborating effectively, and I since we are talking about sharing do share your own stories with my audience and post your comments here. I will have more to say on this topic for a keynote speech that I am giving in Philadelphia in April for the American Hardware Manufacturer’s Association. If you want me to come talk to your organization, you can send me email, or better yet, just call me on the phone.

Real World NAC Experiences speech in St. Louis next week

For those of you in the area, I will be speaking at the AITP local chapter meeting next Thursday.

Early Network Access Control and endpoint security adopters often ran into complications with these new technologies. Cost, complexity and confusion stymied some deployments. Even though NAC has overcome some of its early issues, the technology can still be complex, requiring organizations to do some careful planning before they embark on deployment. I return to AITP and update them on NAC by giving his perspective about seven common pitfalls, drawn from lessons learned by several organizations that deployed NAC that he profiled in some of his magazine articles earlier this year. David will also provide guidance for security managers about to embark on a NAC evaluation.