Techtarget: Social networking tools emerge for the enterprise

Social networking is everywhere, and traditional software vendors — like Novell, Cisco, IBM and Oracle — have created products that allow Twitter-like discussions, Facebook “friend” groupings and more behind the corporate firewall. In this story for Techtarget‘s SearchEnterpriseDesktop.com, I write about what some of these products can do and how they can be useful for enterprise discussions and intranets.

Strange Loop Conference St Louis

I attended a few sessions of this conference here in St. Louis, organized by Alex Miller. Miller has the uncanny ability to find the geekiest person at major organizations and convince them to come to town and talk about some of the really big issues that they are dealing with their code. The conference started off with Hilary Mason, who is a computer scientist and mathematician working for bit.ly. Did you know that you can get all sorts of analytics with any shortened bit.ly URL by just appending a plus sign at the end of it? Yup. She spoke about machine learning, and understanding and predicting behavior from large data set collections. For example, when the World Cup was playing, they observed all sorts of traffic coming from the countries that were in competition during the games. As soon as the game was over, the losing country’s traffic dropped to nothing. Obvious, but interesting. She also gave one of the best illustrations of Bayesian probability analysis that I have seen this side of grad school (and that has been a very long time for me).

I got to hear from Eben Hewitt, who wrote the O’Reilly book on Cassandra, an open source database project that is part of Apache and the current favorite of the large data set folks. He spoke about the really big data guys and how we have to talk in petabytes — WalMart’s customer data base is half a PB, and Google processes 24 PB each day. The data that was assembled to make the movie Avatar was around a PB.

Finally, there was Brian Sletten, an independent consultant based in LA, talking about new Web technologies. He mentioned the Powerhouse Museum in Sydney that is doing some interesting things with Web services — now how cool is that? I can feed my museum addition by going to a geeky conference.

You should put this on your radar for next year. This is very high signal, almost no noise. Some of the speakers could use some polishing, but the raw data is excellent.

How to build the best app store

We all know the story of Apple’s App Store: a gazillion downloads, more money than anyone has ever collected, and hundreds of apps from the mundane to the essential. But what makes for a great app store experience, and can anyone else come close?

Remember the dawn of the PC era, when all apps came in a slipcase and on five-inch diskettes? When you needed to get corporate approval to buy them and an IT guy to install them? How far we have gone, when a federal government employee for example can go to Apps.gov and with a few mouse clicks have their app of choice on their desktop.

There are lots of app stores and they seem to be cropping up everywhere. There is oneforty.com that keeps track of Twitter apps (what a great domain name). Sendmail’s Sentrion email server has its own place for you to download extensions, Intel has its appup.com where you can download apps for its Atom-based Netbooks, and each major mobile phone platform has its own app store:

  • http://www.android.com/market
  • http://marketplace.windowsphone.com
  • http://www.palm.com/us/products/software/mobile-applications.html
  • http://appworld.blackberry.com

I started thinking about this topic with this post from Dion Almaer, who now works at Palm running their developer relations.

Plug-in apps got their start in the browser world, which seems appropriate since the app stores all assume you start out with a browser or phone-based equivalent of some sort. But let’s look at the various components, and see what Apple does and doesn’t do well.

  • Packaging. It isn’t just enough to create the app, you have to put together the right packaging, Web collateral, instructions (if they are needed) and screenshots to give potential customers a taste of what it does. Apple has to “approve” the app before it is listed in their store, and while the other stores don’t seem to be as heavy-handed, there is still a process to go through.

Android apps are very finicky. The same OS version on different phones will perform differently, a nightmare for developers. And iPhone and iPad apps are also different beasts and will take some coding to make sure the app works best on both platforms.

  • Discovery. How do you find the particular app that you are interested in? Is it through a social network recommendation, organic search in Google, or using the store’s own search function? Several of the stores, such as the Android Marketplace, make for miserable searches, either classifying their apps into such broad categories that you spend too much time scrolling down the results. Or else they force you to use the in-phone versions to do the searching. Apple forces you to use iTunes, but at least you can look for your apps on your desktop and not suffer the tiny phone screen.

I did a quick search on all five mobile phone app stores for that four-letter word that describes one of those rude bodily noises. (I hesitate to include it in this essay for fear that I will run afoul of email content scanning services, not out of any prudishness.) On Apple’s store, there were more than 600 apps that matched – I stopped counting but clearly it could number in the thousands. Android’s Marketplace doesn’t let you search from the Web, when you go to an actual Android phone I got 111 matches. I got less than 15 matches for Windows, Palm’s and Blackberry’s stores each. Now, granted this is a less than representative sampling, but it just shows you at least how hard it is to find a particular app. And the more apps that are created for the store, the harder it is to find them, particularly if you are trying to use your phone to track them down.

Part of the problem with Apple’s AppStore is that you can only search the app title, with limited visibility in the remainder of the description of the app. That can pose problems for developers in how they name their apps.

  • Payment. This is the hard part. Amazon long ago figured out how to do one-click payments and Apple makes it relatively easy, since everything happens within iTunes and your iTunes account. Some of the phone providers charge your apps to your phone bill, others to your credit card. Android’s marketplace uses Google checkout, Blackberry uses Paypal. With Windows Mobile, you can only buy apps from your phone. There are a lot of free apps too, and some developers make a limited free version, hoping you’ll upgrade to the paid version. According to one developer I spoke to, Android users seem more price-sensitive than others and aren’t as willing to pay, even a small amount, for their apps.
  • Fulfillment and installation. Once you find and pay for your app, how do you get it to your desktop or phone? Just clicking on it doesn’t always do the trick. With Blackberry’s and Palm’s App stores, you send a link to your phone if you are browsing from your desktop. Another issue is how does the store deal with charge backs if you change your mind?
  • Merchandizing. How do you promote your app, offer specials (such as free downloads under certain conditions, two-for-one coupons and the like) and include direct URL links to them?  Android and Windows Mobile both have direct URLs, although they can get long. Apple doesn’t make this easy, since they want you to use iTunes for everything.
  • International users and other storefronts. In addition to the “official” ones for each phone platform there are dozens of other app stores for selling mobile applications, some specific to particular countries or carriers. Some are better than the vendor’s own, for example, the Palm-based PreCentral.net and androidzoom.com do a better job than the “official” Palm and Android ones shown above. These third-party stores have varying usability experience, and some even sell stolen goods, so there is that whole aspect too.
  • Updates. Once you have your app listed, there is the process of doing regular updates and making sure these are posted across each storefront. This could be a nightmare if you are supporting multiple phone versions and have dozens of storefronts where your app is available.

The summer social media cleanup session

Last week I had leaky capacitors on my Dell Optiplex, I couldn’t get any reception on my iPhone 4 because my hands were shorting out the antenna, my Toyota nearly killed me due to faulty parts and the waters of the Mississippi continued to rise. I think I need to call my own personal liability lawyer just to get out of bed.

Maybe I am just feeling my own mortality a bit more. We are all getting older, and no place is that more true than on Facebook, where the fastest growing population segment is the over 65-set. Yes, kids, grandma and grandpa have discovered your digital playground. And they are there to stay, too.

It does seem that our digital lives have gotten more complicated lately too. What with posting all my status updates on Facebook, LinkedIn, and Twitter, sending to my network the latest books that I am reading on Goodreads.com, my current location on FourSquare.com, tagging various pieces of content to Digg, Reddit and StumbleUpon, posting restaurant reviews to Urbanspoon, recommending songs that I like to Pandora, there are only so many hours in the day left to delete all those male enhancement emails, including the ones I am now getting in Chinese.

Okay, perhaps I exaggerate a bit: I do have a spam folder and it works rather well. But it does seem that there is a social network for just about every aspect of our daily lives, and what few places are absent it is only a matter of time before someone invents one.

In that spirit, it is worth taking a look at an essay that I wrote about social networking policies about a year ago if you don’t remember it.

Since then, I have had some other thoughts. One of the comments was “the [users of social networks] should be aware that their colleagues, bosses and/or prospective ones are now watching.” And now you can add your grandparents to that list too.

Certainly, what you post can influence your job-hunting prospects. We now have the ritual purging of pictures and posts every June, right after the graduation parties and requisite summer European discovery backpacking trip (or better yet, now there is Couchsurfing.com, a social network for people who want to crash on your couch).

One young 20-something that I know who is entering the job market wrote to me asking me for my recommendation letter of reference. We emailed back and forth about taking down his Facebook party pix, and I reminded him that it wasn’t just his own photo albums that he had to be worried about – what about those pictures that he was tagged that could create problems too? He had it covered. But I know that many recent grads aren’t as thorough, or as concerned. They should be. I hear from hiring managers all the time that these digital travails can make the difference between one candidate and another getting an offer letter.

And then there is the issue that earlier this summer reporter Octavia Nasr left CNN after a Tweet she posted praising a leader of Hezbollah. Never have 140 characters had a bigger personal impact.

Given this uptake in social media among consumers, businesses still haven’t gotten on board. A recent Yankee Group study shows that a third of those polled have no formal processes in place or any social media corporate usage policies, do not allow the use of social media at work or have no idea if their company participates in social media. And while social media growth among my generation is happening quickly, the study found that half of the over 50 respondents stated that it wasn’t important for a business to have any social media presence.

We all have a lot to learn about how to use these tools – young and old alike.

How to make your IT infrastructure work like Avatar

I am attending CAworld in Vegas this week and last night’s keynote was by James Cameron, the movie director of Avatar and Titanic. He spoke about the choices he made in his life along the way towards making blockbuster movies, and some of the ideas resonated with me. Here are a few points:

  • Virtualize whenever possible. To create the complex computer graphics world of Avatar, he had to create virtual cameras to block his shots and assemble the virtual sets. Not unlike what many of you are doing now with VM technology. Virtualization helped him design the kinds of shots that he imagined and also made it possible to put live actors into a virtual set. But the more you virtualize, the more you need:
  • You have to manage your digital assets before you can create them. Cameron spent two of the nearly five years making the movie first assembling a series of digital content management tools so he would be able to track the different versions of a virtual tree or creature. When the crunch time came and he had to actually generate the final product, this asset management system came in handy — perhaps it was essential — to getting things finished. Make sure your own digital infrastructure is up to the task before you start migrating your own servers over to the virtual world. This means better capacity planning and load management tools to help you understand what you are getting into too.
  • Vision drives reality and the future. He first had the idea for Avatar back in the mid-1990s, but couldn’t make any headway on the movie because the technology wasn’t available to realize his vision. How many of us have been there with our data centers or network infrastructure, where we are pushing the envelope on what we would want to do? Cameron had to invent specialized cameras and lighting to film the actual Titanic wreck at the bottom of the Atlantic, and he had to invent new ways to do motion capture of his actors for Avatar where they could move about in the sweeping battle scenes in the movie. He didn’t let the fact that these technologies didn’t exist stop him. The moral here is don’t give up on your vision, just because the hardware and software isn’t yet invented. Use your ideas to motivate vendors to deliver on what you really need.
  • Don’t let all this gear get in the way of telling a great story to your users and management. Sometimes we get too wrapped up in the gear to remember why we are here in the first place: to serve our business, make our users more productive, and save some money along the way.

If you want to read another perspective, check out this story by Joe ‘Zonker’ Brockmeier on ITexpertVoice.com on the same subject.

eSecurityPlanet: How to choose a DLP provider

Every day, data is leaking out of your network. You may not know it; you may even pretend to ignore it. But doing so carries high risk: a batch of stolen credit card numbers can be instantly published on a hacking Web site, and more targeted attacks can compromise your employees’ banking information or other identity thefts. Disgruntled terminated employees may decide to leave the premises with your customer or confidential data on their last day. And the threat of potential lawsuits has never been higher, especially with the economy in free-fall in the past year.

Luckily, there are more than ten different data loss prevention (DLP) products that are available, some from the major security vendors like McAfee, Symantec, and Trend Micro.

To help you in your quest, here are some questions to ask before you start evaluating your next DLP product:

  • Where does the product sniff out your data across your network? Does it find sensitive data just traversing your network, on your database and file servers, or does it inspect local desktops for stored Word documents on personal hard drives as well?  Can it look inside encrypted data streams too?
  • Can the product search for data without any endpoint agents installed, or can it be as thorough as it can with these agents installed? Some of the solutions can scan a lot of different file systems and a lot of different endpoint sources.
  • Can the DLP agents accomplish other security-related things on the endpoints? Some of the vendors offer port-blocking or can turn off USB connectors to block someone with a thumb drive removing all of your customer data in their pocket. Others can control which applications can and can’t be run on your endpoints.
  • What protocols can be blocked or analyzed? Certainly the ones involving email (SMTP, POP and IMAP), but what about Web and file transfers and Instant Messaging too?
  • How hard is it to create – and then change – protection rules?  Some products have wizards for easy creation, but then fall down when it comes time to change them outside the wizard. Others have more intuitive and graphical rules creation screens to make it easy to zero in on what you are trying to protect.
  • What happens when a rule is violated? Can you figure out who did the deed, where the offending information is stored, and what kinds of automated responses can be kicked off? Does the product come with lots of pre-set templates to make all of this easier?
  • Is the content analysis portion a separate or integrated piece of the product? In some cases, such as McAfee’s DLP solution, you are going to need several different products to be installed to enable a complete solution.
  • How fast can data pass through the appliance? Typically, you trade off effectiveness for performance. Some of the products can scale to fairly large networks, some can’t.
  • What kinds of reports are available, and how easy are they to interpret or import into your existing reporting systems? Does the product offer any real-time reporting capabilities and how flexible are these reports anyway?
  • How is the DLP solution integrated with endpoint security and proxying solutions? Some of the products in this list, such as Safend, began their lives as primarily endpoint protection solutions and have added DLP features to their protective measures. Others work hand-in-hand with the vendor’s endpoint products or proxies. Some will even integrate with third-party security products to varying degrees, such as Code Green which works with Blue Coat’s Web proxy products.

Simple online database collaboration

If you have to jointly author a spreadsheet with a colleague, what is the first thing that you do? Email it back and forth. This can be painful, particularly as you try to keep track of your partner’s changes and hope the emails transit back and forth across the Internet. Add a third or fourth person, and things get worse. Luckily, there is a better way, and a number of providers have stepped up with tools to make spreadsheet sharing a lot easier than sending attachments.

I take a look at several of these services for an article published in ITworld here.

ITworld: How to buy a Web Application Firewall

We all know that the Web is a nasty place, with denial of service attacks, SQL injection, cross-site scripting and other malware invented hourly to try to pry into your networks. Over the years, a number of vendors have come up with various solutions that go under the broad heading of Web application firewalls, or ways that they can help prevent the bad stuff from entering your user’s desktops. It’s worth diving into these products because they offer a great deal of protection that can save you aggravation down the road.

I talk more about how to buy these web app firewalls at ITWorld here.

Taking credit card payments via the Internet

It all started when one of my clients wanted to pay me with a credit card. It is odd that I have been in business for 18 years and this is the first time that I have been paid in this way. It is doubly ironic in that I used to teach classes on eCommerce back in the early days of the Web and hadn’t ever gotten around to getting a merchant account, which is what you need to take credit card payments.

If you want to accept credit cards, you enter a brave new world where there is an entire collection of jargon to use your secret decoder ring. For example, “discount rate” is the fee that the card issuer (like American Express or Visa) charges you per transaction. Typically these are anywhere from one to four percent, depending on a series of circumstances. Then there is the “virtual terminal” which is a series of Web-based services that allow you to enter the credit card number in your browser and have the transaction completed online. These replace the typical credit card swipe machines that you see in every retail shop.

Since my client wanted to use their American Express card, my first stop was to try my business bank, Bank of America, and see what they could offer me. Online had limited information but I tried the 800 number and got nowhere fast. They suggested that I talk to Amex and see what they could do for me. Within about 30 minutes I was setup with an Amex merchant ID and could start accepting their card via a telephone response number. The issue was that the transactions would take some time to clear and actually end up in my bank. They could also sell me their virtual terminal software, called Payment Express, which would be an extra charge of $20 a month. Amex has many different options that can easily get confusing – my recommendation is if you want to go this way, first sign up online to access your account and then read the various screens that describe Payflow, Payment Express and their physical card payment terminals.

In the interests of research, I pressed on to see what else is available.

Paypal was my next stop. While you can process some credit card payments, once you get beyond a few hundred dollars you need to have a Paypal business account. This means $30 a month, plus transaction fees of 2.4 to 3.1% to use their virtual terminal software. Here is a description of that process.

Intuit was next. Their merchant services are $13 a month, and it took about a day to set me up. They also have their own virtual terminal software and their home page takes something to get used to. They also charge less per transaction, with fees ranging from 1.9 to 2.9%. They have a great series of online demos here on their Web site.

So which do I recommend? If I had to start over knowing what I know now, I would go first to Inuit. They are geared towards their online product, they have a simple sign up process, and if you already use Quickbooks they can integrate with that too if you end up with lots of transactions. (I have been a happy Quickbooks user for nearly two decades, starting with the DOS version, can you believe it?) I would steer clear of Paypal, I just think they charge too much for too little.

There are dozens of other payment processors online, and this isn’t meant to be a comprehensive review. And feel free to share your own experiences on my blog or via Twitter.