FEATURED: ‘ Want to introduce a new idea into the marketplace use buzz words like Innovative ‘

” Create the right environment & add a little lncentive – called a discount – a pinch of spice called a buzzword and it really really works ”


#AceNewsDesk – Oct.01: Many years ago people said ” Sex Sells ” well it did in fact it turned into a massive ” Porn Industry” and the same applies to selling anything ” Create the Right Environment & Add a Little Incentive – called a discount – a pinch of spice called a buzzword and it really really works.

So what does it mean to you?

“It means that you know something even if you don’t know something.” – Eli, “The Book of Eli,” Alcorn Productions, 2010

Lots of really smart people have made predictions about the future and were wrong:

– “Everything that can be invented has been invented.”

 “It means that you know something even if you don’t know something.” – Eli, “The Book of Eli,” Alcorn Productions, 2010

Lots of really smart people have made predictions about the future and were wrong:

–        “Everything that can be invented has been invented.” — Charles H. Duell, Commissioner, US Patent Office, 1899

–        “I think there is a world market for maybe five computers.” — Thomas Watson, president of IBM, 1943

–        “There is no reason anyone would want a computer in their home.” — Ken Olsen, founder of DEC (Digital Equipment Corporation), 1977

–        “Two years from now, spam will be solved.” — Bill Gates, founder of Microsoft, 2004

This brings the use of the word innovation to mind. It’s one of the most overused/abused words we have in the industry.

Want to bring a company/product down? Use the word:

–        Apple has lost its innovation edge.

–        Microsoft can’t develop/deliver anything innovative today.

Want to lift a company/product? Use the word:

–        Google Glass is an innovation that will change the way we work/play.

–        Flurry Bird is so innovative it’s addictive.

“Experts” love making these claims, attaching the label; but they’re no more right than you or me.

Recently, economists and financial analysts have decided it’s not just one or two companies but that technological innovation across the board is slowing and that’s why economies haven’t recovered.

I don’t know about you, but it’s moving so fast I’m having one helluva’ time trying to keep up.

Eli was a little reassuring when he said, “I know what I hear, I know what I heard, I know I’m not crazy.”

I can’t even keep track of where a product is on Gartner’s now famous “hype cycle” and which ones have fallen by the wayside.


Hot or Not – Several years ago, Gartner developed the hype cycle which was their way of tracking products and ideas.  The categories shift ever so slightly year over year but it’s closely studied by venture capitalists, stockbrokers and knock-off specialists.   Getting in on the innovation at just the right time is the tricky part.

The only way I’ve been able to figure out if a product/service is/was an innovation is by looking back in time, which I did at the recent IDC Directions conference.

Quick Look Back

Frank Gens reminded me of what was going on just a few years ago (2007):

–        Google believed in not being evil

–        Steve Jobs unveiled the iPhone

–        Hadoop (big data stuff) was a baby elephant

–        Netflix had stuffed more than 1B DVD eps

–        Benioff’s Salesforce was a struggling CRM (customer relations management) software company

–        Amazon Web Services had been announced the year before

–        Facebook had just moved out of the dorm

–        Twitter could barely tweet

–        IDC had taken up a new banner – disruption of damn near everything with the 3rd platform


New Platform – PC makers were told there was a new platform that was going to impact everything that came before several years ago; and while IDC thought it would be big, each new generation of users starts with the 3rd platform and ignores what came before.  Millenials straddle the 2nd/3rd platform.

A lot of people like to say that innovation has slowed to a crawl because of R&D spending by governments; you know, investing in tomorrow.

But government and innovation in the same sentence seems to defy logic.

If they focused on innovation, they might be able to do more … with less.

As Eli said, “To do more for others than you do for yourself.”


Boosting Innovation – The first thing most economists and academics point to that is holding innovation, progress and economic recovery back is government spending and investment in technology.  Investing R&D dollars in projects can help especially, in the areas of basic research where progress is long in coming and expensive.  It works well as long as governments stay out of the way.

Innovation isn’t something that can be simply turned on, turned off.

Most innovation comes from small start-ups because they have nothing to lose by taking on the establishment or conventional wisdom.

What’s the worst that can happen?

They can fail.  But  hey, they tried.

They learned what didn’t work, learned (hopefully) from their mistakes.

As Carnegie observed, “It’s happened before and it’ll happen again.”


Try, Discard – The biggest block to innovation is that it is tough for individuals to let go of something when it fails and they keep trying again and again … hoping for a different outcome.

Large companies find it difficult (not impossible, just difficult) because groups tend to protect their own territories/products.

The process of taking an idea and turning it into a product/service inside the organisation is time-consuming, exhausting.

The innovators have to continually explain/justify the product/service again … and again … and again.

In addition, they’re often challenging one of the company’s earlier innovative products/services … and that’s dangerous.

So innovators and their ideas often leave the organisation, develop their idea and then either go it alone or get acquired.

Japanese firms know the stifling of innovation is hurting them and they’re struggling to change, but it’s tough and very uncomfortable.

Perhaps too tough, too uncomfortable.

Internal Innovation

Companies like 3M, IBM, Intel, Nvidia and a few others that have a good innovation track record set up skunk works — small teams away from the corporate infrastructure, processes and politics – that are free to focus on succeeding or failing quickly.


                                            Source – Imagethink

Inside, Out – A few firms have mastered the art of letting projects be carried out even if it means the results will kill an existing product/service/idea.  For most though, status quo is aggressively protected.  But innovation can occur inside and outside of the organisation if people are encouraged to try–even when they fail.

Jack Dorsey, who has had a pretty good run of innovation hits, started out at 13 with a dispatching logistics solution that is still used by a lot of cab companies.

He started a company that dispatched couriers, cabs and emergency vehicles. Along the way, he also worked on a number of projects in the health care industry.

You probably know him better as one of the founders of Twitter and Square, a device/service that small businesses use to process card payments on their mobile device.

Every year, there are hundreds of thousands individuals and teams that have the fire in the gut and commitment to change the way things are done, the way products/services are offered/used and set out to make a change, make a difference.

Hundreds see their innovation reach fruition and achieve modest or even major success.

Thousands fail quickly (1st year), pick themselves up, learn from their mistakes and move on.

Thousands don’t learn, don’t recover.

The key is to learn and grow with each failure; or as Edison said, “I have not failed. I’ve just found 10,000 ways that won’t work.”

If you don’t fail you don’t learn what works, what doesn’t, what succeeds, what doesn’t.


As Claudia said, “I can’t imagine what it must feel like to have what you want so close, and it might as well be a million miles away.”

It’s not easy, not fun; but it’s the only way you innovate.

​Disclaimer: This article is provided by Ace Worldwide News Group.

Our daily newspaper is here : Ace Worldwide News


Ace Worldwide News

Ace Share News:

Click here to Reply or Forward
14% full
Using 2.24 GB of your 15 GB

Terms of ServicePrivacyProgramme Policies

Powered by

Last account activity: 1 hour ago


FEATURED: ‘ Hackers do not just hack top-computer-bods they are turning to U as your ID is worth money ‘

Hacking – The Job that Just Keeps on Giving to them not You be safe


#AceNewsDesk So many time l say to people protect your computer and make sure you only share what is safe, not your private details everywhere. Use protected browsers – TOR, use search machines that do not track – DuckDuckGo or even better Startpage. Use extensions on your browser than protect you need advice ask, Ideas NOSCRIPT and HTTPSEVERYWHERE: Above all be SAFE!

Need advice we have just set-up this site: It free advice #AcePCHelp

“This is our world now. The world of the electron and the switch; the beauty of the baud. We exist without nationality, skin colour, or religious bias. You wage wars, murder, cheat, lie to us and try to make us believe it’s for our own good, yet we’re the criminals. Yes, I am a criminal. My crime is that of curiosity.” – Agent Bob, “Hackers,” United Artists, 1995

The hacking “industry” has come a long way since 1972 when Woz and Jobs would make blue boxes similar to Draper’s “Cap’n Crunch” boxes and sell them to folks who wanted to make free phone calls anywhere in the world.

If they hadn’t decided to make Macs, the business would have died because you can’t find a phone booth anymore, can you? Or, they could have done jail time like Draper.

Gee, tough choice.

A lot has changed in the past 40+ years, but a lot is the same. People want to poke around and others want to stop them.

Because the Internet and personal devices have become our lifelines to the world, cybersecurity has become a major issue for governments, companies and individuals.

It’s no wonder the Black Hat Security Conference (DefCon) keeps drawing more and more computer hackers, information technologists and corporate/government specialists hell-bent on learning the latest tactics to infiltrate and protect networks, systems, devices.

There is certainly enough bad code out there to keep both sides working for years to come since most of the software and apps are built from modules of old code, perpetuating old holes and creating new ones.

Of course, sloppy users help too; and no amount of bitching ‘n screaming is going to change bad habits.

Big Business

So hacking is a big business– hell, its huge – bad and good.

On the bad side you have people who may not even be decent code writers but are real good at making a dishonest buck. You know, people ranging from individuals to gangs and mafias with finely-tuned systems that function just like any other profit-oriented business.

Their scale of operations would blow your mind.


Dark Side – There are good and bad hackers who make their living off the internet. The good find and repair penetration areas. The bad exploit penetration areas and people’s gullibility, stupidity, greed. For the bad, it’s just good business.

A recent Business Insider article cited facts painstakingly compiled by security firm Trustwave. They found a cybercriminal with average intelligence and tools/services that can be bought online (if you have the right connections) could easily clear $80-$90K a month.

Catching and prosecuting them is tough, but not impossible.

Then there’s the grey operations run by government agencies around the globe that poke into country/company systems while trying to patch/protect their own systems.

The majority who congregated in Las Vegas wanted to find out where the vulnerabilities were in our now digital world and how to fix ‘em.

Yeah, there were a lot of suits/dresses there who wanted to hire these folks for their organisation to stop cyber intruders and anticipate/prevent future attacks.

When you consider the fact that 90 percent of the world’s data has been produced in the last two years; by 2020, 30-50 billion devices will be connected to the Net and we’ll be trying to store 40K Exabytes, the Internet is kinda’ important.

No one can pinpoint when the Internet lost its virginity.

It could have been when Admiral Grace Hopper, who developed the first compiler back in 1944 and found a bug (actually, a dead moth) in Harvard’s Mark II computer in 1947.

Or it could have been in 1991 when hyperlink creator Tim-Berners Lee and the team at CERN (Conseil Européen pour la Recherche Nucléaire) developed the Web and people quickly figured out they could make money across the Internet and on the Web.

We’re Dead

To get the good Black Hatters fired up, Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, started things off by telling them they could lose the Internet or the semi-free, semi-open Internet we know today.


Evolution – Starting this year’s Black Hat Conference with a dire warning, the director of Civil Liberties at the Stanford Centre for Internet and Society said that business as usual will only lead to a controlled, monitored Internet unless the community protects the Internet.

Ms. Granick voiced what the crowd already knew — every country’s lame government wants to control the Internet so they can guarantee their citizens security and anonymity while making it easier for them to watch what folks are doing, censor it and centralise control.

Exactly what Vint Cerf and the other guys didn’t have in mind!

Of course, that also didn’t sit well with the hackers but a lot of the security pros didn’t see much wrong with it.

In an ideal world, the Internet would be open, free, decentralised.

The problem is there’s always the “Yes but…”

Individuals shouldn’t be harassed, bullied. There are loosely defined social norms and courtesies that should be observed for groups and individuals. We owe it to our children to let them explore, make mistakes, learn … after all, they are our future. People have to be protected from their own stupidity and greed.

As it is, the Internet isn’t free, isn’t safe, isn’t secure; and that’s what most of the Black Hatters and security pros were focused on at the event.

They were there to learn newer, better techniques to deliver that balance.

Opportunities Everywhere

Along the way, a guy/gal has to have a little fun like hacking each other’s phone/tablet/computer/watch, tapping into ATM machines, fiddling with slots and finding their way into anything with a computer chip in it and a line of code.


How to Protect – To protect anything you have to find out where its weaknesses are. That’s the focus of the Black Hat Conference where people learn how anything/ everything is hacked and how it can be protected.

With 100 sessions to attend, black hatters found that damn near everything could be hacked:

– Most Android-flavoured smartphone users should be a little concerned and iPhoners shouldn’t be too smug.

– Chrysler recalled tons of cars, Musk got a patch out for the Tesla, the rest of the increasingly computerised car makers sweat bullets.

– Government hacks – it’s tough to keep a scorecard here with every government agency around the globe hacking every other county’s agencies, with other folks hacking the agencies and probably country agencies nosing around each other’s locations.

– Display hacks – Folks were up in arms over Adobe’s flash player hack, saying it was time to pronounce it deceased; but then HTML5 has its share of problems so the name calling will continue and we’re wondering how we’ll enjoy all those cat videos.

– Folks hacking smartguns, skateboards, drones and GPS (seriously folks, I have a tough enough time finding my way from point A to point B).

– House hacking – thermostats, lights, locks, refrigerators, media centers, stoves, toilets … anything/everything can be hacked.

– Infrastructure –a country’s very foundation (electrical, water, transportation, emergency services) can be hacked.

– 50B connected things – By 2020, Cisco projects we’ll have intelligent sensors, connections with just about anything you can imagine giving creative selling opportunities for almost everyone and more targets that need to be tested, protected


Help Wanted

With software holes and opportunities for holes everywhere you turn, the black hat and DefCon were also giant job fairs.


Recruitment – With all the right stuff the Black Hat Conference is an excellent place to find a job or move up in the cyberprotection world. The more experience you have, the more certified training the more offers that come your way. Hacking isn’t just a job; it’s a career for bad or good.

Exhibitors and headhunters were everywhere, searching for seasoned hackers to recruit.

They only validated what Burning Glass Technologies recently reported – there aren’t enough cybersoldiers to fill the open positions in the U.S. or around the globe.

The company noted that cybersecurity jobs have grown three times faster than other IT jobs and the skill sets that are needed continue to rise.

Sure, government and spook agencies preprinted offer form letters but the financial, health care, auto and consumer goods organisations also had their eyes out for possible recruits.

The demand/shortage also means cybersecurity jobs also offer salary premiums ($80K U.S. plus, compared to other IT jobs).

The problem is almost all of the jobs call for a Bachelor degree, cyber certification and three years of experience.

Then too, more of the job openings call for accounting, financial, other specialty skills as well as a security clearance.

Not sure if that last requirement is too high or too low because Snowden had one while working for the NSA (National Security Agency) and it didn’t slow him down too much.

But organisations have to start somewhere.

None of the headhunters looking for folks work for organisations – here or abroad – that are inherently evil (O.K., a few maybe) but it is impossible for them to deliver everything Ms. Granick wants – a free, open Internet; free speech; online safety/security and the right to privacy.

Remember, it’s a network of networks built with new code using old code to do things people didn’t even think about a few years ago.

That’s pretty hard to destroy and rebuild from the ground up.


Ms. Granick probably agrees with Kate Libby, “Never send a boy to do a woman’s job.”

This article is provided by Ace Worldwide News Group.

Our daily newspaper is here : Ace Worldwide News


Ace Worldwide News

Ace Share News:

FEATURED: ‘ How secure is your information on your apps and how much is it really really worth?

Privacy and Security are Personal, Very Personal


#AceNewsDesk – Oct.01: Already and time for another few featured posts – some sent to me anonymously. “I’m afraid we have to inform the Prime Minister that Operation Undertow is dead in the water. Why… she’ll have our guts for garters!” – Fredrick Gray, “For Your Eyes Only,” Eon Productions, 1981

If you’re uncomfortable with the idea that the social media sites you regularly visit or your apps could be sold and your “private” information could be a key part of the deal, you’re never going to get any sleep when IoT (Internet of Things) and IoE (Internet of Everything) take hold.

By then, there will be an estimated 50B things talking to thousands of other things; and some of that information is going to be yours … and yours … and yours … and

You can bitch-n-moan about it.

Governmental agencies can enact new laws to protect you. Of course, that’s right after they get back doors into all of your devices.

The Electronic Freedom Foundation (EFF) and idealists can sue for free, open, secure, private communications. But there’s not a damn thing you can do about it!

It wasn’t designed that way; it will never be that way.

When a few engineers and scientists developed the network of networks back in the ‘70s and ‘80s, they had no idea that their “little clique” communication tool was going to be so indispensable to over three billion people every day.

When Motorola’s Martin Cooper made his first mobile phone call, he had no idea you’d never let the little sucker be very far from you because you might miss out on something really important.

The Internet and wireless services by their very nature are fast, open, frictionless connections that carry stuff from one person to another, one source to any who want it.


Communicating Environment – Almost everywhere you go, everything you do today involves data communications – something talking to something. Personal/professional devices, wearables and digital eyes/pads track you and your activities. The volume of really great data and information continues to grow and be amassed by someone.

The developers weren’t naive. They knew there were bad people out there and they knew that ultimately, people/organisations had to make money (hopefully, a profit) from their efforts; but they didn’t know how ingenious these folks would be.

They couldn’t imagine that every government agency in every country on the planet would be so interested in who’s doing what to whom, when, where, why, how.

So it came to you as a big surprise when the New York Times suddenly uncovered that, despite the fact that most sites/services say they respect your privacy, there’s a mouse-type statement in their user agreement that says all of your information – name, birthday, email address, sites visited, stuff watched/read, devices (including cars, appliances, other), locations used, etc – could be an integral part of any sale to someone?

You give and they (sites, apps, data brokers, analytics firms) gather more and more details from your activities and devices so they “can better serve you.”


IoT Sophistication – The implementation of the Internet of things/everything has only just begun but already industry leaders have big plans for the things they can do with the information from individuals and devices. All we know is that there’s a lot to learn from the people/things around us.

The more you tell them, the better job they do in delivering product messages at just the right time and you’re happier with your online experience.

BAM!! everyone is happy.

True, that information can also be used to determine your religion, political leaning, fitness, medical condition, financial status and other preferences; but you just have to hope they mean well.

At the Ford Trends Conference earlier this year Jaap Suermondt, HP Labs analytics lab vice-president and director, noted that Ford, HP, SAP and many other firms are addressing the privacy and security concerns at the beginning of their projects rather than as an afterthought.


Data Clouds – HP’s Suermondt highlighted the fact that even the simplest of information gathering device sends personal information to someone’s cloud where there is the potential for use … and abuse. Multiple proprietary clouds and channels will make it difficult if not impossible to protect individuals’ information/data.

Using the lowly fitness tracker as an example, he noted that anyone who wears one sorta’, kinda’ knows all of that personal data goes into someone’s cloud.

“You keep your fingers crossed and you hope that they’re being good to your data.” he commented. “You hope that the company that sold you the fitness tracker doesn’t get acquired by another company that then gets acquired by another company that then sells your data to your health insurance provider, which is the monetisation mechanism.”

He acknowledged that given the speed firms are introducing new IoT products/services and the divergent paths, there should be more concern about data privacy.

Of course his company, Ford, SAP and the firms HP is partnering with, plan to “flip the Cloud” so the data can really be protected by engineering.

In their approach, personal data never goes into the cloud but rather a unique distributed mesh computing solution that will get the auto firms into the connected service business instead of car business.

I guess that might work as long as you’re in your car.

Of course, the idea that engineering can control it for you is a lot like the early Internet developers who thought they could exclude all the untrustworthy, nasty folks.

They focused on the overwhelming challenge of just getting files and emails moving quickly and reliably while protecting the network of networks from intruders and enemies.

That was a huge task in itself.

Back in the good old days hackers only took on computers; but once the fun wore off there, they took on bigger, better (more lucrative) challenges like banks, retailers, government agencies, Hollywood studios, utilities … and ordinary people.

Who could have imagined users would turn on each other?


Close Personal Friends – Once we entered the brave new digital connection world, the rules changed dramatically as to who wants to know what about whom and what you can find out with just a few clicks and there’s no turning back.

Most people think privacy is important in their daily lives, even though they realise that they are under surveillance when they’re out and about and that data about them is being collected.

Since breaches now occur with boring regularity, people who take their privacy/security seriously want limits placed on what personal data is collected, how it’s used, where it’s stored and who has access.

In addition, they find being proactive with the use of encryption and hiding their information, correspondence, discussions, purchases, activities, etc. is in their best interest.

People today have very low levels of confidence in the privacy and security of records maintained by most organisations; so in their own small way, they’ve taken their own steps to cut the collectors off.


Managing, Controlling – While people understand their information–and information about them–is needed to deliver the best products, services possible. They also want to be able to manage and control how that information is used.

Few folks have taken aggressive privacy enhancing measures; but they do feel there should be limits as to how long organisations keep the records. And they think there should be limits on the government surveillance programs.

The world’s most prestigious security technologist have all come out against government demands that they have special access to encrypted communications, saying it would put the world’s most confidential data and critical infrastructure in danger.

It’s a long and well-thought-out position statement, but what it really says is “Bull Pucky!”

Most people feel it’s important – often very important – to maintain privacy and confidentiality in their daily lives. That includes who is collecting what about them–especially when they’re at home, work, during social gatherings and when they just plain want to be alone.

Pew Research’s survey early this year showed:

– 93% of adults say that being in control of who can get information about them is important; 74% feel this is “very important,” while 19% say it is “somewhat important.”

– 90% say that controlling what information is collected about them is important—65% think it is “very important” and 25% say it is “somewhat important.”

– They feel they should be able to share confidential matters with another trusted person

Most people manage their own settings/activities because sadly few are confident that organisations – government agencies, credit card companies, social media sites – will protect their privacy/security.

People increasingly feel they can control how much information is collected about them and how it is being used, which is why many were taken off guard that a company sale would include their data.

With all of the monitoring going on around the globe, Pew and Nielsen have found there is an upswing in how people protect their information including:

– Clearing cookies or browser history (59% have)

– Refusing to provide information about themselves that wasn’t relevant to a transaction (57% have)

– Using a temporary user name or email address (25% have)

– Giving inaccurate or misleading information about themselves (24% have)

– Deciding not to use a website because they asked for a real name (23% have)

– 10% of adults say they have encrypted their phone calls, text messages or email

– 9% say they have used a service that allows them to browse the Web anonymously – proxy server, Tor software or VPN (virtual personal network)

Depending on the organisation, some people are okay with them retaining the individual’s records, but others not-so-much–even when it may be needed to provide certain functionality (search engines, social media sites).


People aren’t opposed to giving some folks their information but they agree with James Bond, “Now, if we could identify that ‘someone’…”

Disclaimer: This article is provided by Ace Worldwide News Group.

Our daily newspaper is here : Ace Worldwide News


Ace Worldwide News

Ace Share News: