Conflict is as much a part of human nature as much as eating and sleeping are. It’s an instinct, embedded deep into the primordial, animal side of our brain. And in every conflict there are two sides: the one that is attacking and the one that is reacting to that attack. The side that adapts faster is the one that wins.
Attackers will set an objective for themselves and they will probe and prod at their victim’s defenses until they punch through. In turn, defenders need to anticipate the attacker’s goal and focus their efforts and resources in to preventing the attacker’s success. It a good old fashion arms race and these basic mechanics of combat are the reason why attacking is considered far easier than defending. Continue reading →
Freeware, trial versions and demo software applications have gotten an incredibly bad reputation over the last decade or so. What once started as a mechanic meant to help, above all others, the user, was twisted and deformed by aggressive marketers in an instrument of propaganda and into an advertising machine. Filled with brand-exposure strategies, like traps and hidden (or at the very least less-than-obvious) components and side features, like browser taskbars, homepage modifications, desktop web-link shortcuts and other forms of invasive and intrusive behavior has made people very suspicious of this software category. Free demonstrations applications have also been used by hackers as a medium to distribute malware and computer viruses, which only contributed to their bad reputation.
Unfortunately, this has made users give free demos a wide berth and steer clear from them.
Today’s mercantile, competitive market has also promoted a very linear train of thought: if it’s cheap, it lacks quality. Filled with cynicism, we’ve also concluded that if something is free, than it’s a trap. I mean, there has to be a hidden catch somewhere, right? Nothing in life is free. Everyone pays the ferryman, one way or another. Continue reading →
An individual cannot really hope to match the IT resources that a company has at its disposal. The only domain where an individual is likely to get the better of a company is in individual hardware configuration. The general office workstation is usually a middle section performance machine, designed to handle a minimum of operating tasks and can’t really compare to a home computer tweaked for performance with a custom configuration. Even so, he will lose a fight with one of the specialized company computers, those meant to handle video and image editing, like the ones in the design department or in marketing.
Because of this, a company’s IT assets can represent a real gold mine for some employees. Sooner or later, they might realize that his employer’s servers and internet bandwidth are exactly what they always needed for their personal use but could never afford. His community forum, his upload mirrors or even a torrent site could really thrive in this lush and luxurious new environment.
As such, you could easily find out that your company’s IT assets have been used to host private services. Continue reading →
Taking a break and unwinding is not a luxury, but a necessity of the working cycle. We saw that working for 8, or even 9 hours straight is counterproductive. But how far can one go with entertainment during his lunch break before he goes too far? The limit exists, but the line that should not be crossed is a rather broad one and is anything but straight. Still, going too far is unacceptable, for the possible damages far outweigh the benefits.
The argument that “it’s my break, I’m on my time so I can do anything” is childish and irresponsible.
Just because we are on our break, it does not mean that we’ve been temporarily absolved of our responsibilities towards the company. A little bit of Solitaire or a good run through Minefield might be just what you need to unwind during the break. The games don’t even need to be limited to the Windows classics, but a problem can arise when those games get a little bit too advanced. Even if they are on their break, playing, say Battlefield 3 or Borderlands 2, it can seem unprofessional to your fellow colleagues and even more so to a business client that comes into the office for a meeting. Continue reading →
In the Age of Computers, clandestine software is one of the biggest risks for a company.
The software we are talking about is not a virus that breaches your network defenses and quietly infiltrates your office computers. A far greater problem is the involuntary inside job – careless piracy.
The reasons can vary and are numerous, but the reality is that some employees install or store pirated software on office computers. This can be caused by management offering inadequate resources, independent employee activities or simply personal quirks (the company has a license purchase for Adobe’s Photoshop but I’m used to using Corel’s Painter.) And while this kind of copyright infringement doesn’t sound like it should concern the company, it most definitely does. Continue reading →