Skip to main content

Footprints in the sands of digital media

There is an interesting pattern that indicates a rough security risk profile for each of us.

It is by no means scientific; it may be a very "US centric" list; and I have ignored second and third order effects.

Add the following numbers for yourself:

1. number of email accounts (include everything)
2. number of distinct credit cards
3. number of debit cards
4. number of social website accounts you maintain
5. number of IM/Chat/phone accounts you maintain
6. number of intranet passwords you have to remember
7. number of savings/trading/checking/retirement/legal accounts
8. number of online accounts with merchants
9. number of blogs for which you need login access
10. number of distinct internet/usenet style groups you belong to
11. number of news/info sites you browse with login access
12. number of hobby/recreation/professional sites with login access
13. number of company required login accounts (partner sites)
14. number of non-profit/voluntary group accounts/credentials
15. number of wifi hotspots you've connected to in past year
16. Add 5 for every cell phone
17. Number of off-work credentials to get compute resources
18. Add 10 if you have a secretary/PA to manage your calendar
19. Number of thumb drives, offline and online data backups you maintain
20. Add 30 if you predominantly use windows. Else, add 10.
21. Add 10 if you use google backend for anything.
22. Add 50 if you use linked in extensively, 10 if you use sparingly.
22. Add 500 if you use facebook extensively, add 100 if you use it sparingly.

This number is the equivalent of total "strangers" you interact with and share your private data.

At some point, you will have to manage these more carefully.


Popular posts from this blog

Why PI is not 4, math is great, and other mysteries.

The other day, I found myself with an interesting problem of approximating a circle with the enclosing square which seems to prove pi = 4.

The paradox was forwarded by a most interesting puzzle collector, Surajit Basu, a friend and life long inspiration. See Sonata for Unaccompanied Tortoise for why!

Here is the offending paradox:

This is an example of how counterintuitive questions can be answered with a little calculus.

The key is to realize that no matter how closely we approximate the circle, the orthogonal lines of the approximation formed by inverting the square corners will never actually be tangential to the circle.

Note carefully that as you get closer to 90 degrees, the horizontal line is much longer than the vertical. Same goes with the approximation at 0 and 180 - the vertical line is much larger than the horizontal component.

If we take a quadrant of the circle - let's say the top left quadrant, moving counter clockwise from top to left -  we can imagine that each inf…

Ambition vs. Fear.

Most important things in life don't come to us. Nor do we get them by seeking/wanting them. It comes from letting go of the unimportant stuff.

The hardest part is letting go of the tendency to take the world as is. This is a habit of our past successes.

But success is not a destination, it is a STOP sign. You stop, wait, and move on. Too often, we are paralyzed by success into the fear of the new. We stall on the road to a new life. We need to break our inertia and move.

Our thoughts and thought habits are hard to break. But that is where we have to spend the most energy. Thoughts are always competing strands  - of worries of the past and anxieties for the future. For some of us, they are cleanly separated into rivers that nurture every place they travel. For most, they are like the torrents and trickles -- competing, rushing somewhere, stopping completely elsewhere, always mixing, morphing, competing, winning, losing.

Our thoughts are the potential difference between the two pole…

Architecture, Engineering, Operations - iteration 1

The world has infinitely more stuff to be "done" nowadays. At least in the sense of building/running an institution that uses technology, there are many roles that are involved in making things work. The world of IT and technology in general makes the speed and variety possible. We now have a platform of IT that is globally scale-able if we can put some new thinking to the old problems of "getting things done".

There are great organizations that do this well, and they use "modern" IT principles to achieve this.

Fundamental to engineering a modern IT (or infrastructure organization) are the three roles of Architecture, Engineering and Operations. Some would say Architecture is encoded Engineering-history, but for now, we will keep them separate.

The popular definitions for these roles are about "output" delivered or the "domain" of discourse. The personality drives that determine the actual performance are not discussed, as far as I ca…