Daily Tech Digest - October 06, 2022

Addressing the Complexities of Cybersecurity at Fintech Enterprises

Effective IT governance is the cornerstone of cybersecurity as it is about leadership: how leaders treat IT as a cost-center vs. as an enterprisewide strategic asset. Governance is made more complex for central banks and regulatory and complex supervisory authorities due to regulation, supervision and compliance. There are many global models, frameworks and standards that can be referenced for complete cybersecurity governance and management, but ultimately, a mature organization chooses its own preferred guidance. The US National Institute of Science and Technology (NIST) Cybersecurity Framework (CSF).  the US Federal Financial Institutions Examinations Council (FFIEC) Cybersecurity Assessment Tool, the International Organization for Standardization (ISO) standard ISO 27000 and COBIT® are valuable resources for effective IT governance. These frameworks clearly describe roles and responsibilities of top management, importance of IT strategic alignment to achieve the enterprise objectives, importance of leadership and top management support to address IT and cybersecurity issues, importance of effective IT risk management, and proper reporting strategies.

CIO Guy Hadari on the management skills that set IT leaders apart

As Hadari sees it, “The challenge is that most up-and-coming IT professionals are trained to be technology implementers and innovators, and so are ill equipped for the management aspects of the job,” something that he experienced personally. In his first few years as CIO, Hadari’s comfort zone was data, analytics, and statistics, and that was the lens he used to lead IT. ... Hadari encourages his team to use data, surveys, and conversations to understand the perceptions of IT, and the problems that create those perceptions. He finds that comparing how IT rates itself to how the business rates IT reveals a great deal about where IT needs to focus. “Collecting all of that information is not an easy process, but it is the beginning of change,” says Hadari. “It means that we can accept our challenges, bring them out into the open, and do something about them.” At Biogen, Hadari’s extended leadership team, which is one level below his senior IT leadership team, owns the strategy and plan for IT improvement. “They build it, execute on it, and own it,” he says.
Different employee segments will require different messaging. The IT group will benefit from different messaging than the sales group. Don’t make the mistake, though, of believing IT employees don’t need security awareness—they do. Security teams should take steps to understand employees’ current comprehension of security messaging and where gaps may exist. And, of course, security awareness marketers need to understand the social and behavioral drivers of employee actions. What’s important to them? What motivates them? What are they concerned about? You can then create messaging to address employees’ pain points or motivators—to give them some reason to act, or not act, based on what they hear and learn. ... Security is a journey and a conversation, not a destination and a directive. Thinking like a marketer and taking steps to segment, understand and effectively connect with employees based on their needs, interests and concerns can help to better engage the organization in its cybersecurity efforts.

Young people in tech unhappy despite inclusion push

Almost half of younger people in the tech sector have at some point felt uncomfortable at work because of their gender, ethnicity, background or neurodivergence. Young people not already in the sector claimed they’re not confident about how to make tech their career, with a number of misconceptions about what is involved in a tech career still acting as a deterrent. Almost 15% of the young people asked who were not already in the sector said they know nothing about tech careers, with 29% believing they don’t have the right qualifications for a job in the sector. Women have more doubts about the sector than men – 23% of women believe their maths and science skills aren’t up to scratch enough for a tech job, compared with 13% of men; and 19% of women doubt they’re smart enough for the sector, compared with 13% of men. ... Only 5% of young people said that a lack of ethnic diversity is a deterrent to pursuing a tech career, although this varies based on the ethnicity of the person asked, with the breakdown being: 9% of young people from mixed raced backgrounds, 10% of people from an Asian background, and almost 36% of people from a black background.

4 Reasons Why Talent Development Is So Important To Your Business

In the age of employee turnover and the Great Resignation, organizations in nearly every field are finding it more difficult than ever to attract and retain top talent. As a leader, you need to make talent development a personal priority to stay competitive in recruiting and keeping the best people. Have a solid plan and communicate it widely to both prospective recruits and current employees. A truly thoughtful talent developing program lets people know how much you value them. It strengthens talent in new directions. Employees want to know that their leader sees their potential, and it’s important to be intentional about recognizing and reinforcing the strengths of your people. A one-size-fits-all approach to talent development isn’t good enough—you need to design a program for each individual based on their strengths, their goals and the organization’s needs. When you strengthen your talent, you strengthen your leadership. It improves productivity. According to a recent Gallup study, helping your employees make full use of their employees skills and strengths, and providing them with opportunities for growth and improvement, can make them up to six times more productive. 

8 ways to get out of a career rut

Consider the millennial who felt stuck at a small company with no room for growth. Or the older generation of workers who thought they should retire early because the future was so uncertain and accepting a complete shift to digital felt daunting. For Gen Z, the prospect of never meeting managers or colleagues – because of virtual interviews and remote jobs – was foreign and left some without a sense of belonging. Not only were we physically absent from workspaces, but many of us also struggled mentally with the sudden, enormous changes to our daily routines and goals. It became a time of contemplation, where many professionals began reassessing their careers (and lives). And the realization for many? They felt stuck. What are your options if you want to take a big leap out of your current situation? How do you find motivation, especially after a couple of very stressful years outside of your control? What inspires you to take on a new challenge?

The Dark Side of Open Source

Lack of interest, patience, and time; change of profession and creative differences are some of the issues that push developers to close an open-source project. But the biggest reason why developers quit is that they drain out of energy. People like John Resig, creator of jQuery, and Ryan Dahl, creator of Node.js, too have most likely exited from their respective OSS project because they couldn’t keep up with the energy it demanded. Fakerjs’ Mark Squires’ sentiment was understandable. It’s very difficult to offer non-paid work for a long period of time and at a certain point an open-source project can become more hassle than it’s worth. It also depends, of course, on your motivations for developing open-source software, but more on that later. The best open-source projects are typically those that are maintained by developers who are compensated for their work on them and can maintain a work-life balance. Those who can devote their entire attention on enhancing them.

Back to Basics: Cybersecurity's Weakest Link

Social engineering was a driver for hacking over 20 years ago and, apparently, we still haven't moved away from it. Adding insult to injury, successful social engineering isn't restricted to non-technical organizations. It's very plausible that an unsavvy user in a backwater government department might fall for social engineering, for example, but much less so someone working at a leading tech firm – and we see that both Uber and Rockstar Games were impacted by social engineering. At some point, as a cybersecurity practitioner with the responsibility of educating your users and making them aware of the risks that they (and by extension the organization) are exposed to, you'd think that your colleagues would stop falling for what is literally the oldest trick in the hacking playbook. It's conceivable that users are not paying attention during training or are simply too busy with other things to remember what someone told them about what they can click on or not. However, social engineering attacks have so consistently been in the public news – not just cybersecurity news – that the excuse "I didn't know I shouldn't click email links" is getting harder and harder to accept.

Cyber insurance explained: What it covers and why prices continue to rise

For technology and compliance lawyer Jonathan Armstrong, the most significant driver of change in cyber insurance is demand for financial protection from litigation against organizations in the wake of cyber incidents. “We have seen that an attack or breach can be followed in the next day or so by lawyers claiming that they are investigating litigation against the company that has been hit.” This issue has been under the spotlight recently in the Lloyd v Google case in the UK. Richard Lloyd alleged that Google collected data from around 4 million iPhone users between 2011 and 2012 regarding their browsing habits without their knowledge or consent for commercial purposes, such as targeted advertising. He looked to bring representative action on behalf of all affected individuals against Google for compensation, which Google opposed. The UK Supreme Court sought to establish whether such a claim for a breach of data protection legislation can succeed without distinctive personal damage and if claimants can bring group action on behalf of unidentified individuals, including people who may not even be aware that they were affected.

Achieving faster time-to-market with data management

When companies manage their product data efficiently, they can be flexible while launching their new products. With error-free product data of new items, brands can customise information as per the marketplace and the promotion period. PIM possesses high-quality product information that is scalable, and offers complete freedom to be deployed across any technology environment. Product data can be easily imported from various vendors in multiple file formats and mapped to a single point of truth. ... In the wake of technological advances, fluctuating consumer expectations, competitive pressures, and turbulent market dynamics, operational agility is vital to survive and succeed. Faster time-to-market is one of the parameters that determines business agility. To continuously deliver high-quality, novel, and faster services, companies need to deploy PIM, which enhances product information, and improves conversion rates and customer retention. Businesses can also make data-driven decisions and create joyous customer journeys with the available data. 

Quote for the day:

"If you don't demonstrate leadership character, your skills and your results will be discounted, if not dismissed." -- Mark Miller

Daily Tech Digest - October 05, 2022

How edge computing will support the metaverse

Edge computing supports the metaverse by minimizing network latency, reducing bandwidth demands and storing significant data locally. Edge computing, in this context, means compute and storage power placed closer to a metaverse participant, rather than in a conventional cloud data center. Latency increases with distance—at least for current computing and networking technologies. Quantum physics experiments can convey information at a distance without significant delay, but those aren’t systems we can scale or use for standard purposes—yet. In a virtual world, you experience latency as lag: A character might appear to hesitate a bit as it moves. Inconsistent latency produces movement that might appear jerky or communication that varies in speed. Lower latency, in general, means smoother movement. Edge computing can also help reduce bandwidth, since calculations get handled by either an on-site system or one nearby, rather than a remote location. Much as a graphics card works in tandem with a CPU to handle calculations and render images with less stress on the CPU, an edge computing architecture moves calculations closer to the metaverse participant. 

Big Gains In Tech Slowed By Talent Gaps And High Costs, Executive Survey Finds

Survey participant, Andrew Whytock, head of digitalization in Siemens pharmaceutical division, crystallized the criticality of employee recruitment, training and retention, explaining, “It’s great having a big tech strategy, but employers are struggling to find the people to execute their plans.” In addition to growth needs, staffing problems extend to fortifying cybersecurity. Nearly 60% of respondents reported that cybersecurity objectives are behind schedule. When asked to identify the “internal challenges” driving delays, executives ranked “lack of key skills” and “cultural obstacles” highest. That’s inexcusable. Lax tech controls and strategy acceleration pressure make a dangerous mix. To thrive, “digitally mature” enterprises need top talent in supportive cultures to unlock the transformative value of their sizable IT modernization investments. ... Despite huge investments in job training and leadership development, broad business perspective remains a widespread skill gap.

How to design a data architecture for business success

“Data architecture is many things to many people and it is easy to drown in an ocean of ideas, processes and initiatives,” says Tim Garrood, a data architecture expert at PA Consulting. Firms need to ensure that data architecture projects deliver value to the business, he adds, and this needs knowledge and skills, as well as technology. However, part of the challenge for CIOs and CDOs is that technology is driving complexity in both data management and how it is used. As management consultancy McKinsey put it in a 2020 paper: “Technical additions – from data lakes to customer analytics platforms to stream processing – have increased the complexity of data architectures enormously.” This is making it harder for firms to manage their existing data and to deliver new capabilities. The move away from traditional relational database systems to much more flexible data structures – and the ability to capture and process unstructured data – gives organisations the potential to do far more with data than ever before. The challenge for CIOs and CDOs is to tie that opportunity back to the needs of the business.

What Is Cloud Orchestration?

Cloud orchestration is the coordination and automation of workloads, resources, and infrastructure in public and private cloud environments and the automation of the whole cloud system. Each part should work together to produce an efficient system. Cloud automation is a subset of cloud orchestration focused on automating the individual components of a cloud system. Cloud orchestration and automation complement each other to produce an automated cloud system. ... Cloud orchestration supports the DevOps framework by allowing continuous integration, monitoring, and testing. Cloud orchestration solutions manage all services so that you get more frequent updates and can troubleshoot faster. Your applications are also more secure as you can patch vulnerabilities quickly. The journey towards full cloud orchestration is hard to complete. To make the transition more manageable, you can find benefits along the way with cloud automation. For example, you might automate the database component to speed up manual data handling or install a smart scheduler for your Kubernetes workloads. 

Introducing post-quantum Cloudflare Tunnel

From tech giants to small businesses: we will all have to make sure our hardware and software is updated so that our data is protected against the arrival of quantum computers. It seems far away, but it’s not a problem for later: any encrypted data captured today can be broken by a sufficiently powerful quantum computer in the future. ... How does it work? cloudflared creates long-running connections to two nearby Cloudflare data centers, for instance San Francisco and one other. When your employee visits your domain, they connect to a Cloudflare server close to them, say in Frankfurt. That server knows that this is a Cloudflare Tunnel and that your cloudflared has a connection to a server in San Francisco, and thus it relays the request to it. In turn, via the reverse connection, the request ends up at cloudflared, which passes it to the webapp via your internal network. In essence, Cloudflare Tunnel is a simple but convenient tool, but the magic is in what you can do on top with it: you get Cloudflare’s DDoS protection for free; fine-grained access control with Cloudflare Access and request logs just to name a few.

What are the benefits of a microservices architecture?

The benefit of a microservice architecture is that developers can deploy features that prevent cascading failures. A variety of tools are also available, from GitLab and others, to build fault-tolerant microservices that help improve the resilience of the infrastructure. A microservice application can be programmed in any language, so dev teams can choose the best language for the job. The fact that microservices architectures are language agnostic also allows the developers to use their existing skill sets to maximum advantage – no need to learn a new programming language just get the work done. Using cloud-based microservices gives developers another advantage, as they can access an application from any internet-connected device, regardless of its platform. A microservices architecture lets teams deploy independent applications without affecting other services in the architecture. This feature will enable developers to add new modules without redesigning the system's complete structure. Businesses can efficiently add new features as needed under a microservices architecture.

Tips for effective data preparation

According to TechRepublic, data preparation is “the process of cleaning, transforming and restructuring data so that users can use it for analysis, business intelligence and visualization.” AWS’s definition is even simpler: “Data preparation is the process of preparing raw data so that it is suitable for further processing and analysis.” But what does this actually mean in practice? Data doesn’t typically reach enterprises in a standardized format and, thus, needs to be prepared for enterprise use. Some of the data is structured—like customer names, addresses and product preferences — while most is almost certainly unstructured—like geo-spatial, product reviews, mobile activity and tweets. Before data scientists can run machine learning models to tease out insights, they’re first going to need to transform the data, reformatting it or perhaps correcting it, so it’s in a consistent format that serves their needs. ... In addition, data preparation can help to reduce data management costs that balloon when you try to apply bad data to otherwise good ML models. Now, given the importance of getting data preparation right, what are some tips for doing it well?

Optimizing Isolation Levels for Scaling Distributed Databases

The SnapshotRead isolation level, although not an ANSI standard, has been gaining popularity. This is also known as MVCC. The advantage of this isolation level is that it is contention-free: it creates a snapshot at the beginning of the transaction. All reads are sent to that snapshot without obtaining any locks. But writes follow the rules of strict Serializability. A SnapshotRead transaction is most valuable for a read-only workload because you can see a consistent database snapshot. This avoids surprises while loading different pieces of data that depend on each other transactionally. You can also use the snapshot feature to read multiple tables at a particular time and then later observe the changes that have occurred since that snapshot. This functionality is convenient for Change Data Capture tools that want to stream changes to an analytics database. For transactions that perform writes, the snapshot feature is not that useful. You mainly want to control whether to allow a value to change after the last read. If you want to allow the value to change, it will be stale as soon as you read it because someone else can update it later.

Why IT leaders should embrace a data-driven culture

Data tells the story of what works – and perhaps more importantly, what doesn’t work – for your team. It provides a clear and unbiased picture of how new transformations are netting out and where opportunities lie to increase efficiency and value. Utilizing the right metrics reveals which innovations are most effective for the team, letting IT managers know how transformations are running. Focusing on these results helps organizations streamline business processes and leads to higher team productivity. It also puts IT leaders on the path to sunset legacy solutions that require large budgets or lots of manual work to keep them functional. These changes impact all business areas, allowing employees anywhere and everywhere – not just those in IT – to be more innovative and effective. ... As business leaders focus on meeting the needs of today’s evolving workforce and customers’ desires, operating with a data-driven strategy lets managers stay agile and confident in their next steps. Allowing data to drive decisions also provides a means to back those decisions with clear evidence.

Who is responsible for cyber security in the enterprise?

Alarmingly — or perhaps unfairly — only 8 per cent of executives said that their CISO or equivalent performs above average in communicating the financial, workforce, reputational or personal consequences of cyber threats. At the same time, under 15 per cent of executives gave their CISOs or equivalent a top rating from a scale of one to ten. Maintaining a bridge between business and tech is vital when it comes to ensuring all are on the same page regarding security. “It is no surprise that one of the main challenges companies face when implementing a cyber risk mitigation or resiliency plan is the communication gap between the board and the CISO,” said Anthony Dagostino, founder and CEO of cyber insurance and risk management provider Converge. “Cyber resiliency starts with the board because they understand risk and can help their organisations set the appropriate strategy to effectively mitigate that risk. However, while CISOs are security specialists, most of them still struggle with adequately translating security threats into operational and financial impact to their organisations – which is what boards want to understand.

Quote for the day:

"You may be good. You may even be better than everyone esle. But without a coach you will never be as good as you could be." -- Andy Stanley

Daily Tech Digest - October 04, 2022

One aspect is to implement change management on the automation, including the scripts, config files, and playbooks, used to manage the network. The use of code management tools helps with this: check-out and check-in events help staff remember to follow other parts of proper process. Applying change management at this level means describing the intended modifications to the automation, testing them, planning deployment, having a fallback plan to the previous known-good code where that is applicable, and determining specific criteria by which to judge whether the change succeeded or needs to be rolled back. ... Putting in place automation to lock-in a network state is a change management event, and in a sense, a change to the architecture; creating it and putting it into production needs to go through the whole approval and deployment process, and all future changes need to be made with its presence and operation in mind—considering it has to be part of future change management evaluations.

The Impact of Cybersecurity on Consumer Behavior

In addition to imperiling consumers’ PII, cyberattacks also cause consumers to feel helpless about their ability to protect their own data. According to ISACA’s survey report, about one in five consumers in the US, UK and Australia experience a sense of resignation that there is nothing they can do to protect themselves from cybercrimes. Nearly half of consumers in the US, UK and Australia think that they are likely to be a victim of cybercrimes. Although the initial cyberattack occurs just once, the lasting impacts of that attack continue for an unknown amount of time. If consumers’ data are stolen during cybercrimes and are subsequently sold to malicious actors, one attack can turn into a headache of fraud, identity theft and social engineering scams for the foreseeable future. Cyberattacks that compromise personal medical information in the healthcare industry or important account details in the financial services industry can cause emotional and financial stress. In the United States, the public is beginning to worry about state-sponsored cyberattacks against national security and defense systems and government agencies, in addition to their own personal information.

Digital transformation is brewing at Heineken

Heineken says it is fully committed to the path to net zero – and that there are efforts around the organisation to achieve this goal. Sustainability is top of mind in the strategies and tactics for digital transformation. “We have several fully green breweries,” said Osta. “This started in Austria a few years back with Goesser and is now being replicated in markets including France and Brazil. We also have 3D printers in 40 breweries, with 25 more in plan for this year. 3D printing on-site is very effective when it comes to spare parts management as it reduces carbon emissions. “There is also an incredible effort being made on the data side in terms of what we can estimate and measure. We are always looking at emerging data standards for better quality data to exchange across the ecosystem with our suppliers. The challenge is that often in sustainability we are faced with dark data – data that is critical but not collected or visible. “The corporate value chain (Scope 3) reporting requires an ecosystem approach of data exchange. 

Digital Identity Bill Passes Key Senate Milestone

The legislation stops short of mandating national IDs. It would create a task force to create standards and recommend a voluntary program for states, local, tribal and territorial governments to verify identities online for "high-value transactions." About a half-dozen states have already rolled out mobile drivers licenses in the pilot phase. Nationwide standards would help ensure these new IDs are secure and provide a guide for others states. Grant says online verification could be offered in a variety of forms, such as on-demand validation services, which could become part of the credit card application process, or a mobile app on smartphones that people could carry in their pockets. "Identity is very personal," Grant says. "You're probably going to need to create a few different channels for Americans to be able to tap into these authoritative sources. I'd be thrilled to have a mobile driver's license app on my phone. Others would say, 'I don't want to have an app from the government on my phone.'"

Do You Fit Cybercriminals’ Ideal Victim Profile?

The Bad Actors Know About You. And they know exactly why you keep putting off addressing your cybersecurity vulnerabilities. Don’t give attackers any more advantages when it comes to breaching your law practice. My advice?Be more reticent when it comes to sharing personal information on social media. (For example, if you work from home, register as an online business when you set up your Google Business profile so that your physical address and photos of your home won’t show up on Google Maps.) Be less trusting of seemingly friendly messages and emails that cross your transom. While technology solutions can greatly improve your defenses, humans are the last line of defense. Don’t click on attachments from unknown senders. If a large file arrives from someone you haven’t heard in for a long time, call them to say hello and ask about the email before you click. Be more vigilant in general — including asking qualified cybersecurity professionals to assess your current level of protection and recommend safeguards. Rereading this, even I got stressed.

Five Data-Loading Patterns To Boost Web Performance

No one likes a white blank screen, especially your users. Lagging resource loading waterfalls need a basic placeholder before you can start building the layout on the client side. Usually, you would use either a spinner or a skeleton loader. As the data loads one by one, the page will show a loader until all the components are ready. While adding loaders as placeholders is an improvement, having it on too long can cause a “spinner hell.” Essentially, your app is stuck on loading, and while it is better than a blank HTML page, it could get annoying, and visitors would choose to exit your site. ... Modern JavaScript frameworks often use client-side rendering (CSR) to render webpages. The browser receives a JavaScript bundle and static HTML in a payload, then it will render the DOM and add the listeners and events triggers for reactiveness. When a CSR app is rendered inside the DOM, the page will be blocked until all components are rendered successfully. Rendering makes the app reactive. To run it, you have to make another API call to the server and retrieve any data you want to load.

What Will it Take to End the Public Sector’s Cybersecurity Talent Gap?

The public sector can be deliberately hard to understand. From the multiple terms and acronyms used to describe programs and agencies, to an incredibly complex technological infrastructure, beginning a career in government can seem daunting. That is compounded when realizing even entry-level roles often require at least five years of experience. Many cybersecurity job descriptions highlight requirements for certifications and achievements, which can only be earned after a certain amount of time in the field. Instead of having such high expectations for entry-level candidates, which will only continue to leave hundreds of jobs unfilled, government agencies need to update their job descriptions to be truly entry-level and seek out college graduates or individuals who might have just completed a cybersecurity bootcamp or training program—and who have yet to gain any experience. It would also be beneficial to look at talent that might not come from a STEM field. Candidates with backgrounds in history or English can bring skills like analytical thinking and communication to the table—skills that are often a lot harder to teach than computer science.

8 strange ways employees can (accidently) expose data

Video conferencing platforms such as Zoom and Microsoft Teams have become a staple of remote/hybrid working. However, new academic research has found that bespectacled video conferencing participants may be at risk of accidently exposing information via the reflection of their eyeglasses. ... Users may not associate posting pictures on their personal social media and messaging apps as posing a risk to sensitive corporate information, but as Dmitry Bestuzhev, most distinguished threat researcher at BlackBerry, tells CSO, accidental data disclosure via social apps such as Instagram, Facebook, and WhatsApp is a very real threat. “People like taking photos but sometimes they forget about their surroundings. So, it’s common to find sensitive documents on the table, diagrams on the wall, passwords on sticky notes, authentication keys and unlocked screens with applications open on the desktop. All that information is confidential and could be put to use for nefarious activities.”

Used servers: Bargain or too good to be true?

Used equipment can run as well as new equipment “when you find the right seller,” says Peter Strahan, founder and CEO of Lantech, a managed IT services provider. “This allows you to rapidly cut the costs of a data center with used equipment.” In addition, deploying used IT equipment is generally good for the environment, Strahan says. “While the equipment could theoretically be recycled, it takes a lot of manpower,” he says. “Finding a use for it after it becomes obsolete saves a lot of time and money when it comes to recycling and stops the equipment going to the landfill.” A lot of companies “value the ‘green’ benefits of redeploying hardware,” says Cameron James, executive vice president of CentricsIT, a global IT services provider. “The best way to reduce IT waste is to use any product to its maximum lifespan, without compromising on performance. This is easy to do. Many used products are N-1—just one generation back from the latest OEM lines.” It can also make sense to buy used equipment if an organization has moderate powering needs in its data center, Strahan says. “If you have large powering needs, you will need the most efficient equipment,” he says.

Carbon copies: How to stop data retention from killing the planet

So what can be done about it? It is a question that has been plaguing the IT industry for years, and the lack of a definitive answer often makes it easier to just turn on another air-conditioning unit and look the other way. But that’s causing even more harm. So what are the alternatives? Storing less data appears to be an obvious answer, but it would be almost impossible to implement, because who decides what parameters are worth recording and what are not? The BBC learned this the hard way when it trashed much of its TV archive during the 1970s and 1980s, assuming that it would be no use. Then came the VCR, the DVD player and, of course, streaming. Ask any Doctor Who fan and they will grimace at the number of early episodes of the long-running Sci-Fi series that have been lost, perhaps forever, because of a lack of foresight. So, that’s the case to justify digital hoarding. But it all has to be stored somewhere, and those facilities have to be environmentally controlled.

Quote for the day:

"Leadership cannot really be taught. It can only be learned." -- Harold S. Geneen