CTD for December 21, 2005
a) Discussing the revelation of how President Bush authorized the National Security Agency (NSA) to spy domestically inside of the United States *and* what is possible with the rumored supersecret Echelon and its technology;
b) Fantastico as an add-on to CPanel at hosting companies;
c) Needs that remain unfulfilled with using open source software ’cause it’s just too hard to make it all work together;
d) Web 2.0 and the dirty little secret post #1 and #2; and some other miscellaneous ramblings.
Podcast: Play in new window | Download
1 Comment
Leave a Comment
About Steve Borsch
Strategist. Learner. Idea Guy. Salesman. Connector of Dots. Friend. Husband & Dad. CEO. Janitor. More here.
Connecting the Dots Podcast
Podcasting hit the mainstream in July of 2005 when Apple added podcast show support within iTunes. I'd seen this coming so started podcasting in May of 2005 and kept going until August of 2007. Unfortunately was never 'discovered' by national broadcasters, but made a delightfully large number of connections with people all over the world because of these shows. Click here to view the archive of my podcast posts.
Great podcast, Steve — thanks. The info on Echelon was especially interesting. I was just in the process myself of doing some research on corporate “email mining,” for an article I want to publish somewhere (TBD). It would be on the positive ways that knowledge can be obtained from a corporation’s email archives.
And I of course wanted to mention that this type of information mining had its start in the government sector — as so many technologies do. (Little things like, oh, the Internet and email itself.) I had seen mentions of Echelon, but hadn’t yet read much about it. Interestingly, one thing I found in my research was an old NY Times article, which kind of sensationalistally reported that the NSA was doing communications monitoring (!) — published way back in 1982. (Just not much in the way of email back then, except by government geeks.) So, they must recycle this issue from time to time.
Since my article will focus strictly on corporate email, privacy issues don’t come into play, of course. Legally, a company owns all its email. (As Scott McNealy was quoted not long ago: “We have no privacy — get over it.”) What I’m writing about is how companies can use their email archives as a knowledge base, for positive, proactive business reasons — beyond just retrieving emails for legal or compliance purposes, which is how they’re initially learning how to do this new email mining application.
Anyway, keep up the good work with your blog and podcasts! You’re a continuing inspiration… 🙂 And thanks for the link to my blog on yours.
cheers,
Graeme