No End of Jobs - how do we break out of Ground Hog Day

| 1 Comment | No TrackBacks
| More
A couple of days ago I was very sharp about forecasts of gloom, doom and mass unemployment from new technology in recent reports. 

I had forgotten quite how sharp Sir Michael Marshall, Charles Christian and myself were thirty years ago when similar arguments were in vogue. Amazon has now delivered a replacement for my last copy of what we wrote (loaned and never returned). Below is a scan of the first page of the text of "No End of Jobs". Remember it was written in 1984, so for Japan you might read China. For West Germany you might read India.

Most of the forecasts have come true, or are well on the to coming true - save that we have imported immigrants to look after our elderly in overcrowded NHS hospitals, instead of making use of technology to enable them to live at home. One of the themes was the job creation effects of "prolonged active life": resulting from automating records and administration to enable clinicians to spend time with patients instead of on paperwork, from the manufacture and installation of "robotics for rheumatics" to enable independent living for longer, as well as from all the telecare and telemedicine technologies that we are still talking about but not deploying.  

The obstacles to do with the organisation of funding that we identified then have still not been addressed. Indeed they may now be worse. The overheads and waste resulting from the centralisation, bureaucratisation and outsourcing of our health and welfare systems, with funding fragmented for distribution down leaky silo'd drainpipes, means we are commonly spending more to achieve less, or at least to achieve far less than recent advances in knowledge and technology should have enabled us to achieve.

I plan to scan the rest of the paper.
No end of Jobs Intro.jpg
   

"One of the messages from President Obama's recent cybersecurity summit was summarised by an American Banker as "We have to protect the trust of the consumer or its game over". The latest PWC Global Economic Crime survey indicates that over half of all global CEOs are aware of the cyber problem - but more are concerned over bribery and corruption. They are right to be so concerned. Other studies show that over half of major incidents, whether fraud or "cyber" involve insiders - whether careless or malicious. And when it comes to malice the CPNI study of the Insider Theat shows that it is disproportionately men who are the risk.

Most CEOs are already only too well aware of the risks. They have no need for yet another patronising awareness campaign. But what should they actually do?

I have already blogged on part of the answer: select and retrain those you already trust rather than hire short stay compliance officers and security staff of unknown probity. Hence also my recurrent calls for inputs to my exercise with the Tech Partnership on the skills with which they need to be retrained. I am now coming to the end of that exercise and am due next week (inputs still welcome) to report on who should be trusted to help specify and deliver the training modules neeeded - particularly for those planning, developing, installing and running the organisations Identity and Access Management processes and technologies: the key point of vulnerability.  

However, another message has come through at many of the meetings I have been attending. And it does not appear to be at all popular when I point it out.

Men are usually at the heart of the problem. Women are usually at the heart of the answer.

Yes there are some female hackers and fraudsters but almost all malicious leaks and attacks involve men, as do most of the accidental leakages and system failures. More-over the proportions are not explained simply by the proportion of men and women in roles where they can undermine or bypass systems, make mistakes or take unnecessary risks. 

When it comes to non-malicious risk, the story of Bletchley Park is apposite. It was 80% female, including some of the top code breakers  but we only know what was done there because some of the men craved public recognition.

We now have the "Turing industry" (from films to institutes). I commend the wikipaedia entry for a summary of the real achievements of Alan Turing (as opposed to the pastiche in the Imitation Game). Meanwhile we still know almost nothing of the contribution of his fiance, Joan Clarke who became deputy head of Hut 8 when he left for the United States and went into GCHQ after the war. We know nothing of the work of Rosalind Hudson, the other named female cryptographer in Hut 8, who died in 2013 having never spoken of her work at Bletchley, save that she is named than in the list of code breakers, as opposed to the approximately 150 support staff.

That female ability to maintain security while also fighting and winning a cyberwar can also be seen with regard to the team which broke the Abwehr enigma codes, thus enabling the Double Cross operations without which the "relatively bloodless" D-Day landings might have been impossible.

Mavis Batey was only 19 when she helped save a British Supply convoy and kill 3,000 of the Italian sailors involved in the failed ambush three days (three days!!!) after she had broken the Italian Enigma code, thanks to the carelessness of a male operator who had simply pressed the letter "L" to encrypt a test  transmission. Meanwhile we know nothing of her colleague, Margaret Rock save for her letters to her brother and that she, like Joan Clarke, joined GCHQ after the war. We still know almost nothing about the other members of Dillys Fillies  the (almost) all female cryptography team which assisted Bletchey's top (better than Turing but died in 1943) codebreaker, Dilly Knox. We do know, however, why he recruited them: better lateral thinking, teamwork and temperament. 

There is a message here. I wonder who will decypher it."

How do we break out of Groundhog Day and provide Broadband and Digital Skills that are fit for purpose to ALL?

| 2 Comments | No TrackBacks
| More
Learning for change cartoon.jpg
The stick of dynamite is labelled "Publicity Japanese Style". The tube of sweets is labelled "First Rate Teachers". I had no say in the cartoon and did not see it till afterwards.

The House of Lords Report on Digital skills gave me a curious feeling of "deja view" (see the date at the foot of the cartoon above) with its statement that millions of jobs are at risk from automation and its subsequent calls for digital skills for everyone and the Internet as a utility. 
Back in In 1981 the late Donald Michie had been invited to organise the annual Sperry seminar for the UK Technical Press. His theme was "Intelligent systems: the unprecedented opportunity". The Micros in School Programe was in train and, in return for first class travel for myself and my wife to the South of France, plus a week of incredibly stimulating company, I was tasked to not only give the thinking behind it, but also think through the likely consequences. The abstract for my contribution to the resultant book read as follows:

"Most of the basic skills needed over the next hundred years can be predicted with reasonable certainty but many of the precise trades and professions cannot. "Age related careers" is an employment strategy which can handle such uncertainty. Fundamental changes to the education system are necessary. Information Technology makes these possible at affordable cost. Encouragement and favourable publicity are more effective weapons of persuasion than coercion."

The cartoon, with which I was presented, relates to my comments, (not all recorded for posterity in either the book or the separately published political version, available on-line courtesy of Blogzilla), on the need to give average teachers the confidence to become coaches, using the new technology to help their pupils acquire skills and understanding which they did not themselves have. In other words, on the need to give priority to the "leading out" roots of education, as opposed to passing on the skills and mores of previous generations - as per the wikipaedia definition (which accurately described, then as now, the mainstream).   

The report of the House of Lords Enquiry indicates very clearly how little progress we have made in meeting that challenge. On March 12th the Real Time Club (45 years young and still reinventing itself), hosted in Houe of Lords by a member of the enquiry team, will hear from those who appear to have found out how to make a profitable and fast growing business from doing so. I look forward to hearing whether I believe their solution. My own experience in the 1980s, with organising IT awareness courses for older generations (including taking apart Apple Computers to insert graphics boards to play silly games and do basic coding, prior to playing global corporate politics over a pastiche teleconferencing network), indicates that it should be possible do so today at much lower cost than we used to charge the main boards of the companies we were helping prepare for difficult discussions on IT policy.
 
Yesterday I took the opportunity to take another look at "Cashing in on the Chips" published in 1979 (containing the original call for a Micros in Schools programme), the New Scientist review of "No End of Jobs" (*) published in 1984 and my own submission to the House of Lords Enquiry.

So how do YOU, "dear reader" help us all to break out from Goundhog day and deliver the aspirations in the House of Lords report?

1) Respond to the Ofcom Draft Annual Plan for 2015/16 by 6pm on 26th February

As I said in my previous blog, the good news is that this is first time Ofcom has indicated that it is planning to take the needs of business users (particularly SMEs who cannot afford lesed lines) seriously [see page 26 of the Draft Plan for details).

Ofcom is also planning to take a good look at fixed and mobile Not Spots (see page 32).

The plans for work on Online Child Safety are interesting (see Page 35 ) but the critical path is Age Verification. Here the Digital Policy Alliance appears to have already made good progress in assembling a team that will lead the drive for practical and credible answers - because the participants need them for marketing and moral, as well as regulatory, reasons.

Page 43 refers obliquely to the need for more work on performance measures, not just quality of service but even more interesting is the reference in the section on "Protecting onsumers from harm" (starting page 44) on the need to work with groups like the Internet Engineering Task Force on removing the vulnerabilities that enable spoofing.   

I also recommend reading the rest of the "Protecting Consumers from harm" and thinking not only how Ofcom could and should and should address the issues it raises but the roles of others in doing so. 

2) Take a look at the House of Lords report, consider how the recommendations might be implemented, then consider how you think they should be and what youc can do to help. 

There is a lot of worthy comment and generic material in the report, but when it comes to action on skills the devil is in the detail, usually in the funding and incentive mechanisms, including the performance measures and league tables used reward and recognise those meeting centrally set objectives (with which the report is peppered).

I have said (above) why those of you who are interested in remotivating staff (or teachers) for the Digital Age should try to attend the next meeting of the Real Time Club and then consider just how much (or little) this should cost using the the technologies and techniques now available - although there may still be places available for those of you near Huddersfield to get a view from the grass roots this Wednesday at the presentation of the survey on the results of the first Digichampz exercise.
 
I personally think  that by far the most important recommendation in the House of Lords report is that the Tech Partnership be tasked to lead an employer-driven review of the offers of the Further Education sector with a view to improving the apprenticeship packages on offer (Parag 314 onwards). The weakness of this recommendation is that a growing number of apprenticeships are graduate and post graduate level, linked to the High Education sector. The review should therefore encompass the actions listed in the following paragraphs on High Educations and Careers Guidance, albeit not necessarily inside the first six months

There is a lot in the report on Women in Technology and on Cybersecurity (page 36 onwards). I have commented in the past, albeit mainly en passant, on why you should employ women rather than men if you are serious about information security. I plan to return to this theme in my next blog.
     
3) If you are actively in trying to get socially and geographically inclusive Broadband to those in your Parliamentary Constituency ask your MP if he can get you an invitation,on his or her say so, to the event on "Broadband for ALL" being planning by the All Party Space Group and Digital Policy Alliance, in the House of Commons on the afternoon of 10th March. The aim is to cover the current state of play with regard to the availablity of the full range of technologies - from fibre, wifi and mobile (for social housing and inner city commercial centres) to satellite (for hill farms, rural businesses and disaster recovery - e.g. fire or flood taking out terrestrial networks). Advance notices have been sent to DPA members but the details are not yet on the website because some of the industry speakers have yet to be confirmed. 

(*) Unfortunately "No End of Jobs" is not itself on-line (I have just paid ten times the original price for a copy to supply to anyone willing to scan or digitise it). Interestingly what looked to New Scientist to be the "silliest predictions" might already have come true - but for the failure to compete "the recabling of Britain" by 2002. That was, of course, Government policy until 1997 and the introduction of Local Loop unbundling to save US bondholders, who then owned NTL and Telewest, "from taking a haircut" with a distress sale to Sky

P.S.  Now received a copy of "No End of Jobs" via Amazon and made time to scan the first page. Remember it was written in 1984, so for Japan read China. For West Germany read India. What has changed since: apart from importing immigrants to look after our elderly in overcrowded NHS hospitals, instead of making use of technology to enable them to live at home. One of the theme was the job creation effects of "Prolonged active life": enabling clinicians to spend time with patients instead of on paperwork and deploying "robotics for rheumatics" as well as all the telecare and telemedicine technologies that we are still talking about but not deploying and enabling. 

No end of Jobs Intro.jpg
   




I recently signed up to the HMRC advisory service and this morning received the e-mail below. Being a trusting individual I did NOT click on anything. Instead I visited the HMRC site on how to check whether a communication from them is genuine. I was none the wiser. However, being both paranoid and interested, I tried to find another way of getting the details. Eventually I found my way in via the "Business is Great" website although the Broadband Voucher scheme is not among those promoted on the home page.

I still do not now whether the original e-mail from HMRC was genuine but, it if was, I deduce that HMRC is more concerned to help SMEs get good broadband access than Gov.UK is concerned to promote either good security practice or the voucher scheme.

Rant over. This is a great scheme. It needs to be extended so that every rural business stuck with crapband (not just those in Wales) can use it to pay for a satellite service. Meanwhile inner city businesses in the areas covered should use it to apply for for a fibre connection: there is a routine for vouchers to be collated by alternative suppliers if BT or Virgin will not offer you anything other than a prohibitively expensive leased line. Those in areas that are not yet covered, where businesses are stuck with a choice between crapband and expensive leased lines, should be contacting their constituency MP and parliamentary candidates to lobby either for access or to work to make it easier for alternative suppliers to compete to meet your needs.

But be warned, the budget is fixed and its first come first served. We also need to get action on opening up the supply of business broadband to all. I therfore take this opportunity to remind you that the deadline for the consultation on the Ofcom Draft Annual Plan is next Thursday. The good news is that Ofcom has finally guiven priority to looking at the business broadband. There is much to do and you have to get into the appendices, with references to the work of the IETF on inter-operability standards, to realise that Ofcom is now serious about looking at UK telecoms in global context.

Meanwhile, if you are among those stuck with crapband - do take a look at the voucher scheme. If you are not covered, take a look at how many others, locally, are in the same position. If there are enough of you, one of the new generation of the alternative network providers (see the list of those participating in the scheme) might be able to serve you at an attractive cost anyway.   

Spacer Graphic

HM Revenue and CustomsSpacer Graphic

Bookmark and Share

Hello Employer,

Connection Vouchers


We've got up to £3,000 for you to upgrade your business's broadband - it's up to you to apply for it.

Find out now if you are eligible for up to £3,000 to cover the installation costs of upgrading to a faster and more reliable connection for your business. You could get a fibre optic, cable or wireless broadband connection among other options.  Most businesses pay nothing but VAT and their standard monthly charges.

Thousands of businesses in the 22 Super Connected Cities Programme are already benefitting from the scheme.  By upgrading, you could:

  • Do things faster - increase your business's productivity,
  • Improve customer service,
  • Access new markets using video conferencing.

Please visit our website to find out if you are eligible and choose from a number of pre-defined options.

To check if you are eligible for a Growth Voucher with a grant of up to £2,000 towards the cost of expert advice, apply here. To see the full offer of government support for small businesses, click here.


Will Government Verify survive the impending cybersecurity skills crisis?

| No Comments | No TrackBacks
| More
Few outside the community of those obsessed with digital identity will keep up to date with postings and comments on  the Gov.UK Identity Assurance Blog  but a regular reader recently drew my attention to a recent posting, on "User research - asking better questions"   .  He asked why they were relying on feedback from current trials and had not looked at the market research conducted by others, such as Experian - although he did not say which research they should have looked at.
I
 found his question interesting.  My work with the Tech Partnership (formerly e-Skills) on the training modules needed to help organsiations survive the impending cybersecurity skills crisis is largely focussed on identity and access management: IAM.  

The skills involved in IAM range from "authenticating and authorising transactions over smart phones", through "bring your own device" to "multi-level access and authorisation in complex organisations with large numbers of customers, contractors and staff with different permissions in different locations" (e.g. airports or global banks).  A cross-cutting issue is the vetting and monitoring of those to be given which access permissions. The processes are complicated by regulatory issues (including data protection), with compliance officers themselves a significant point of weakness, because so many are in post for 18 months or less.

Most discussion of IAM is focussed on the digital components but workable systems are nearly always underpinned by rigorous people processes - except when the organisation is confident that it will not be put a significant risk from insider assisted fraud or unauthorised physical access to safety critical or secure facilities.  Where that risk is significant the systems always embed inputs from those who have done physical checks as to the identify of those to whom they have have given electronic credentials.

I am therefore unconvinced that any identity based purely on digital footprint (whether or not it includes on-line financial records) merits my trust, let alone that of those looking after my savings or of the critical national infrastructure. I am therefore not impressed by requests to provide feedback over the precise wording of a requirement to make personal financial information available in order to obtain a digital identity that is more acceptable to government that those it currently requires us to use to pay our taxes or claim benefits.

One of the problems with the original attempt to require farmers to use "Verify" for inter-actions with the Rural Payment  Agency  was the belated discovery that nearly 20% have no digital footprint - or at least no footprint discernible to the identity providers.  More-over those who have never had to borrow money and have always paid cash see no reason to provide their financial information so some-one with whom they have had no previous dealings for unknown transmission and storage. That is not to say they are digitally illiterate. They may well use mobile or satellite services to keep abreast of prices for livestock or crop or to access on-line auction sites  but because of not-spots and crapband*  have to do so from wherever they can get a signal or via their own choice of trusted  intermediaries. They are also often well aware of the risk of fraud and impersonation.

Now let us look at those most reliant on public services, including those stuck on sink estates or transient between bedsits or caravan sites, including those who share their identities which whichever member of their "extended family" they trust to  collect their benefits and do their shopping.  Hence my expectation of an all-party backlash against the "digital by default" agenda because there is a very big difference  between using technology support to provide better services at lower cost and "herding the sheep on-line to be fleeced" .   .

I am particularly concerned at the potential risk of those dependent on benefits having their identities registered on-line by fraudsters and their being unaware until left destitute.

More recently I was struck by the findings of the Digichampz Survey  conducted under an EU contract by the Digital Policy Alliance for presentation in Huddersfield  and a month later in London.

This survey is unusual in that it is based on a high response from on-line users in a poorly served (connectivity, let alone support) rural community. I do recommend looking at the actual report not just the headlines. Despite the editors comment  security and child protection were of low concern compared to getting a reliable connection at all, around half the respondents were concerned about security and a third about on-line child safety.

Now back to "Verify" - if I ever get round to applying for an identity, because I am forced to in order to (for example) do my VAT or tax returns, I will probably use the Experian service - but to call this a "digital by default" service would be a misnomer. Experian will be comparing what it is told on-line with what it has collected on me over several decades from those who would not serve me in a department store or mobile phone shop until I had signed a form permitting me to check with Experian as well as giving other proof of identity.

That is not, however, possible for a couple of my "legal" identities (as a trustee or director) because the organisations concerned have never had reason to borrow or purchase anything on credit.  I therefore expect those selling to them to require me to use a variety of rather more secure IAM systems, including those that are global and do not reply on local political agendas. I have no problem with this - provided their services are securely firewalled from each other, with my liabilities governed  by UK consumer credit  and unfair contracts legislation.

But this links back to the current cyber security skills crisis. Those selling to me have to manage and insure their risks, integrating the various IAM systems  already on the market in support of their people processes, from physical access to customer and transaction authorisation (both on-line and off-line).  I do not yet see the business case for them to regard "Verify" as anything more than an interesting experiment.   

P.S. The issues get even  more interesting when we consider controlling access to the systems controlling smart cities and those along supply chains.  There is still remarkably little attention to this area so I was delighted to learn of an event being organised at the Institute of Chartered Accountants on 25th March   


  *Crapband = "Copper, Rust And other Pollutants" between the fibre (cabinet or exchange) and the premises (home, workshop, office etc.) or the wireless aerial (for mobile or wifi connectivity).  







Is VATMOSS a serious VATmess or a storm in a teacup, whipped up by current and would-be tax avoiders.

| No Comments | No TrackBacks
| More
I have received a number of e-mails asking me to blog on the issues or "do something", but none from those actually engaged in running the businesses supposedly affected. More-over, all the lobbying appears to be behind closed doors. The guidance on Gov.Uk indicates  that those who are already registered for VAT and use a payment service need do very little. That from the FSB  reinforces this message.

Is it correct, however, that even micro-businesses which use the same "legal identity" for sales of on-line products and services in the UK as for overseas, will now have to register and charge VAT to their domestic customers, thus putting prices up by 20%?

If so, will this lead to halting off-shore sales, a flight off-shore or guidance from the suppliers of accounting and payment services on how to legally and cheaply split the business?
 
In other words, is this attempt to reduce VAT avoidance a serious obstacle to the UK future as a location for innovative on-line start-ups or will it simply lead to more work for tax advisors and a rash of competing "VAT apps" for teenagers (and sub-teenagers) aspiring to sell their own games instead of pirating those of others?

I have no idea - hence the question?


The Future of Technology

| No Comments | No TrackBacks
| More
20150214 The future of technology.png

Acknowledgements to SWardley - although I changed item 18 to read "XYZ, its so passe and never really worked anyway. ABC is where its at - and ours is great". 

I would, however, also comment on the timescale.

When my team at the NCC Microsystems Centre  invented and defined the term "vapourware" (back in 1983), I had in mind a timescale of barely five years from birth to death of most "buzzword technologies".

Despite the efforts of US copyright and patent trolls to slow the pace of innovation, I think that 35 years is a bit long for the life cycle of a terminology.

P.S. I have just done some "research".

The pace of change in the early 1980s with regard to micro-computer products was unusually rapid and the life cycles of even market leaders were much shorter (e.g. the raise and fall of Visicalc ,Concurrent CPM and the Amstrad PCW) than today.

Taking a longer view, it took about a decade for the term "Agile" to replace the acronym DSDM which, in turn, had taken about a decade to replace RAD (Rapid Application development), which was a reinvention of approach behind Filetab (alias RPG, alias FPL etc.).

Filetab did indeed last 35 years before the name finally vanished from the market - with the Java version, to handle applications inter-operability within mobile phones, hidden from view.

Meanwhile Windows and Word are both approaching their 35th birthdays.

I therefore thank Mr Wardley for his insight and leave readers to ponder for themselves what determines the life cycle of the products, services, technologies (and terminologies) of today.

Is it

- entrepreneurs finding new ways to meet user needs?
- investment in research and development? public or private?
-,government supported technology (and transfer) programmes?
- corporate spend on IPR lawyers? 
- ???



January usually sees a sharp rise in recruitment effort across the financial services industry, to replace those leaving at year end or who hand in their notice after the Christmas break. This year recruitment effort is down because of the uncertainties caused by the crash in oil prices and the expected cost to the EU of preventing Grexit. Except for risk and compliance staff - where staff turnover continues to spiral upwards as supply falls ever further behind demand. According to Alex on 9th February (that most authoritative of sources on CIty developments) there are now 17,000 compliance officers getting in the way of doing business.  
Those who have not yet taken action to secure their staff must therefore do something different - now .  GCHQ has shown the way by announcing 50 cybersecurity apprenticeships   for school leavers applying by 15th March. Meanwhile the Tech Partnership cybersecurity internship programme  has had an impressive take-up. E-mail Howard Skidmore if you wish to bid for some of those not yet matched (believed to be less than 20) or to offer placements for the next intake.

The rest of you also have to consider who you will trust to retrain your existing staff, including users, to handle those roles which you cannot afford to contract to those you do not know.
Before Christmas I blogged on the expectation that 2015 will be the year of the compliance created collapse in cyberconfidence .
 
Over 60% of significant security incidents (data breaches, fraud, network collapse etc.) involve insiders, albeit digititis (e.g. mistakes with maintaining legacy systems overlaid with fashionable vapourware) and ignorance (linked to equally vulnerable identity and access control processes) remains a more common cause than malice or criminal behaviour.

Debate on how to improve the security of businesses or their customers is almost entirely driven by those selling technology or outsource services and processes to help tick compliance boxes. But the travelling compliance "expert", who stays long enough to help you tick the latest regulatory boxes and collect the understanding and credentials to open the trapdoors in your security firewalls, is now by far the biggest single risk. He, it is usually a "he", is an even greater (and more unnecessary) risk than short stay security "consultants", help desk staff or cleaners. Albeit the "over-ambitious chief executive" who ditches due diligence in his (it is nearly always a he) dash for growth remains a greater absolute danger.

I recollect conversations with those then in charge of "risk" at BP when they came to try to audit safety and security systems along the supply chains of the organisations they had acquired in the US as the basis for their entry into the Gulf of Mexico.  Their worst fears came true with the incident which came close to destroying the entire business while enriching a whole generation of Southern lawyers. I recollect similar conversations after the Chief Executive of RBS cut short due diligence with regard to his US acquisitions, before embarking on the take-over too far which did destroy the business.

Due diligence along the security (including risk and resilience) supply chains of organisations being considered for take-over is now big business for the law and audit practices of the City of London and their demand for the skills necessary is helping fuel the current salary spiral and staff merry-go-round which threaten to destroy the security of those who cannot ensure the loyalty of those who manage risk on their behalf.     

A couple of weeks ago  I thoroughly enjoyed an evening with the Management Consultants Livery Company  when I helped open a discussion of the impact of "Big Data" (which I view as a subset of the current state of "Management Science") on the Management Consultancy profession. I was interested to learn that the market leaders all have a very strong focus on training their own staff, rather than outside recruitment, even though they expect to lose more half with 2 - 3 years. The following morning I attended an excellent NED Forum  on the current state of the Dark Market and the analysis and intelligence services now available. I was interested to learn that, once again, the market leaders train their own analysts because the necessary Information Science disciplines are missing among the many recruits available from law enforcement or the military.

It is perhaps as well to remember that the cryptography operations of Bletchley Park were quite small compared to the Sigint (alias data analytics, or "Information Science") operations which also maintained the symbiotic German Order of Battle (even down to the level of working out that two radio operators shared a girlfriend called Rosa) . The Sigint operation was entirely female and some of the techniques used have not yet been declassified - because they underlie that which even Snowden did not discover and leak.   

Hence the importance of ensuring that update training in Management Science, alias the disciplines behind "Big Data" is available, when and where needed, to give existing security staff the skills they need to help organise intelligence-led security. It also makes good sense to trawl existing user staff, particularly female staff, for the necessary aptitudes before going outside for new recruits. When I ran the original Women into IT Campaign (1988 - 92) one of the surprises (at least to me) was the discovery that, on average, women stayed significantly longer than men, especially if offered flexible working conditions and other support to cope with family responsibilities (including elderly relatives, not just children).

Most compliance roles do not need cryptographic aptitudes or big data training but, if the exercise is to be more than just ticking the regulatory boxes, they do need an understanding of  the business so as to ensure the compliance routines reinforce good customer service and do not get in the way of profitable business. The current demand for compliance staff and the rate of turnover among those who have no good reason for loyalty, means that is often both cheaper and quicker to retrain long stay user staff, particularly those who might otherwise become expensively redundant, than to recruit externally. The exercise also gives an opportunity to screen for those who might be brought into the main security team to help supervise those to whom those technical operations and support operations which do not need to be in-house are contracted.

But who do you trust to deliver that training? This is not a trivial question of "competence".

Trainers, like compliance officers, can make trusted contacts across your Chinese walls. I have therefore agreed to help the Tech Partnership  identify those who are trusted to deliver training in other sensitive areas so that they can be asked if they are interested in helping specify and deliver modular update training in some of the areas identified as being in critical shortage, such as Identity and Access management (from customer mobiles and bring your own device to tiered access to complex systems and multiple locations, such as a global financial institution or an international airport) or the use of big data  (alias management science) techniques to identify risk. Then there as the skills needed by compliance staff, the selection and training of whom should also be used to identify your next generation of security staff. I gave a longer list last year of the skills gaps based on my work for e-Skills, but we have prioritised since.

Once again, email Howard Skidmore, or myself, if you are willing to suggest who you would trust. Comments on who you would not trust are  also most helpful.


Turning the Super Tanker: Francis Maude's achievements to date - but its not over yet.

| No Comments | No TrackBacks
| More
Francis Maude has announced that he is not standing again at the next election but, commenting on his work with the Chancellor to drive forward the reform of public service delivery, said "there is much to do - before the election and after - to ensure the reforms are irreversible". When he gave thanks to his team at Sprint 15 he concluded with some thoughts on the scale of the challenges ahead particularly that of changing the Civil Service culture to one of  "fail small, fail fast" so as to do a much better job of using evolving technologies:

"- To put people first, with services that are simpler, clearer, faster.

- To do more, and better, for less. And we've shown you can do it.

- To build a truly 21st century digital government, capable of leading a world-beating digital economy".


We can see how difficult that change will be with the strictures of the Public Accounts Committee on a Secretary of State who over-ruled his officials' plans to follow the traditional approach of "fail big and expensive, but alibi'ed by massive consultancy and outsource spend so that we are not to blame". At least the DWP officials and suppliers wasted a couple of £billion less than their counterparts in the NHS (Tony Blair's National Plan for IT in the Health Service), before the Minister finally forced them to take seriously his "request" (Minister's cannot easily over-rule their officials on matters of implementation) to pilot the new processes with real claimants before scaling them up for mass roll-out.  

After reading Francis Maude's blog to Digital Leaders, "Leading Transition in a Digital Age", I thought back to his comments at the Conservative Party Conference in 2009 on his plans for their first 100 days. The largest room in the conference hotel was standing room only, Afterwards the responses ranged from the enthusiastic to the sceptical. Those from the policy wonks and industry lobbyists were rather different to those of IT professionals and of current and former public servants with decades of experience trying to bring about change. Most of us have since been shown to be both right and wrong.

We will never know what would have happened had the Conservatives had a working majority, but what Francis Maude has achieved under a coalition government is remarkable. The end of his first sentence in the Digital Leaders blog is, however, absolutely accurate: "we are just getting going".    

There are two views about what "leaders" (corporate or political) should do their first "hundred days". One (usually corporate) view is that you spend it quietly on tours of inspection, discovering just what it is that you have inherited, who is competent and willing to help you change it and who should be removed before they can stop you and your allies. The next hundred days is when you get rid of the third of those reporting to you who will never be part of any solution - and set about motivating the remainder to do the same to the tier below them. The opposite (usually political) view is that you have to prepare in advance and hit the ground running, because you will never have the same opportunity again.

Unfortunately politicians rarely have a choice. "History shows" that those who try the first option nearly always get bogged down with day-to-day pressures and achieve little if anything. The situation that the coalition government inherited in 2010 gave them no choice. 25 years of "over-enthusiastic outsourcing", to put it mildly, meant that central government was bleeding to death and had lost the skills to stop the haemorrhaging. It had ceased to be competent either to plan and deliver change itself or to get results, let alone value for money, from those it contracted to do so. 

The task was not just to turn the Exxon Valdez (undermanned, with the captain drunk in his bunk and the radar broken) before it hit Bligh Reef. It was not just to refit the bridge with controls that were fit for purpose. It to simultaneously support the conversion of a 20th century oil tanker into a 21st century cruise liner to serve an ageing population, with the owners  mortgaged to the hilt, while the potential passengers had not saved enough to pay their fares, let alone in advance.

Looking back, we can see that in his first hundred days Frances Maude set in motion processes that have helped slowed the rate of bleeding, (the burden of inherited, inflexible outsourcing contracts and PFI deals means that it has not yet stopped) and enabled monitoring and control systems that may soon be fit purpose. The savings to date are, however, still modest compared with the £billions now in sight: for example from pooling public sector telecommunications spend to enable better, shared, services at lower cost. Hence the importance of the mapping exercise to which Fracnes Maude referred in his Sprint15 speach: the first visible product from the Digital Task Force created last year.

The achievements of the GDS to date are impressive, particularly given the start point, but in his comments to Sprint15, Fancis Maude was quite clear on the scale and nature of the task still ahead - including to help achieve the £10 billion of savings targetted in December.

Provided the next government continues the process. I believe history will show that, even if he does not himself continue the task from the House of Lords, Francis Maude has not only managed to slow the tanker in time to enable refloating without too much spillage, but has also succeeded in beginning the long slow process of rebuilding the skills base of the Civil Service - so that it can indeed implement the changes necessary, provided the political driving force remains in place   

We should not, however, under-estimate the level and nature of ongoing  opposition to the introduction of  adequate (let alone good) practice and governance to a world of revolving doors between retiring civil servants and suppliers who have grown fat from selling consultant-planned "big" change programmes to their departments. The latter "know" how things should be done.  Their "vision" does not, for example, involve the mandatory use of procurement frameworks which require adherance to the open inter-operability standards. These are, however, essential for a world in which innovative small firms and co-operatives of users are expected to produce the pieces for incremental "jigsaw solutions" that can and will evolve, using agile methodologies and changing components from changing players, as needs and technologies change.

Many, both officials and suppliers, would still prefer to delay change in the hope that the post election government will revert to the traditional spendthrift approach, mortgaging the future even further, if they cannot raise the net tax yield. Their careers, including post-retirement life styles, depend on preventing a world of incremental and evolutionary change. Their interests are mirrored by all those consultants, lawyers and lobbyists who are used to receiving big fees for big projects, whether they go right or wrong. The future for the rest of us and our children and grandchildren will be bleak if they succeed.

The good news is that at least some of the big beasts of the IT world, including some surprising names, are beginning to really get their heads round how to make serious money from supporting customers' in-house teams and collectives of innovative SMEs and third-sector players in the delivery of solutions that use open, inter-operable, cloud-based, software-as-a-software to deliver better service, at lower cost, more reliably, on positive cash flow, The bad news is that they are still a minority.    

I hope that, freed of the need for fight a seat in the next election, Francis Maude will help ensure progress with what he has set in train right up until the election day and then return, perhaps via the House of Lords, to continue the fight - having found a suitable successor to look after the voters of Horsham and answer parliamentary questions.   

Westminster reports and debates on Rural Broadband, meanwhile its quicker by bike less than a mile away

| No Comments | No TrackBacks
| More
The DEFRA Select Committee report on "Rural Broadband and Digital Only Services" was published on Tuesday. Yesterday 18 backbench MPs, almost all Conservatives from Rural Consituencies, contributed to a debate on "Rural Phone and Broadband Connectivity". More would have participated, had it not run out of time. Those unable to speak included a London Labour MP who released her comments to the Evening Standard pointing out it was quicker to send a short advertising video from Soho to Covent Garden by bicycle. Meanwhile the defensive alliance of incumbents  (BT, Deutsche Telecom and France Telecom) announced today is designed to enable infrastructure sharing, rather than addiitonal spend. 

I will stop there because I am just about to leave for a meeting hosted by Westminster Council bringing together local property owners (both public and private sector) and network operators to discuss practical co-operation in organising shared wayleaves and access agreements to cut the time and cost of addressing Inner City notspots and better serve small business and social housing complexes and well as some surprisingly affluent areas that are currently served by crapband (CRAP = copper, rust, alluminium and other pollutants, including radio noise if it is a wireless connection, between you and the nearest fibre connection).     

I am getting bored with those who "admire" problems and find excuses for delay while they milk past investments. I am more interested in helping those looking for ways to work together to meet unsatisfied demand at affordable cost.

The participation in the debate yesterday and the points made (do read Hansard), as well as those made recently by the National Audit Office and Public Accounts Committee, to which I referred in my previous blog , indicate that this topic will feature in quite a number of local campaigns in the General Election. Those interested in helping refine and review the Conservative Technology Forum "F-Plan" can use the e-mail address given on the CTF Web Site page covering the Digital Infrastructure Study  to contact me. I am also happy to share material with those interested in helping Labour, LibDems or UKIP to produce policy in this area because views on the actions needed do not appear to split along party lines.   






In December 2014 the House of Commons Library producing a briefing for MPs which showed the current state of broadband availability by constituency  and in January 2015 the National Audit Office produced an update report  to aid the recent Public Account Committee review. Meanwhile the draft Ofcom Annual Plan  indicates that the new regime (with Dame Patricia Hodgson as Chairman and Sharon White as CEO) is likely to take a rather more robust approach to measuring broadband performance (in every sense of the word) and competition, particularly with regard to services to business (large and small, urban as well as rural).

According to the analyses at the back of the House of Commons Briefing "superfast", i.e. over 30 mbps, is available to only 31% of properties in the Cities of London and Westminster (putting the constituency 591st) while 32% have it in West Dorset (587th). BT has told Westminster Council and the Corporation of London that this is because Central London is "uneconomic" because of the high proportion of business properties. Hence the widespread welcome for the news that Ofcom is finally going to investigate the way that BT is protecting its shrinking revenues from business, including public sector users 
 
I am grateful to Patrick Cosgrave for drawing my attention to the comments of Richard Bacon (Con. Norfolk South and Vice Chairman of Public Accounts Committee) during their recent hearing on Rural Broadband : "You've [i.e. BDUK] got £1.7 bn to spend and your cost benefit ratio is 20. HS2 has £42.6bn (in fact more as this figure excludes the rolling stock) but its cost benefit ratio is only somewhere between 1.75 and 2 . Your cost benefit ratio is 10 times more yet HS2 is getting 25 times more money. When I asked Philip Rutman, Permanent Secretary for  the Department of Transport,  if they'd considered putting broadband everywhere (admittedly I had to ask him eight times) he finally said No, they hadn't. The fact is they've got 25 times more money but your cbr is 10 times more than theirs. This is a policy issue and shouldn't you [BDUK] be doing a better job negotiating more money from the Treasury?"
 
In his newsletter on Shropshire Broadband, Patrick summarisef the following discussion as "Sue Owen of BDUK then agreed that this would be a topic of discussion in advance of the March budget. BDUK's CEO, Chris Townsend, sitting beside her, smiled wryly at this but did not comment. As he had described with some enthusiasm earlier in the meeting that the solution for excluded rural areas will be satellite broadband, perhaps it should be a focus of broadband campaigns across the country to make it an election issue to press for a better deal now that this outcome is likely, and the comparison of pound for pound benefits between two major infrastructure projects is known."  I am also grateful to Patrick for his summary of the other points made during the discussion and for drawing my attention to a review by Mark Jackson which put the discussions into context - making this blog much easier.

Patrick was disappointed at the news that satellite provision is likely to be the method of meeting the 2 Mb guarantee by the end of 2015. Given the availability of deals like that between the NFU and Avonline for 15 - 22 mbps to farmers I happen to belive that was a sensible and long overdue decision. I am told, however, that there are now issues, however, with regard to service in areas where demand for satellite services threatens to exceed current capacity. The implication appears to be that this should be reserved for areas where there is no realistic alternative. I hope that the meeting being planned for later this month by the Digital Policy Alliance and All-Party Space Committee will provide an opportunity to brief those MPs and candidates for whom this topic is important - including on the need to support investment in increased satellite capacity.
 
Patrick's summary of the other issues addressed during the PAC meeting included:    
*    large numbers of rural pockets completely left out
*    rural small businesses largely by-passed
*    all farmers having to be online by April this year
*    alleged cherry-picking by BT of areas that are most profitable for them
*    upload speeds rather neglected
*    allegations that BT is by-passing rural industrial estates because leased lines are more profitable.
*    still no competition in Phase 2 contracting despite assurances from BDUK last January that this would not be the case
*    BT not prepared to disclose all costs local authorities  not permitted by BT's gagging clauses to compare costs
*    BT not overcharging so much for cost of green cabinets in Phase 2 (at least some good news) and £92m of savings have been identified to plough back into projects
*    no real potential for BT to work working in partnership with alternative providers to create tailored solutions
*    BDUK can provide PAC details of exactly who will not be upgraded (we will pursue this via an FOI if necessary)
*    how/why did BDUK let BT get away with all this in the first place, leaving local authorities at the mercy of BT's immensely superior commercial acumen?
*    is BT abusing its monopoly situation?

Patrick was particularly interested by the question of how many so-called "upgraded" premises will actually benefit from superfast (24 Mb+) broadband?  The BT representative couldn't provide that figure, but said he would take the question away with him and get back to the chair.

I am personally interested by the how the estimates of the cost of national broadband rollout keep rising while the cost of building and upgrading networks to serve specifc communities falls month on month - as competition grows from players using internet age technologies and architectures. Before criticising the original BDUK/BT cost estimates we should remember they were based on extending a network that was planned in the 1980s to bring broadcast quality video to the home by 2002 - before the changes in communications technology brought about with the rise of the mass market internet. Those changes are now accellerating as we move into a world where everything is inter-connected

Today the largest component in network upgrade costs appears to be wayleave and access charges, followed by management overheads. Even civil engineering costs come a poor third.  Hence my immediate focus on bringing property owners and network operators together to test the practicality of agreeing win-win shared solutions to take 80% (and sometime even more) out of the cost of addressing not spots. This week we have the first meeting of what I hope will develop into a neutral umbrella for co-operation wherever players are more concerned with getting a share of the revenues from economic growth and job creation than defending past the business models of the past. We know the problems we will face. Hence the strategy of beginning with those who stand to gain most from success, whether or not others choose to join or copy them. I have asked the Digital Policy Alliance to provide a neutral umbrella. Those wishing to participate who have not already received an invitation should join the DPA and state that this is one of their priority areas. My own contributation on via DPA advisory board is uncharged but I cannot ask them to do work which is not supported by paying members who want to achieve practical results,     
 

Will Companies' House liability for damages help trigger a more realistic approach to identity governance?

| No Comments | No TrackBacks
| More
We have much debate about information security and data protection but far more harm is caused because accurate information is not available when and where it is needed. The Cabinet Office "liability avoidance" approach to identity and authorisation policy has long been driven by the need to address long standing quality problems, the proportion of department or agency records containing serious errors with regard to individuals or businesses often in the range 10 - 25%. Now, at long last, the reason has been made public.

Public debate regarding legal, incluidng corporate, identities has been complicated by a long-running (four years to the recent High Court judgement) case in which Companies House was being sued for having destroyed a healthy, century old family business, by promulgating a simple data error. The game is not yet over. There may yet be an appeal. The issue of "Crown Immunity", inherent in the various EU Roman-Law based, Directives and Regulations concerning identity and data protection and sharing, will hopefully come into play - in the year of the 850th Anniversary of Magna Carta. The "immunity" of the "Data Barons" should also, however, come into play if we wish to avoid a "Peasants' Revolt" as our current intellectual property regime loses public support and becomes unenforcable..  

Hence the importance of the issues raised in my last blog when I suggested a need to bring the UK information governance regime (both public and private) under proper judicial oversight. That means accuracy and availability, not "just" surveillance and security. Most of the debate over the governance of medical records (for example) is to do with privacy but we should not forget far more practical harm is caused by coding errors that can destroy lives and careers, whether or not the patient survives the failure to provide accurate information to clinicians when and where it is need.   

The debate over "big" and "open" data, including liability for mis-use and error is, hopefully, about to take a new and more realistic turn, away from mythology, technology and the business models of those refining our digital footprints and associated misinformation and cybercrud into "the new oil".

In the 850th year of Magna Carta we need to address the duties that the Data Barons, as well as the State, owe to the rest of us with regard to their use of our personal data, especially when they broadcast errors that can destroy lives and businesses, as Companies House did when they confused Taylor and Son Ltd with Taylor and Sons Ltd when supplying insolvency data to the credit reference agencies. In looking at the significance of this case we need to remember that the services of the credit refernce companies are not only used to underpin and approve on-line business to business and business to consumer transactions. They are also used to help "authenticate" the on-line identities used whenever more than about $100 dollars is at risk. Given that the use of such services is central to the approach behind the Government Verify programme, the issues also go to the heart of the Modernising Government Agenda - with all the implications for social inclusion (and the 20 - 30% of the population without a credible digital footprint or credit profile).  

On the 9th February Computer Weekly is partnering the BCS and Tech UK in a "Big Digital Debate" . Given the growing public distrust of all things digital, I do hope that some-one, perhaps the chairman (over to you Bryan) will ask the speakers for their views on whether the Data Barons (from Amazon through Google to Yahoo and Zoopla) should take a greater legal responsibility to us all, if they wish to be able to enforce their related digital intellectual property rights. Similarly, should not "The Crown" (alias Whitehall) take explicit responsibility for the use of our information by its agencies and contractors if it expects us to deal with it on-line?

I deliberately pick content-related IPR enforcement as being the only part of a 21st Century Peasants Revolt that would scare the Data Barons of Today. All other sanctions are broken or worthless in an inter-connected world.  "The Crown" is, of course, more vulnerable to public opinion - at least for the next hundred days.          

How do we ensure that our responses to the Charlie Hebdo murders do not dishnour the 800th Anniversary of Magna Carta?

| No Comments | No TrackBacks
| More

The would-be killers of Charlie Hebdo (click here for some of the cartons from the resurrection)
are in danger of achieving their objectives:

•    an unprecedented  propaganda coup (for such a tiny, ill-funded group), 
•    glorious martyrdom, (gunned down in a hail of bullets) and
•    a display of global hypocrisy  leading to an exploitation of groupthink to justify a massive diversion of resources into expensive and ineffective displacement activities   that could  cripple the "real" enemy of the violent extremism  -  freedom of thought and expression.

I was troubled by calls for global "solidarity" under the banner "Je Suis Charlie". I was rather more impressed by the thinking behind  "Je ne suis pas Charlie: Je suis Ahmed
 
How do we "exile", or at least expose and isolate the heretics  (of all religious strands) who genuinely believe they have a right (or even duty) to kill in the name of their selective interpretation of the word of God. Hence the reason for my Christmas Blog on The Amman Message .  The hollowness of UK claims to be serious about "the war against terror" is exposed by the failure to insist that such a  uniquely authoritative collective message  is used by Ofsted as one of the yardsticks for reviewing  the content of muslim religious education in UK schools. 

I have also been long concerned by the shallowness of debate about the meaning of the "Freedom of the Internet".  At School and University I was taught that "Freedom" is not an abstract. It has to be put into context: freedom from hunger, freedom from fear etc.  In the on-line world we need to balance the "right" to free speech against freedom from the fear of trolling and abuse.   We also need to give users genuine choice, not just the Hobson's choice offered by the cartel of global players who run most of the on-line world: tracking our footprints to refine (big data engines) our habits into the new oil, to sell to advertisers but not to provide to law enforcement to help identify and "remove" those who abuse us.

I am not convinced by the calls for blanket powers to address the use of the internet by potential terrorists while we fail to make serious progress with reporting and intelligence sharing at almost any level with regard to almost any type of criminal behaviour on-line. Some years ago I was told that during the run-up to the bombing of the Arndale Centre in Manchester, Special Branch believed there was only one, inactive, IRA cell in Manchester. My informant told me that within 48 hours of the bombing, the local CID had been given details, including membership and meeting locations, of six active cells. The local criminals had no problem with the IRA bombing London:  locally was, however, very  different. 

Last March I chaired a small round table on intelligence sharing. A key point was that law enforcement, including the security services, were drowning in data that they did not have the resources, people or technology to analyse. The suggested way forward was to make it less impossible for "industry" to use its own "big data" processes to filter data to protect possible criminal behaviour (and other abuse that was in flagrant breach of their supposed terms and conditions) and pass over that which was relevant in formats that could be easily collated and used. That would , however, require addressing issues of governance and co-operation, including responsibilities, liabilities and priority setting, that people prefer to keep behind closed doors. 

We also discussed the need to revisit the current convention whereby the defence can trawl through all of the prosecution's evidence base. It might have been an important safeguard if we still had capital punishment but we do not and such trawls are clearly being used to identify and silence potential witness and thus reinforce reigns of terror in inner city sink estates dominated by organised crime and street gangs (whether religious or secular or the unholy alliances across the "social" boundaries between the two).

I was among those infuriated by the many falsehoods and inaccuracies in "The Imitation Game" but it did succinctly summarise the dilemma faced by those wishing to keep sources of intelligence secret and those wishing to take action. An illustration of the consequences of getting the balance wrong can be seen with regard to the failure to respond to the original calls for help when the extremists began their take-over of the Finsbury Park Mosque .

The final report of the EURIM- IPPR study into "Partnership Policing for the Information Society"  looked at governance issues but failed to come up with recommendations that caught the imaginations of the participants. I revisited the subject in the context of the  governance of "big data" (public or private)  the in surveillance society when I reviewed the Labour Party Modernising Government  study  and its call for an ethical dimension.

I was, however, taken aback by how soon the issues would become topical. 

I would like therefore to repeat my call for their recommendation to: "Create an ethical framework and governance for ethical issuers around the interaction of the state, its citizens and corporations" to be responded to by the resurrection of the pre-1958 duties of Britain's third most senior Judge, the Master of the Rolls  and his deputy, The Keeper of Public Records . It is an "obvious" way to provide authoritative,  credible and (where necessary) public judicial oversight  for the surveillance and information security activities of the state and also of the industry players with whom they should be co-operating to address abuse of all types, not just terrorism,  over the Internet.

The current mish-mash of under-resourced Information, Interception, Surveillance Cameras and other "Commissioners" and regulators should then "report" to the "Master". Meanwhile the "Keeper" should be able to draw on the resources of the National Audit Office, CESG and National Archive to enforce good practice in private, while providing the evidence for "public" enforcement by the Commissioners and/or Master should this prove necessary. Of course there is a lot of small print to address. But, in the face of threats from all those who think that our private information is their new oil (alias "big data") what better way could there be to help counter the similar hypocrisy  around the celebrations of the 800th anniversary of Magna Carta, than to put the data and surveillance activities of the state and of its contractors back under clear judicial oversight and Common (not Roman) law.

We should also remember that proud boast of the last "Keeper of Public Records" that her forbears had provided the evidence to have three of their sponsoring ministers (Lord Chancellors who had fallen out of favour) executed. We no longer have the death penalty for anything but a similarly rigorous approach to the enforcement of good information practice could also do more than any amount of blether to help rebuild trust in the UK as a globally trusted hub for information processing. 

There are some interesting side effects.

If it were possible for the Master to also have effective oversight of the intra-UK surveillance operations of GCHQ and Law enforcement it should also be possible to streamline current controls which get in the way of the timely and effective use of intelligence. Many of those controls currently give the worst of all possible outcomes, getting in the way of rapid response (as during the 2011 riots when law enforcement lacked the processes to use the real-time intelligence streaming in on a voluntary basis from communications services) while failing to give public confidence because they are unknown.

The spirit behind Magna Carta gained force in the 17th Century, an age of mass immigration (Huguenots and others fleeing from persecution), mistrust, plots and riots. Sound familiar?  Hence the need to take its values seriously. "Je ne suis pas Charlie. Je suis Ahmed." 

I have just read that the digitisation of government needs a major transformation effort

Which comes first?

The digitisation or the transformation?

It is over twenty years since Nobel Prize winner Arno Penzias (then running Bell Labs) told PITCOM than computerisation never made anyone redundant. It was the organisational changes that were enabled by computerisation that made whole functions and their departments, redundant. So what have we actually learned since LEO 1 automated the production control pf Lyons Bakery and  LEO2 automated the Army Pay roll? If this article is anything to go by .... not a lot.

Last year I promised, (while blogging on the problems with rural social inclusion as exemplified by the problems with using digital by default to identify farmers )  to comment on the report of the exercise commissioned to help the Labour Party Digital Government review .
I have been taken to task before by Chi Onwurah MP for not declaring my political allegiances. I therefore remind readers that whiIe I am Vice Chairman (Policy Studies) for the Conservative Technology Forum, I am also a levy paying, albeit now retired, member of Unite and of the Co-op. The views in this blog are my own. They reflect neither left, right nor centre but that area where old (non-Marxist) Labour meets tribal (open, but not necessarily "free", market) Tory, round the bike sheds at the back.
      
I particularly welcome the call for those looking at "Digital Government" to focus on social inclusion and ethical standards rather than simple cost saving, although I would have welcomed rather more on how to measure performance and to hold government to account with regard to both. I would also have preferred more focus on the objectives than the technology, although I was personally interested much of the latter. I fear, however, that too many of those responsible for public sector IT systems, particularly those over-zealously outsourced by the last Labour government (such as under the National Plan for NHS IT and the many botched hospital PFIs) have mindsets akin to those who run the US Bureau of Indian Affairs.
 
I was therefore delighted to see the recent admission from Andy Burnham that Labour had taken the privatisation of the NHS too far. Perhaps he already knew that Circle was planning to withdraw from the running of Hinchinbrooke Hospital. I look forward to seeing further evidence that all main parties recognise that the outsourcing and offshoring of critical public sector functions, including the security of our personal information, has passed its zenith and that the time has come to rebuild the in-house systems skills of the public sector. That rebuilding needs to include the skills for end-users, not just IT "experts", to use open source, interoperable and agile methodologies to support the integration and transformation of service delivery, under democratic control and open accountability.

Recommendation 31 of the Digital Government Review , five days training for all civil staff during the next parliament to become digital champions, is far too modest and has far too low a priority. All civil servants should have the equivalent (including both off-the-job workshops and on-the-job distance learning) of at least ten days a year to help them do their jobs better. The goal should be to involve end-users and their managers in driving incremental change within inter-operability frameworks using IT "professionals", "systems experts" and outside "consultants" in support roles only. 

That has been the ostensible aim of those developing what we now call "agile" methodologies for over forty years. The time has come to take them at their word and adopt the necessary disciplines - while recognising why this is so hard in practice .

I strongly agree with the authors of the review that the goal should be better service for those in most need (my personal rephrasing of their social inclusion goals). Given the state of public finances  (including the overhang of bloated PFIs and other rigidly wasteful outsourcing contracts) that will have almost certainly have to be achieved by incremental change, on positive cash flow using software as a service over shared network and cloud services to cut new system costs by  30% (and more) above the savings on those they replace. We can then argue whether the additional savings should be used to improve services to the growing number of elderly (including me!) or to cut taxes.

I found it difficult to work out which of the other 34 recommendations were there to help achieve objectives and which were there to address assumed constraints.  Many appear to very technical and capable of interpretation in a variety of ways, not all of them good professional practice. I did the programme management module on MSc06 (1971 - 3) at London Business School and subsequently ran the only one of Tony Benn's DTI tripartite industry strategy programmes to achieve its objectives (The Water Industry Computing Development Plan). I learned that if a programme has more than six priorities, it has none. More-over only the top three really matter. Most supposed objectives, such as health and safety, equal opportunities and even timescales and budgets, are constraints, not objectives. My own experience has been that the biggest constraints are the skills and time available, not the funding.  I have seen too many expensive fiascos resulting from politicians throwing  consultants and contractors with the wrong experience, motivation and management at a problem because they think that mortgaging the future will provide a short cut to success. I would love to see a bipartisan agreement to follow good professional programme management practice. But pigs might fly      

Is the objective of Digital Government to deliver better and more socially inclusive automated services? Or is it to deliver better services, digital or otherwise, making use of technology to help human beings overcome organisational problems and resource constraints in addressing the needs of those in most need of help, support and/or treatment?

I suspect that some of the authors of the report did not recognise the tension between the two approaches. Others probably did, but could not agree how to reconcile the differences. I sympathise. Politicians, advisors and officials are subject to massive lobbying from armies of consultant and suppliers telling them that technology and outsourcing are the "answer" and the implementation should be contracted to them. Those currently at the top of most major suppliers to the public sector got there by winning such contracts, rather than working on their subsequent delivery. They now have grave difficulty in adjusting to the reality of a world where the public sector is not only broke but mortgaged to the hilt (PFIs and outsourcing deals).

The only realistic way forward is incremental change, using "agile" methodologies supported by low cost mobile technologies accessing cloud-based services. But this has to be funded by cannibalising existing contracts to save 30% and more on current outsourcing costs: hence the desire of major suppliers, and their lobbyists, to delay change while they shrink their UK sales and support teams and adjust to a new world.  Hence also the enthusiasm for complex studies to buy time.

I therefore applaud the focus on social inclusion, but would simplify it down to a requirement that public service delivery systems (whether digital or not) should be designed for access by those in most need, using carers they trust.

No large scale roll-out should be committed unless and until the specification has been successfully tested on the target audience. The Secretary of State for DWP's insistence on this basic principle is what lies behind the delays with Universal Credit. This appoach was alien to officials and suppliers, let alone the big management consultancies whose experts always know best. They insisted on cutting code and installing equipment under their existing, extended, contracts before they documented and tested the "pathfinders". In other words, they ignored the reasons for Australia's successful use of the Oracle methodology they were supposedly copying.  Hence the core reason for £hundreds of millions, and more importantly, several years of unnecessary human suffering and waste.  

In the small print of the 2012 budget the Chancellor mandated that no new system should go live after 2014 unless "the responsible minister can demonstrate that they can themselves use the system successfully"  . Thus George Eustace is personally involved with the three week "agile" cycle to belatedly sort out the systems of  the Rural Payment Agency. Similarly the Universal Credit systems cannot go live unless ministers can use them.

Hopefully the launch of the new Digital Accessibility Alliance will be followed by an extension of the policy, preferably in the pre-election budget with all-party support, to mandate the testing of all new systems with members of the target audience, not just the minister, before roll out is contracted.  

I note the plans to budget large sums for teaching the "digitally excluded" how to use current technologies but regard this as less effective use of limited government funds than training civil servants to take public service delivery back in-house and to work with local authorities and the voluntary sector to run "joined up people systems" that meet the needs of those most dependent on them.  Almost PITCOM's first activity was an exhibition of computer-based aids for the disabled, in the Upper Waiting  Room. It was opened by Sir George Young  when he was a junior Health Minister.

Over 30 years on and we are still failing to make effective use of the technology to help those who could and should benefit most. Barnados and the Salvation Army are well ahead of the Government Data Service in the sophistication of their use of IT to help them serve and protect (their levels of delivered security also put Government to shame) those in most need.  Perhaps government should pay leading charities some of what it pays to the big consultancies for advice on how to better use IT to meet the needs of those in most need.
That leads me on to the "ethical" dimension, which Labour would entrust to Cabinet Office.

The Charities are able to do such more at lower cost and more securely by enlisting the hearts and minds of those who work with and for them. Meanwhile no-one, other than a handful of Big data enthusiasts, trusts most Whitehall department further than they can be thrown  . That is not because of the lack of probity of individual civil servants but because of the constraints within which they operate, including rotation to a new role as soon as they begin to gain genuine experience and build trust. 

So how should we handle the issues of trust with the delivery of public services?

Abnd here I come why I agree so strongly with the ethical objectives behind the review ....

Christmas is a time for reconciliation. Please read the Amman Message

| No Comments | No TrackBacks
| More
We have recently much blether about the use of the web by terrorists, including for publicity and recruitment. We hear much less about its use to promote reconciliation and peace. In this context I do suggest readers visit the website of the Amman Message and then think about what it means to them.

It contains the nearest the Muslim world has to a definition of contemporary Islam, as opposed to the odd collections of 19th and 20th Century make-believe peddled by Islamic State, Al Qaeda and others who have "lost their way" and compete in their use of social media to recruit disaffected teenagers and malcontents to join them.

The process that led to the Amman Message was as though the Pope, the Archbishop of Canterbury, the Moderator of the General Asembly of the Church of Scotland and the other leaders of the main Protestant Communities had come together to define Christianity as a similarly tolerant and compassionate faith, in the face of threats from those calling for a violent crusade against not only heretics and non-believers but also those who disagreed with their selective and idiosyncratic interpretation of the Gospels, including the supposed Revelation of St John.

If you think about the way the Catholic Church and Church of England operate or Article viii of the constitution of the Church of Scotland, let alone the way that other protestant communities are organised, you will realise how difficult such a coming together would be for Christians. It was equally hard and unusal for the Muslim World. Which is why the "Message" should be much better known and publicised - so that laymen, not just scholars for whom it was produced, can understand its implications.

Those who came together to produce the Amman Message should be viewed as the thought leaders of the Muslim World: leading teachers and scholars from all the mainstream Sunni and Shia religious and law schools. It is not a "simple" collection of Prelates and Judges setting the "rules". Even the Sharia is better seen as a set of collections of interpretations of the will of God rather than a western style set of laws. This has the side effect of making it relatively easy for Governments to introduce legal codes that are nominally "Sharia compliant" - provided they do not obviously deviate from the "path".    

By contrast the leaders and spokesmen of Al Qaeda or Islamic State are commonly self-taught, with little or no formal scholastic education. Osama bin Laden studied economics and business adminstration. Abu Hamza studied engineering. And so on. Hence also the bizarre legal codes of the Islamic State Caliphate.

The authority of the Amman Message is, therefore, all the more impressive.    

So why is it not better known?

At that point it may be helpful to look at the politics of the Internet and the motives of those whose interests are served by stoking conflict between the Muslim Communities, let alone between them and both Christianity, (ancient, as in Syria and Iraq, modern) and Judaism.

I am, however,a great fan of John Donne, not just his erotic poetry but his later sermons and "religious" writings - at a time when christians were busy persecuting each other in the name of the God of Love. One of my favourites begins "Kind pity chokes my spleen" and contains:

"To stand inquiring right, is not to stray;

To sleep, or run wrong, is. On a huge hill,

Cragged and steep, Truth stands, and he that will

Reach her, about must and about must go,

And what the hill's suddenness resists, win so."
:

A very similar set of messages can be found in the Koran saying, in effect, that those who claim to know the will (not just word) of God with absolute certainty and its meaning for you - are false prophets. You have to study for yourself. I therefore leave you to ponder working out how and why the voices of calm and reason are drowned out in the cacophony of the on-line world, with its lawyer-enforced, short-term, secular business models. 

When it comes to calling on God in support of a "justified war", I personally find little difference between the teachings of St Augustine of Hippo and the messages about self defence found in the Koran. Neither justifies what is happening in the Middle East today - other than those relating to secular self-defence against men of violence. 

My own summary of the careful and measured tones of the Amman Message is simple: "anyone who presumes to know the will of God and encourages others to persecute and kill in his name - is a heretic".

However, I too have no religious training. I therefore urge you to read the three points of the message for yourself and then think, very hard, even if you do not feel able to pray to your version of God for guidance.







2015: The Year of the Compliance-Created Cyber Confidence Collapse?

| No Comments | No TrackBacks
| More
We are bombarded with messages to promote new security technologies when most organisations the lack skills to make effective use of existing products and services to protect themselves and their customers against fraud and abuse. Too many compete for supposedly competant and experienced experts, rather than retrain those who already know the business. In consequence, turnover among those who can tick the boxes of the certifications in current demand and have a gift of the gab is spiralling up and actual security is spiralling down.  The problems are being compounded by layers of regulation that reward bad practice and open up more vulnerabilities than they address.

The biggest security risk now faced by employers is not outside hackers. It is compliance experts who stay just long enough to help you tick the latest regulatory boxes, having acquired the necesary understanding of your systems and security credentials necessary to do so. The drive by the European Commission to address supposed "data protection" problems, supported by the US obsession with "Data Breach Notification", could not have done a better job in opening up opportunities for serious fraud (both high value and mass market) if they had been actively planned by organised crime.

Autumn 2014 saw an explosion in recruitment effort for supposedly permanent compliance officers, well ahead of cybersecurity specialists and other assorted digerati. The average length of stay is now under 18 months. A quick scan of applicants shows that many have not stayed anywhere for more than a year since before the banking crash.

Next year will probably see the nadir of trust in the on-line world.

Part of the solution is for those who are serious about security to stop recruiting external staff of uncertain provenance (beyond the certification of their technical knowledge) for roles which should never be entrusted to those whose loyalty to the organisation is untested. Instead they should retrain long stay staff, particularly who might otherwise be made redundant or otherwise become disaffected after being passed over. This requires the organisation, however, to be serious about trying to rebuild the reciprocal loyalty that has been put a risk by a decade or more of outsourcing.

They should also start investing for the future by using the growing number of modular degree, apprenticeship and internship programmes to recruit and train the next generation, using the Tech Partnership Funding available and training contracts to enable them to claim exemption from national insurance at the same time as reinforcing loyalty by providing serious CPD training for existing staff. The combination of changes and launches over the past month has dramatically change the cost/risk calculations that should underpin the choice between retraining and recruitment. Add in the need to reinforce staff loyalty and competance to reduce the dangers of insider assisted fraud and it should be a no-brainer. Change does, however, require the Head of Information Security to stop talking cyberbabble and FUD and start talking business cases and staff development programmes with the Finance and HR Directors before putting plans to the Board.  

I started writing on the need for programmes to address our mounting e-crime problems in 2004. In 2011 I blogged on the need to ACT "before the shit hits the fan"  . Earlier this year I warned the crisis was about to come to a head  with an accelerating merry-go-round  for those claiming relevant skills and experience. I then agreed to help e-Skills (now the Tech Partnership) look for employers to help identify gaps in the new cybersecurity learning pathways  supply of training. My subsequent report was accepted and I am currently helping the Tech Partnership identify those training providers trusted by major employers to help them fill skills gaps.  I say "trusted" because training providers, like compliance officers, are among those able to work across security barriers without raising eyebrows.

When prioritising the security skills gaps the technology employers identified "Big Data" (including its use to detect fraud as well as its own vulnerabilities), "Cloud" (from access devices and networks to the hosting centres) and "Mobile" (including "Bring Your Own Device") as their top three. Financial Services commonly have a different, but not necessarily incompatible, perspective. Their focus is on "Identity and Access Management" in all its dimensions. These range from registering, identifying and locating the devices (often BYOD) allowed access to services (often cloud based), to the use of Big Data to analyse digital footprints to decide who should be given access and to monitor their subsequent behaviour (Vetting and Monitoring), including good practice in the use of those services already offering precognition reports based on on-line behaviour: where financial services employers have mixed views.

But the biggest issues are less to do with the technologies that the people processes they should be supporting. What is legal, let alone good, practice in the vetting and monitoring of potential recruits, employees and current or would-be customers?  Hence also the critical nature of my recent blogs on the Government Verify system and the obsession with trying to remove any face-to-face element in the creation of new digital credentials to replace those in which trust has been lost - in order to meet yet another deeply flawed  EU initiative to address the problems of the last century. 

The world has moved on. As part of my work with the Tech Partnership I am helping organise round tables in the New Year to bring together employers, recruitment agencies, training providers and members of relevant professional bodies and interest groups (including CIPD, CPHC, IAAC and SASIG) to identify those willing to work together on training needs analyses and the provision of relevant courses and material to meet the needs of today and tomorrow. 

In some of the most critical areas the first task is to identify what good practice is.

For example one of the areas is reporting: to whom should you report what, how and what should you expect to happen? Here the training needs analysis has to begin by "negotiating" the answers with law enforcement and major ISPs because the answers are not at all clear. The situation is equally unclear with regard to checking the CVs of potential recruits and assessing the probity, not just technical competence of those who could destroy the security of the organisation. Then there is the confusion over what is good practice in monitoring staff behaviour over time, given that signs of stress are more likely to be to do with health, finances or family issues leading to the propensity for mistakes and bad judgement rather than fraud. 

However, the exercise will be of little value unless we also address the reasons why employers are not retraining existing staff and the support for apprentice programmes is poor and may even have been falling . Hence also the importance of the work with which I have also agreed to help the Digital Policy Alliance (I remain a member of the unpaid advisory committee) on why so few employers invest in training. The DPA Skills working group suspended activity for the duration of the House of Lords Digital Skills Select Committee. Instead we urged members to submit evidence. The Committee has received over a thousand pages of evidence and those who have followed the oral hearings will have noticed a number of themes emerging. The DPA Skills group therefore plans to reconvene in February, after the Committee has reported, to discuss how to help implement the recommendations. That will probably entail focussing how to help make the break out from Groundhog Day : the 50 Year long, (to date), cycle of Skills Reports that have never yet lead to action. 

The Chancellor made a great start this month by exempting apprentices aged under 25 from National Insurance and funding some excellent Tech Partnership programmes but that will not be in time address the compliance-created cybersecurity crisis of 2015 as short-stay insiders help loot those organisation which place no value on corporate loyalty - unless employers make good use of the funding available for CPD programmes.  
 


The UK On-line landscape is being transformed in the week before Christmas

| No Comments | No TrackBacks
| More
The pledge by the mobile operators to spend £5 billion tackling mobile not spots   helps explain the speed of the EE (with £2 billion of its debts) sale to BT and the latter's plans for a £2billion rights issues plus £3 billion of extra debt

The City appears to have welcomed BT plans but they appear to take it to within a £billion of risking its current Baa2 debt rating. That the mobile operators pledge is only for 90% of the UK adds further confirmation for the need for a new approach to addressing the needs of the final 10%. Meanwhile the pressures to improve mobile cover for those in "rural" Inner London (where BT often claims it has no business case for improving fixed broadband) are increasing  with exercises like Syed Kamall's "No Bars" campaign  backed by the Evening Standard .

The good news is that the cost of tackling not spots can be cut by up to 80% by organising practical co-operation in making available shared mast sites and wayleaves.  The issues (including both economics and politics!) are different in urban areas to those in the countryside but shortly after Christmas I expect to be able to invite members of the  all-party Digital Policy Alliance to a round table to pool practical experience regarding addressing inner city and business park "not spots", including model agreements, early in the New Year.  This is part of the promised follow up  to the meeting I organised on 12th September  to help drum up inputs to the consultation on Digital Infrastructure Investment.

The economic value of work addressing notspots to enabling initiatives like Microsoft's support for Retail Week  to have serious impact on mainstream UK business cannot be overstated.  In the blog on my Digbeth experience, (when I learned why our forecasts  of demand are so wrong). I referred, albeit in disguised form, to the transformation of a transport business at the heart of the local retail supply chain, from voice messages and paperwork to text and images between the smart phones of the boss and his drivers and customers, stored in a cloud.

The reason was nothing to do with awareness campaigns or consultancy advice. It was that the fibre to every tenant on the business park was accompanied by high speed, high reliability, secure, wifi. The boss could be confident in relying on sending photos of paperwork to his drivers. They could respond in kind, equally confidently. Both could rely on GPS positioning to show where everyone, including at the collection and delvery points, was.

It was not rocket science. It did not require clever teenagers or apps.

But it did require confidence that the technology, partiucarly mobile and wifi, would be reliablw.

Now think of all those high street retailers and inner city businesses whose wifi and mobile cover is, at best, flakey. The deal made between the Secretary of State and the Mobile operators should help 90% of UK business. But think also of all those farmers and rural SMEs (including much of our tourist industry) whose choice is, realistically, between satellite and wet string. Hence my Christmas greetings to you all

Christmas indigestion for UK on-line retailers: what really is the effect of the new pan-EU VAT regime?

| No Comments | No TrackBacks
| More
If you have not yet read any of the arguments over what the new pan-EU VAT regime means for UK-based on-line retailers (large, small or micro) or are wondering how it will be implemented and enforced I recommend you do not do so over Christmas.

It will merely give you a mix of apoplexy and indigestion leading potentially to rancorous arguments with any relatives who work outside the community of internationalist digerati.
  
I would, however, remind you that ehat has happened is all your fault.

When I was Secretary General of EURIM (now the Digital Policy Alliance"), I used to regularly warn of the dangers of Euro Ping-Pong during meetings on the e-Commerce Directive and allied initiatives,hosted for us by then Electronic Commerce Association (now GS1), rapporteured for me by Will Roebuck while the Commission was consulting (and it did) before it gave up on trying to the right thing (whatever that might have been) and "harmonised" on Brussels fudge. And I gave up and focussed on UK-centric issues where I could make a difference.

Those who are serious about wanting to sort out the resultant mess should give rather more support to our successors, particularly the DPA plans to "support" (including inserting the necessary corporate, political and social "rockets") exercises to turn the current "reform" programme into the action plans needed for the EU to survive the next decade. I have great respect for the rapporteurs who are ready to support the DPA plans (I chose most of them and they have turned out even better than I expected) but they can only help produce balanced and representative results if those who will be affected by the chaos that is to come actually join, to help cover the overhead costs, and are then active in making their views known and working together on that which they can agree.

We now face the consequences of past compromises as governments world wide (not just within the EU) scramble for tax revenues while the world economy spirals downwards.  Governments face a triple fiscal whammy as the growing impact of the Ukraine dispute and associated sanctions coincides with the decision of Saudi Arabia to cripple its political enemies and erstwhile competitors and the US decision to rein  in its budget deficit. One "side effect" is that the on-line world will, in future, have to compete with the high street on efficiency and convenience, not just tax avoidance.

Christmas Stocking Fillers for Digital Government Anoraks: 1) The Government Verify Invitation to tender.

| No Comments | No TrackBacks
| More
Press cover for the latest phase of the Government Online Identity framework is beginning to emerge. The invitation to tender to become one of up to ten suppliers for the Government Verify Framework was dated on Friday 12th December and published on 17th with a deadline for submission of  6th February.  On 12th December the Government Identify Assurance blog carried a reminder that the deadline for submissions of interest in the pilot accreditation programme for suppliers was Monday 15th December. The UKAS notice was issued on November 24th giving three week notice, but UKAS is one of those quangoes of which  no-one has ever heard until they learn that they cannot do something because it has not been accredited. I therefore suspect the reminder was either because no-one had responded or because just one response looks like a 'fix'.

Do read the invitation to tender because it is the first time that the scale and nature of what is intended for this programme will have become clear to many.

Insomniacs will also need the supporting documentation on the CCS Agreements . Two documents have parts redacted. There is provision for changes to reference documents, but it's not clear which version is to be used for the bid, and some of those currently linked to from the Government Direct blogs have been stated as being well out of date.

Jugglers or Zen experts may be needed to sort out the limitations on how many times subcontractors can be used, but the risk of delay from challenges from lawyers must also be of interest as the contract mechanism is designed to ensure there's a loser. If someone comes 6th, say, and is then excluded, but would have been included, with exactly the same bid, if there had happened to have been a 7th, they would seem to have a very strong case for complaint on a restriction to trade.

It is also the first time that 3.5 million businesses, let alone those providing their accounting and payroll software, will have an opportunity to appreciate the changes they would have to make in order to play, allowing for the scope of the unanswered questions on the business model and therefore the uncertainty of take-up by anyone other than those parts of the public sector which are given no option.

That leads to a core question. What is the business case, apart from a questionable interpretation of the European Union Regulation on Electronic Identities and Electronic Trust Services?

The good news is that final draft of the regulation was watered down from that which the Digital Policy Alliance described as a "Massive European Own Goal"  after it had consulted its and called for inputs from others  and after my own attempt to draw attention to the ticking time bomb, including for DWP and the Universal Credit .

It is, however, a moot point as to whether the UK needs do anything beyond stating which existing identity and trust services it will accept for on-line authentication.

It is not as though this is a new market. As I have pointed out before  the issues are not new either. UK and US law on electronic signatures has been clear since 1867 (Supreme Court of New Hampshire judgement on whether a cable authentication is a signature)  and we have nearly as many government departments and agencies with fingers in the idenity and autnentication policy pots as we have commercial offerings in what is better viewed as the "Identity and Access Management" market.  Other governments, not part of the self-appointed D5 have quietly just done it: Roman Law countries also have a variety of solutions, usually based on "Electronic Notary" services.

Only the digerati who wish to treat our personal information as their oil  have a clear "business case" for change and they should be aware that the price of oil can come crashing down after the cartel collapses.

That said, it would be good if Cabinet Office were to have some sensible bids for recognition under the Government Verify programme from organisations that really do merit our trust. In my own case, I would trust Experian but would not wish to provide them with any information about me that they do not already have, in order to check my identity. Also I personally would not wish to have to trust any organisation based outside the UK to authenticate my dealings with HMG.  I should add that while it might have some value over current processes,  I have little faith that Verify will be much, if at all, more secure than the South Korean National Identity system or those of any of the other 'D5 leaders'.

I also await an explanation of the downward trend of 'live performance'  but am delighted to report that the new system is stated as being required to work in Welsh (albeit in a parenthetical remark).

Merry Christmas and a Happy New Year to all festive-season bidders.

A Christmas Message for the Digerati on the practical meaning of social inclusion

| No Comments | No TrackBacks
| More

A Christmas Message for the Digerati on why we need to give priority to social inclusion not to "digital by default".  : Luke 2.7 "... because there was no room for them in the inn".  

Joseph to Innkeeper: "But I can show you the confirmation from the "Inns'R US" App on my tablet"

Have an off-line Christmas and a user-friendly New Year

As in previous years I have split what I would have spend on Christmas Cards between Barnados and the Salvation Army 




Find recent content on the main index or look in the archives to find all content.

Archives

Recent Comments

ansh ransal on No End of Jobs - how do w... : According to belief, if the GroundHog coming out o...

 

-- Advertisement --