As we approach National Cyber Security Awareness Month, we kick off our Author Q&A series with Courtney Bowman, John K Grant and Ari Gesher, who along with Daniel Slate, authored The Architecture of Privacy, published this month by O’Reilly Media. In this practical guide, the authors describe how software teams can make privacy-protective features a core part of product functionality.
On October 6, Safari will host an author talk in Washington, DC with Bowman, Gesher, and Grant. If you’re in town and can join us, RSVP in the link below before all the spots get filled:
Architecting Privacy: Responsible Design for Information Systems Author Talk
Before our Q&A, the authors had a few words on how privacy architecture relates to the concept of information security: Read more »
by Laura Ippen
Laura Ippen is a consultant with Sustainable Business Consulting, a firm that helps organizations realize the business value of sustainability. She works with organizations to fully integrate sustainability into their operations to enhance environmental and social impact, improve financial performance and strengthen brand value.
You’re looking to cut your company’s energy use to save money while lowering your environmental impact at the same time. So, where do you start? You would likely turn to your facilities team to look into efficiency upgrades for your office buildings.
You may want to look at your IT department first. Read more »
We are thrilled to welcome Safari’s newest content partner, Harvard Business Review Press. One of the world’s premier brands in business and management publishing, Harvard Business Review Press offers a broad range of business titles, from groundbreaking ideas from the likes of Clayton Christensen, Rita Gunther McGrath, Vijay Govindarajan, and John Kotter to practical advice on developing the core management skills that are essential to successful careers.
Safari customers may be particularly interested in some of Harvard Business Review Press’s newer branded lines, such as the 20-Minute Manager, HBR’s 10 Must Reads, and the HBR Guide Series. Safari’s partnership with Harvard Business Review Press provides our customers with access to more than 300 HBR Press books, as well as a curated selection of more than 200 videos and webinars.
Most the content is live now; look for more additions in the coming weeks. Please see this press release for more details.
Inbound 2015 took over the city of Boston last week but worry not – you can still dig into the marketing and content strategy insights from their impressive array of speakers. Safari features over a dozen works written by #Inbound2015 presenters, including:
Read more »
by Ivica Vrancic
Ivica Vrancic is a consultant and trainer. He is also a founder of Verantius, a company that provides management development and human resources consultancy and services.
The work efficiency of an employee is a combination of motivation and ability. It can be expressed by this simple formula: WE = M x Ab. This formula indicates the importance of motivation for any ultimate goal, while the multiplication function tells us that even if the individual possesses all the necessary knowledge, skill, and even experience — but lacks motivation — then the efficiency of that individual will equal zero. Of course, the opposite also applies: motivation alone is not enough for successful and happy performance.
To avoid very complex definitions of motivation, we can define motivation in the following way: Motivating people means bringing them to a position or state within which they are ready to exert additional effort.
“High-level” discussion about motivation usually considers a variety of sophisticated tools such as relaxation rooms, creative rooms, flexible assignments, a colorful and pleasant work environment but this topic is unjustifiably over-considered as these perks are not always applicable to all types of jobs. Read more »
I curate content for a living so I am not easily impressed. But I am deeply taken by the way Apple Music recommends content to me through playlists. Beyond driving my engagement with the platform, Apple Music’s playlist strategy provides a powerful model for thinking about how to combine machine- and human-powered curation.
Here are four (of the) very effective things Apple Music is doing with playlists.
- Apple Music position playlists as a primary curation and discovery vehicle.
This is a screenshot of my dashboard in “For You” mode.
I rarely used playlists to discover music as a longtime Spotify customer because playlists seemed positioned as more of an afterthought to a discovery model built around artists, songs, and albums. Apple Music puts playlists front and center. That alone wouldn’t matter if the playlists being recommended to me were not well targeted, which they certainly are, thanks to a very effective on-boarding process based on the Apple-owned Beats Music experience. Also important: both the content and raison d’etre of each playlist is well positioned via the brief intro text and representative album covers. Read more »
A look at some titles recently added to Safari that are in my queue this month:
Read more »
By Darius Clarke
Darius Clarke is a teacher at Santa Susana High School in Simi Valley, California.
You might not be surprised that the US Department of Labor expects that 74% of the new S.T.E.M. careers through the year 2022 to be in the field of “Computing & Information Systems” (CIS) alone.
Across the country, the education system is starting to reshape itself to refocus on preparing students for their careers. It is hard to ignore that technology-related concepts are woven throughout the S.T.E.M. industry as well as transportation, entertainment, energy, commerce, and manufacturing. CIS provide some of the best tools and software for organizations because of their data analysis capabilities, future forecasting, and the ability to meet different needs across the globe. Read more »
By Brad Edgeworth
Brad Edgeworth, CCIE No. 31574 (R&S & SP), has been with Cisco since 2011 as Systems Engineer and Technical Leader. Formerly a network architect and consultant for various Fortune® 500 companies, his 18 years of IT experience includes extensive architectural and operational work in enterprise and service provider environments.
IP Addressing for Documentation
Those of us who have written any network documentation (blogs, study guides, books, or labs) have chosen IP addresses for our devices for some reason or another.
The secret is: how do you pick the right IP addressing scheme? Part of the logic is straightforward, and the other part is artistic. The reader should be able to look at a diagram and understand the logic with the least amount of words (or legends) to understand the logic and what is being taught. We’ve all seen a diagram and asked ourselves “What was that person thinking?” and “This is going to be difficult to correlate to what I’ve got to learn”.
Unless you are documenting a production network (which is rarely shared externally), using real public IP addresses is a bad idea. Why? Because someone (there always is) will try to mock up your documentation using production devices. IP address conflicts are bad when using someone else’s private IP addressing scheme, but are worst when they are advertising those prefixes out on the Internet. If everyone’s Internet provider is doing their job, and verifying that you own the prefixes you advertise, the problem stops there. If not, you can hi-jack a network and cause someone an outage; which sometimes happens.
Use the Right IP Ranges
RFC 5737 provides three network ranges (192.0.2.0/24, 198.51.100.0/24, and 203.0.113.0/24) available for documentation purposes. How many have documents have I seen that use those ranges? None. I’ve never used them either. It could be because they are only /24 networks, or because they are discontiguous… Who knows…
You will notice that most network vendors use Private IP address space (RFC 1918 – 10.0.0.0/8 172.16.0.0/12 & 192.168.0.0/16) for most of their documentation for the reasons I stated earlier. Using IP addresses that should never be seen on the Internet is deemed socially acceptable by most. RFC 1918 space provides 3 different ranges and allow for sub-dividing for additional logic. When I need more major subnets, the following come to mind: (100.64.0.0/10 – Carrier Grade NAT – RFC6598, 169.254.0.0/16 – Link Local – RFC 3927, and 198.18.0.0/15 – Benchmarking – RFC 2544). My personal favorite is the 100.64.0.0/10 range when I need a fourth range because it has lots of space for subnetting.
Read more »