How to Write a Mission Statement That Doesn’t Suck [video] | Switch | Fast Company


So you’ll call your colleagues around the conference room table to unveil the mission, and all of the sudden, these people that you like and respect are going to transform into 10th-grade English teachers, nitpicking every word. Everybody starts chiming in with opinions: “Hey, I really like the word ‘present’ better than ‘serve,’ it has a nice resonance.” And someone else will say, “Well, we obviously can’t say ‘damn,’ that’s just offensive.” And so it begins. And as you go around the table, your mission statement will be pecked to death.

Read the rest and watch the video at How to Write a Mission Statement That Doesn’t Suck | Switch | Fast Company.

Twitter to block malicious links


twitter logo

Twitter is launching a new service designed to stop users of the social-media site from getting duped by phishing links that steal their login credentials and other attacks.

The company will route all links submitted to the site through a filter created to catch links that lead to malware, the company said on the Twitter blog on Tuesday.

“A couple weeks ago, Biz [Stone, Twitter co-founder] explained how Twitter users were being victimized by phishing scams spread primarily through links in direct messages,” the post said. “Basically, people click the link and bad things happen. My team can only detect these scams after malicious links have already been sent out.”

With the new filtering service, even if a bad link is already sent out in an e-mail notification and somebody clicks on it, the user will be safe, according to the post.

The filtering will focus on links sent via direct messages and e-mail notifications about direct messages since the attacks occur primarily in those communications.

Twitter users were hit with a series of phishing attacks in February.

Source: Twitter to block malicious links | InSecurity Complex – CNET News.

ECan councillor likens review to Nazi action


A key moment in Nazi Germany history is the inspiration for the “hatchet job” on Environment Canterbury (ECan), says regional councillor Rik Tindall.

Tindall, ECan’s Christchurch East representative, is warning that the review by former National deputy prime minister Wyatt Creech poses a threat to democracy.

In a letter to the editors of The Press and the Timaru Herald, he says there is no “dysfunctionality” at ECan.

Creech’s review recommended sacking the 14 councillors, replacing them with commissioners, and the establishment of a new regional water authority.

Tindall called the Creech report unfair and “an error-ridden hatchet job”.

“The report attempts to inflagrate a Canterbury version of the 1933 Reichstag fire incident, to justify curtailment of democracy. New Zealanders should be very, very concerned as to the direction their country is taking,” he said.

“The unconscionably severe attack upon local democracy is simply a smokescreen to cover for … an asset and power grab by the most threatening of New Zealand forces.”

On February 27, 1933, the Reichstag building in Berlin went up in flames. Nazis claimed this was the start of a Communist revolution, which led many historians to believe the Nazis started or helped start the fire.

Adolf Hitler then convinced President Paul von Hindenburg to pass an emergency decree granting Nazis sweeping powers and consolidating their authority, laying a foundation for a police state.

via ECan councillor likens review to Nazi action | Stuff.co.nz.

COMMENT

I wonder if those that had to deal with the “functional” Ecan in the past years feel the same as Tindall. Here we have an organisation that to a certain extent makes the rules, administers them and to some extent is the judiciary. Democracy was overboard anyway. I do not rule out that some parties will have had similar sentiments about their dealings with Ecan in the past.Please spare me the populist conspiracy theory.

Is someone maybe somewhat worried about his job?

Beyond Believers


The study of religion is too important to be left in the hands of believers.

So claims David A. Hollinger, a professor of American history at the University of California at Berkeley, in his response to religion emerging as the hottest topic of study among members of the American Historical Association (AHA).

Perhaps surprisingly, leading evangelical scholars voiced general agreement with his basic premise.

“The practice of history is best served by many historians working from all their separate angles,” said Rick Kennedy, president of the Conference on Faith and History (CFH) and a professor of history at Point Loma Nazarene University in San Diego. “What is good about the new surge in religious history is that something that was neglected is now gaining its rightful place.”

Barry Hankins, resident scholar at the Institute for Studies of Religion at Baylor University in Waco, Texas, said he shared Hollinger’s sentiments, “as long as the understanding of faith is not left only to unbelievers.”

“The trick for insiders is to think critically about their own tradition, while the trick for outsiders is to try to develop a feel or affinity for the group he or she is studying,” said Hankins.

Read the rest at: Beyond Believers | Christianity Today | A Magazine of Evangelical Conviction.

Negotiating Cloud Computing Agreements


Cloud computing has been characterized as a paradigm-shifting phenomenon that will change how we purchase IT resources. Though given different names, cloud computing has been around for some time, and the legal lessons learned from experience with traditional software licensing and outsourcing agreements can and should be applied to cloud agreements, but there are new issues which will need new solutions.

Cloud computing is a loose term that describes a variety of data storage, processing, and application services, normally provided by a third party using equipment not located on the customer’s site. These services include providing raw processing power on demand, special purpose applications on a subscription basis, and remote data storage. An early form of cloud computing was Application Service Provider or ASP services, and another is currently known as software as a service or SaaS. Cloud services are normally provided using internet technology, where the customer uses inexpensive hardware and an internet browser to access the service and/or remotely stored data.

The ease of access and simplicity of using cloud applications are part of its attraction. Unfortunately, the same cannot be said for the legal issues related to cloud computing. While traditional software licensing and IT outsourcing agreements can be used as a model for cloud computing, there are new risks and business practices not addressed in those older agreements that must be considered.

OUTSOURCING AGREEMENTS AS A MODEL FOR CLOUD AGREEMENTS

Read the rest via Negotiating Cloud Computing Agreements.