Monthly Archives: March 2014

Winter’s officially over

What’s going to happen to natural gas prices next winter? What are the indicators of a rising v. declining market?

Do you watch the natural gas inventories? Or the long-range weather forecasts?

A tried-and-true measure, now back in vogue, is the weekly rig count. But how do you figure in the wells already drilled but not yet in production?

“Rig Counts Offer New Clues on Gas,” Wall Street Journal, March 31, 2014 C6 http://on.wsj.com/1mFe7Yw

How do you use all this (and other) information to make your decisions? How do others use it?

Advertisements

Leave a comment

Filed under Collect, Data quality, Information, Management, Use, Value

What if your trusted control is “bent”?

What does it say about your compliance culture when your person (or in this case, people) you rely on to prevent decal cations are themselves “bent”? And the people reporting to them follow instructions they know are at best questionable?

“Guilty Pleas of Dewey Staff Detail the Alleged Fraud,” Wall Street Journal, March 29-30, 2014 B3 http://on.wsj.com/O6TipR

The people knew it was wrong and did it anyway. At a law firm!

How can your company do better, on the big stuff as well as the small stuff?

Leave a comment

Filed under Compliance, Culture, Internal controls, Risk

Twice burned?

Navy 0, opponents 2.

The shooter at Norfolk had a TSA badge. As did the shooter at the Navy Yard in DC in September. They also both had problems that might have suggested that they were potential security risks. Mr. Savage, the shooter in Norfolk, had convictions for manslaughter and drugs. The shooter at the Navy Yard had other issues.

Is there something wrong with the controls designed to prevent bad folks from getting TWIC IDs (that allow them access to “secure” facilities)? What’s the backup when the primary control fails?

“Navy Killing Stokes Concerns,” Wall Street Journal, March 29-30, 2014 A5
http://on.wsj.com/1f33t9i

Is this information controls, or some thing else? What else would you do?

Leave a comment

Filed under Definition, Internal controls, Privacy, Risk, Value

How many pecks?

How much information can you process, and how quickly? With the dramatically increasing volumes and multiplicity of sources, processing speed at the GUI (i.e., the user) is becoming a huge issue.

So today’s blurb touches processing speed. Not sure how to classify it.

“How Fast Can You Read This?,” Wall Street Journal, March 27, 2014 D1. http://on.wsj.com/1p8nTB8

Apps to help you increase your reading speed without losing comprehension.

Leave a comment

Filed under Collect, Knowledge Management, Use

Information in use

Flight 370. The search for information continues. People scouring satellite feeds. Airplanes looking for debris. Everyone hoping to find the black boxes before the pinger stops. Under the watchful eyes of the media, reporting mostly nothing.

“Search Teams Grapple With Churning Seas,” Wall Street Journal, March 26, 2014 A10 http://on.wsj.com/1mt370e

How heavily do we rely on information to run our business? How do we prepare for when it isn’t available? In a crisis, how reliable are the early reports? Is one media outlet more reliable than another? Is one government source better or more believable than another? Why ?

Leave a comment

Filed under Business Continuity, Collect, Data quality, Risk, Use, Value

Not all information is equal

Is more information always good?

A proposed statistic to follow, perhaps. Slicing the onion even thinner. Comparing the performance of professional golfers based on how many shots they take to get from the tee to the green. This is in addition to comparing then based on how many putts they take.

“A New Statistic Goes For a Test Drive,” Wall Street Journal, March 22-23, 2014. http://on.wsj.com/1nRPTM8

Does this statistic add value? Knowing who used a six-iron and who used a seven-iron is information, that can be collected and tabulated. But so what?

Leave a comment

Filed under Information, Use, Value

Policy not the last word

You believe someone is disclosing your proprietary information to a third party, using your email system. In the US, most companies reserve the right to monitor company email for these and other reasons.

Apparently, it gets trickier if your email system is also used by third parties.

Microsoft made Hotmail.com address available for free, subject to terms of use that allowed Microsoft to look at a Hotmail user’s account “to protect [Microsoft’s] property.” Microsoft looked at one user’s Hotmail account and identified the leaker and the leakee. But other users went ballistic.

So Microsoft changed its policy. Slightly. Not sure what Google does.

“Microsoft to Change Policy on User Data,” Wall Street Journal, March 21, 2014 B5 http://on.wsj.com/OJ4Yja

Important reminder that your policy is not necessarily the last word.

Leave a comment

Filed under Business Case, Controls, Governance, Information, Ownership, Policy, Protect, Protect assets, Risk, Security