*take nothing for granted!
Unless otherwise indicated all photos © Richard McKie 2005 - 2015

Who is Online

We have 78 guests and no members online

Translate to another language

 

 

The issue of online security is never far in the background these days: high-profile TV presenters in court for downloading child pornography [link]; Julian Assange holed-up in the Ecuadorian embassy in London; or attacks by Anonymous on Melbourne IT (AAPT) records that allegedly made some of the ISP's users' private information public. 

While we can all applaud the apprehension of criminals through police monitoring; and we might be swayed by Assange's assertions that corporate and government secrets are forms of conspiracy and that such conspiracy is a bad thing; we may not be so pleased by our browsing history; or worse, our medical history; or our employer's HR records being made available to a cyber bully or blackmailer.  

 

 

Thanks to computer and communications technology we live in exciting times. The bounds of technological possibilities seem limitless. The changes decade by decade have already been unprecedented. Where is all this going?

Or see a youthful one from the past [31st October 1986]  here...

 

 

 

The first version of this article was written back in 2005 as a contribution to a strategic planning exercise.  I was arguing for putting those things like marketing and so on, that we ultimately wanted to be seen, in the Cloud as this would save money.   But I stressed that the Cloud is not secure so it was imperative that we retained our 'physical corporate information infrastructure'.

I predicted that in future:  'Corporations will need to look to ways in which they can split their computing requirements between the internal systems and the Cloud';  and 'We can expect the development of new software systems to facilitate (e-mail attached) document passing between secure corporate environments and the Cloud';  implicitly, because e-mail is not secure.

The article was slightly updated in 2010, when I opened this website. I added some now outdated and since removed comments on that experience. 

I've left the main content here, essentially unchanged since 2005, because it's still relevant; and it's always good to see one's predictions fulfilled. 

 


    Have you read this???     -  this content changes with each opening of a menu item


Travel

In the footsteps of Marco Polo

 

 

 

 

Travels in Central Asia

 

In June 2018 we travelled to China before joining an organised tour in Central Asia that, except for a sojourn in the mountains of Tajikistan, followed in the footsteps of Marco Polo along the Great Silk Road. 

Read more ...

Fiction, Recollections & News

Bonfire (Cracker) Night

 

 

We children were almost overcome with excitement.  There had been months of preparation.  Tree lopping and hedge trimmings had been saved; old newspapers and magazines stacked into fruit boxes; a couple of old tyres had been kept; and the long dangerously spiky lower fronds from the palm trees were neatly stacked; all in preparation. 

Read more ...

Opinions and Philosophy

Renewable Electricity

 

 

As the energy is essentially free, renewable electricity costs, like those of nuclear electricity, are almost entirely dependent on the up-front construction costs and the method of financing these.  Minimising the initial investment, relative to the expected energy yield, is critical to commercial viability.  But revenue is also dependent on when, and where, the energy can be delivered to meet the demand patterns of energy consumers.

For example, if it requires four times the capital investment in equipment to extract one megawatt hour (1 MWh) of useable electricity from sunlight, as compared to extracting it from wind, engineers need to find ways of quartering the cost of solar capture and conversion equipment; or increasing the energy converted to electricity fourfold; to make solar directly competitive.

Read more ...

Terms of Use                                           Copyright