News


The Jim Pinto Column: Networking, value and a new automation threat

December 2010 News

The business value of social networks

The desire to network is as old as humanity. Today, online social networking seems to solve a need that is different from simply using e-mail, chat and blogging tools separately.

Collaboration tools are important for members of a team, especially if they are distributed across many locations. E-mail, with 87% adoption, is the default collaboration tool for most business people.

Are you signed up on LinkedIn, Twitter and Facebook? If you are not, should you?

LinkedIn is the network for professionals. Your profile is visible to anyone who is interested. People link up, with your permission. Many groups form related to specific topics of interest, which provides very valuable ideas and feedback.

Facebook started out being just for college kids (have you seen the movie?) and now more than 500 million people are signed up; if it was a country, it would be the third largest in the world.

Twitter broadcasts a message (max length 147 characters) to all of your followers. It is like micro-blogging, and the simplicity is the reason for its success.

After I send out eNews, or publish another article or video, I simply send out the weblink through one of my social networks to broadcast it to all my followers. If I have a question, or a problem, or would like an introduction to someone, I ask my social network. I always get some good answers. The value is cumulative and long term.

By stressing approachability in social media, top-level managers can stimulate communications with employees. Today, many politicians are on Facebook and Twitter, though I suspect that they tweet through assistants . . .

Perhaps the real reason why so many managers are uncomfortable with social networks is the fear of losing control over employees, who now have tools that enable them to collaborate easily with people both inside and outside the company.

Such individual empowerment is precisely the key value of social networks. Rather than relying on rigid hierarchic structures and formal meetings, social networks encourage employees to work together, innovating by self-organising into communities of interest, and collaborating to tackle complex problems.

Today, many job searches and introductions come through LinkedIn, and that is a good way too to get job references. People have told me that many new ideas come, and many problems are solved through their groups on social networks, both inside and outside the company.

Value creation is shifting from protecting proprietary knowledge, to increasing knowledge through fostering collaboration. This is the real business value of social networks.

Stuxnet – automation systems cyber warfare

Well, by this time the Stuxnet worm has been discussed in all the news media, with little left for me to add. Still, many have asked me to summarise my view from the industrial automation standpoint.

This malware surfaced a few months ago. It can take over industrial supervisory control and data acquisition (scada) systems in power plants, pipelines and factories. It is used for espionage or sabotage, and can cause serious damage. About 15 systems have already been infected globally; several are in Iran.

Stuxnet spreads via infected USB thumb drives (memory-sticks) exploiting a vulnerability in Microsoft’s Windows operating system (now resolved). The worm looks for Siemens’ software which controls industrial equipment like valves and motors.

Most industrial control systems are not connected to the Internet, but do have USB ports. So, this would require an ‘insider’ to physically load the software via the USB. Once the worm infects a system, it quickly sets up communications with remote servers to steal proprietary data or take control of the scada system.

While other cyber attacks have slowed or stopped communications, Stuxnet is the first aimed specifically at physical destruction. It hides, waiting for certain conditions before it changes set-points, alarms and controls.

Stuxnet’s sheer sophistication suggests that it may have been developed by a country, or nation-state, which feels immune to direct retaliation. Experts have not yet determined who developed Stuxnet, except that it was not some lone hacker, or small, isolated group. It is clearly someone with significant technological and financial backing.

The investigations will eventually show who the attackers are (the location of the remote servers), and the hackers clearly do not care – perhaps because they are backed by a government which will shield their identity.

Has the age of automation systems cyber warfare arrived?

Jim Pinto is an industry analyst and commentator, writer, technology futurist and angel investor. His popular e-mail newsletter, JimPinto.com eNews, is widely read (with direct circulation of about 7000 and web-readership of two to three times that number). His areas of interest are technology futures, marketing and business strategies for a fast-changing environment, and industrial automation with a slant towards technology trends.

www.jimpinto.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Reinstatement opportunity for ECSA registration
News
In 2023 the Engineering Council of South Africa (ECSA) announced a special opportunity for engineers in South Africa to reinstate their registration status if it had been cancelled. This exclusive offer is available until the end of August 2024.

Read more...
Hytec opens fifteenth Mandela Day library
Bosch Rexroth Africa News
Over 200 learners at Monene Primary School in rural Limpopo have received their own containerised library. This is the fifteenth library since 2011, provided by Hytec South Africa and the Nelson Mandela School Library Project to schools across the country.

Read more...
CSIR survey on the state of cybersecurity in South Africa
News
The CSIR Information and Cybersecurity Centre has released four comprehensive national cybersecurity surveys. These delve into critical areas such as cybersecurity preparedness and resilience in the public sector, cybersecurity skills gaps, cybersecurity incidents, and the digital identity landscape in South Africa.

Read more...
Referro Systems partners with Festo in Northern Cape
News
Referro Systems has been recognised as an Authorised Official Partner Candidate for Festo in the Northern Cape, marking a significant milestone in its commitment to delivering best-in-class automation solutions to customers.

Read more...
Heavy-duty tablet achieves global certification
Vepac Electronics News
In a significant advancement for the company’s rugged tablets, the Teguar TRT-5380-10 heavy-duty tablet from Vepac has successfully acquired 11 international certifications, setting a new standard in quality, safety, and security across global markets.

Read more...
Bühler Johannesburg transforms Little Star Daycare Centre
News
Little Star Daycare in Vanderbijlpark has undergone a remarkable transformation, thanks to the generous support of Bühler Johannesburg.

Read more...
Schneider Electric and Harmony accelerate skills development
Schneider Electric South Africa News
Schneider Electric has formed a strategic partnership with Harmony Gold Mining to upgrade the instrumentation workshop into a state-of-the-art facility.

Read more...
RS South Africa showcases mining products and solutions
RS South Africa News
RS South Africa recently exhibited at MTE Steelport in Limpopo, and MTE Sibanye-Stillwater in Gauteng.

Read more...
RS PRO expands automation range
RS South Africa News
As automation continues to revolutionise production facilities, RS PRO, the trusted own brand of RS, is expanding its product range to meet the growing demand for smarter, more efficient processes.

Read more...
From the editor's desk: Killer science
Technews Publishing (SA Instrumentation & Control) News
I couldn’t resist watching The World Industrial Reporter’s video on Ten Scientists Killed By Their Own Experiments. Some of them would have deserved the Darwin Award for taking themselves out of the ...

Read more...